Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Telemetry Loss Risks in Ransomware

November 15, 2023
Reading Time: 4 mins read
in News
Telemetry Loss Risks in Ransomware

Sophos’ latest report highlights a concerning trend in cyber-criminal activities, revealing that in 82% of incidents, attackers disable or erase logs, focusing particularly on telemetry data. The report, based on 232 Sophos incident response cases across 25 sectors from January 1, 2022, to June 30, 2023, underscores the rapid execution of ransomware assaults, often completed within hours.

John Shier, Sophos’ Field CTO, emphasizes the critical role of time in responding to active threats, noting that missing telemetry data prolongs remediation efforts. The analysis categorizes ransomware attacks based on dwell time, with 38% classified as “fast attacks” lasting five days or less and 62% as “slow attacks” with dwell times exceeding five days.

Sophos’ examination of both fast and slow ransomware attacks reveals minimal variations in the tools, techniques, and deployment of living-off-the-land binaries (LOLBins) by cyber-criminals.

While defenders may not need to overhaul defensive strategies as dwell time decreases, the report warns that swift attacks and a lack of telemetry can hinder rapid response times, potentially escalating damage. Shier asserts that cyber-criminals innovate within the confines of necessity, and defenders should focus on maintaining current defensive strategies, including comprehensive telemetry, robust protections, and widespread monitoring. The key recommendation is to increase friction in the attackers’ path, adding valuable response time and stretching out each stage of an attack.

Reference:

  • The Song Remains the Same: The 2023 Active Adversary Report for Security Practitioners
Tags: AttackersCyber AttacksCyber NewsCyber News 2023CybersecurityNovember 2023RansomwareSophosTelemetry
ADVERTISEMENT

Related Posts

Cryptomus Fined 177M By FINTRAC

Cryptomus Fined 177M By FINTRAC

October 24, 2025
Cryptomus Fined 177M By FINTRAC

SpaceX Cuts Starlink In Myanmar

October 24, 2025
Cryptomus Fined 177M By FINTRAC

Russia Managing Cybercrime Groups

October 24, 2025
NY DFS Updates Third Party Cyber Rules

NY DFS Updates Third Party Cyber Rules

October 23, 2025
NY DFS Updates Third Party Cyber Rules

Keycard Raises 38 Million Funding

October 23, 2025
NY DFS Updates Third Party Cyber Rules

Jaguar Land Rover Cyberattack Hits UK

October 23, 2025

Latest Alerts

China Hackers Breach Telecom Firm

YouTube Videos Used As Malware Traps

Lazarus Hits European Defense Firms

Gift Card Heist Via Cloud Hackers

MuddyWater Launches Global Spying

Fake Zoom Calls Target Ukraine Aid

Subscribe to our newsletter

    Latest Incidents

    Hackers Breach Verstappen Data

    Toys R Us Canada Data Breach Alert

    Shaq Range Rover Stolen After Hack

    Ransomware Hits Jewett Cameron

    Salt Typhoon Hacks European Telecom

    JFL Loses 800K Weekly After Hack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial