Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Telemetry Loss Risks in Ransomware

November 15, 2023
Reading Time: 4 mins read
in News
Telemetry Loss Risks in Ransomware

Sophos’ latest report highlights a concerning trend in cyber-criminal activities, revealing that in 82% of incidents, attackers disable or erase logs, focusing particularly on telemetry data. The report, based on 232 Sophos incident response cases across 25 sectors from January 1, 2022, to June 30, 2023, underscores the rapid execution of ransomware assaults, often completed within hours.

John Shier, Sophos’ Field CTO, emphasizes the critical role of time in responding to active threats, noting that missing telemetry data prolongs remediation efforts. The analysis categorizes ransomware attacks based on dwell time, with 38% classified as “fast attacks” lasting five days or less and 62% as “slow attacks” with dwell times exceeding five days.

Sophos’ examination of both fast and slow ransomware attacks reveals minimal variations in the tools, techniques, and deployment of living-off-the-land binaries (LOLBins) by cyber-criminals.

While defenders may not need to overhaul defensive strategies as dwell time decreases, the report warns that swift attacks and a lack of telemetry can hinder rapid response times, potentially escalating damage. Shier asserts that cyber-criminals innovate within the confines of necessity, and defenders should focus on maintaining current defensive strategies, including comprehensive telemetry, robust protections, and widespread monitoring. The key recommendation is to increase friction in the attackers’ path, adding valuable response time and stretching out each stage of an attack.

Reference:

  • The Song Remains the Same: The 2023 Active Adversary Report for Security Practitioners
Tags: AttackersCyber AttacksCyber NewsCyber News 2023CybersecurityNovember 2023RansomwareSophosTelemetry
ADVERTISEMENT

Related Posts

New Defensive Methods Stop Crypto Botnets

US Cyber Sharing Law Nears Expiration

June 25, 2025
New Defensive Methods Stop Crypto Botnets

G7 Backs New Global Cybersecurity Fund

June 25, 2025
New Defensive Methods Stop Crypto Botnets

New Defensive Methods Stop Crypto Botnets

June 25, 2025
US House Bans WhatsApp From Staff Devices

US House Bans WhatsApp From Staff Devices

June 24, 2025
UK Needs More Cyber Advisors For Small Firms

UK Needs More Cyber Advisors For Small Firms

June 24, 2025
OWASP Releases New AI Security Test Guide

OWASP Releases New AI Security Test Guide

June 24, 2025

Latest Alerts

Hackers Abuse Trezor Support For Phishing

FileFix Attack Turns Explorer Into Weapon

OneClik Malware Attacks Energy Sector Firms

Chinese Hackers Build Router Spy Network

New Malware Skims WordPress E-commerce Sites

BEARDSHELL and COVENANT Malware Uncovered

Subscribe to our newsletter

    Latest Incidents

    Columbia University Probes Major IT Outage

    Mainline Health Breach Hits 101,000 Patients

    Porto Nacional City Hall Hit by Ransomware

    Hacken Token Crashes 99 Percent After Hack

    Paraguayan Government Hit By Cyberattack

    Hackers Leak Saudi Games Athlete Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial