Mandiant (now part of Google Cloud)'s M-Trend 2024 report is out.
"In 2023, more than half of compromised organizations (54%) first learned of a compromise from an external source, while 46% first identified evidence of a compromise internally. However, separating out ransomware-related intrusions reveals that it was much more common for an organization to learn of a ransomware-related incident from an external source. For ransomware-related intrusions, 70% of organizations were externally notified, in most cases, via a ransom demand from the attacker. For intrusions that were not linked to ransomware, the ratio of internal versus external discovery was even, 50% to 50%. Of the internally discovered intrusions, 85% did not involve ransomware."
Let's understand this a little better
Getting notified of intrusion by external source is not always a bad thing. This external source could often be the external partner providing managed security services to organizations.
If we look at the trend, the internal detection has increased from 6% in 2011 to 46% in 2023. The non-ransomware detection for intrusion was 50-50 between internal and external detection.
This is a massive change and shows organizations are building internal cybersecurity capabilities.
The median dwell time (first detection of intrusion) has decreased to 10 days. If we look at 10 years back, the dwell time in 2014 was 205 days. This shows improved communication between organizations and their external partners, quick detection of ransomware and defenders getting better and better with detections.
Great insight in the report - https://lnkd.in/gFJi_ZgH
#cybersecurity #incidentresponse #ransomware #informationsecurity