News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

IT stories, news, reports ✓ always up to date

The B2B portal for the entire

world of cyber security

  • Home
  • Stories
  • PR News
  • Short news
  • Expertise
    • EDR, XDR, NDR and MDR
  • Partner channel
    • AV-TEST
    • Arcserve
    • Bitdefender
    • FAST LTA
    • Kaspersky
    • Sophos
    • Trend Micro
    • WatchGuard
  • Info
    • Subscribe to our Newsletter
    • Imprint
    • Privacy Policy
    • Contact & Info
    • Media info
    • Partner sites & feeds
    • Switch off push news
  • de
    • de
    • en
    • es
    • fr
    • it
    • tr
    • hi
    • ja
    • pt
    • uk

Every second attacker logs into the company network

24 April 2025
| No comments
Every second attacker logs into the company network. Image: Bing - AI
Advertising

Share post

Compromised credentials are the leading cause of cyberattacks for the second year in a row. The Sophos Active Adversary Report shows that in 56 percent of the analyzed attack cases, cybercriminals possessed stolen login credentials.

The Sophos Active Adversary Report 2025 analyzes the behavior and techniques used by cybercriminals from over 400 actual attacks conducted by the Managed Detection and Response (MDR) team and incident response specialists in 2024. Attackers primarily gained access to networks through external remote services (56 percent of all MDR and IR cases) by exploiting valid accounts, including edge devices such as firewalls and VPNs.

Advertising
Perfect SME cybersecurity
How small and medium-sized enterprises defend against AI-led attacks with tailored security

The combination of external remote services and valid accounts aligns with the main causes of attacks. For the second year in a row, compromised credentials were the primary cause of attacks (41 percent). This was followed by exploitation of security vulnerabilities (22 percent) and brute-force attacks (21 percent).

Pace of attacks increases

When analyzing MDR and IR investigations, the Sophos X-Ops team specifically considered ransomware, data exfiltration, and data extortion cases to determine how quickly cybercriminals move through the different stages of an attack within an organization. For these three types of cases, the average time between the initiation of an attack and data exfiltration was just 73 hours, or approximately three days. Furthermore, the average time from exfiltration to detection of the attack was just 2,7 hours.

Advertising

"Passive security is no longer sufficient," said John Shier, Field CISO at Sophos. "While prevention is important, rapid response is crucial. Organizations must actively monitor their networks and respond quickly to any anomalies they observe. Coordinated attacks by professional cybercriminals also require coordinated defense. For many organizations, this means a combination of business-specific knowledge and expert-led detection and response. Our report confirms that organizations with active monitoring detect attacks faster and achieve better defense results."

Results of the Sophos Active Adversary Report 2025

Attackers need an average of just eleven hours to take over the system

On average, only eleven hours passed between a cybercriminal's first action and their first (often successful) attempt to penetrate Active Directory—one of the most critical elements in any Windows network. If successful, attackers can easily take control of the entire organization.

Old acquaintances among the most common ransomware groups

In the cases investigated by Sophos, Akira was the most prevalent ransomware group in 2024, followed by Fog and LockBit – even though LockBit was taken down earlier this year in a concerted effort by law enforcement agencies.

MDR as a decisive factor for the length of stay of criminals

Overall, dwell time, the time from the onset of an attack to its detection, decreased from four to two days in 2024. This is primarily due to the inclusion of MDR cases in the dataset. The dwell time for IR cases remained stable at four days for ransomware attacks and 11,5 days for non-ransomware cases. Among the MDR cases studied, the dwell time for ransomware attacks was three days and for non-ransomware cases only one day. This suggests that MDR teams are able to detect and respond to attacks more quickly.

Ransomware groups work overnight

In 2024, 84 percent of ransomware binaries were distributed outside of the targets' normal local working hours.

Remote Desktop Protocol vulnerability

The Remote Desktop Protocol (RDP) was involved in 84 percent of MDR/IR cases, making it the most frequently abused Microsoft tool.

More at Sophos.com

 


About Sophos

More than 100 million users in 150 countries trust Sophos. We offer the best protection against complex IT threats and data loss. Our comprehensive security solutions are easy to deploy, use and manage. They offer the lowest total cost of ownership in the industry. Sophos offers award-winning encryption solutions, security solutions for endpoints, networks, mobile devices, email and the web. In addition, there is support from SophosLabs, our worldwide network of our own analysis centers. The Sophos headquarters are in Boston, USA and Oxford, UK.


 

Matching articles on the topic

Sophisticated Phishing-as-a-Service (PhaaS) platform

Security researchers have uncovered a sophisticated Phishing-as-a-Service (PhaaS) platform that poses a serious threat to organizations around the world. The threat actor ➡ Read more

PDFs: The Trojan Horses of Hackers

Cybercriminals are increasingly using the popular PDF file format to hide malicious code. Recent IT forensics findings underscore this: 68 ➡ Read more

Maximum IT security for OT systems

OT systems are rarely attacked directly. However, gaps and vulnerabilities in traditional IT make OT systems more vulnerable to attacks. ➡ Read more

IT resilience: cybersecurity at the storage level

More data security features for greater IT resilience at the storage level: Cyber ​​security managers can pursue a proactive data security approach at the storage level with highly secure NetApp storage and thus ➡ Read more

Algorithms for post-quantum cryptography

A provider of IT security solutions introduces Quantum Protect, a post-quantum cryptography application suite for its u.trust General Purpose Hardware Security Modules (HSMs) ➡ Read more

Power grid threat: security gaps in solar systems

A cybersecurity solutions provider published its research report “SUN:DOWN – Destabilizing the Grid via Orchestrated Exploitation of Solar Power Systems”, which ➡ Read more

Cloud and SaaS security is inadequate

A recent study shows that companies' security strategies are failing to keep pace with the rapid adoption of cloud-native technologies. 28 ➡ Read more

OT environments: Detect and assess threats

Enterprises with limited resources can identify, assess, and make informed decisions about threats in OT environments with a comprehensive endpoint protection solution. ➡ Read more

PR News, Sophos, Zero Trust access
, Cyber ​​attack, Log in, MDR, report, Access

Next posts

← Criminals use RMM tools to inject malware
Real-time security promotes blockchain technology →
Advertising
SME protection
Tailor-made cybersecurity for smaller businesses
Missed important news? Subscribe to our Newsletter!
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Partner channel news

  • AV-TEST
  • Arcserve
  • Bitdefender
  • FAST LTA
  • Kaspersky
  • Sophos
  • Trend Micro
  • WatchGuard
Advertising

Which user group do you belong to? (No tracking!)

Advertising

Latest Posts

  • MITRE CVE program remains in place for the time being 12 May 2025
  • Over 130.000 data breaches in Europe in 2024 12 May 2025
  • Sophisticated Phishing-as-a-Service (PhaaS) platform 12 May 2025

Important links

  • Home
  • Privacy Policy
  • Expert knowledge: EDR, XDR, NDR and MDR
  • Imprint
  • Contact & Info
  • Media info
  • AV-TEST
  • Bitdefender
  • Kaspersky
  • Sophos
  • TrendMicro

Latest Articles & News

  • MITRE CVE program remains in place for the time being
  • Over 130.000 data breaches in Europe in 2024
  • Sophisticated Phishing-as-a-Service (PhaaS) platform
  • PDFs: The Trojan Horses of Hackers
  • LockBit leak site hacked and data stolen

It was searched for

Attack Attacks APT Attack attacks Backup Barracuda Bitdefender BSI CheckPoint Cloud Cybersecurity Cybersecurity darknet DDOS EDR Endpoint ESET Chippers IT security Kaspersky KI SMEs CRITIS lockbit Malware Microsoft Phishing Platform Ransomware report Russia Protection weak spot vulnerability Security Safety Sophos Study Tenable Test Trend Micro Company Encryption Zero-Trust

Social Media

© 2025 MedPressIT Selinger
Cookie Settings
  • Home
  • Stories
  • PR News
  • Short news
  • Expertise
    • EDR, XDR, NDR and MDR
  • Partner channel
    • AV-TEST
    • Arcserve
    • Bitdefender
    • FAST LTA
    • Kaspersky
    • Sophos
    • Trend Micro
    • WatchGuard
  • Info
    • Subscribe to our Newsletter
    • Imprint
    • Privacy Policy
    • Contact & Info
    • Media info
    • Partner sites & feeds
    • Switch off push news