You Have 19 Minutes to React If the "russians" Hack Your Network

Litwin

Platinum Member
Sep 3, 2017
32,633
4,876
1,015
GDL&Sweden
You Have 19 Minutes to React If the Russians Hack Your Network

After Moscow's hackers breach one PC, that network's defenders have less than a half-hour to prevent wider data theft or destruction.
defense-large.png


"Nineteen minutes.
That’s how long the average victim of a Russian state-sponsored hacking group has to react before the initial penetration of a network becomes wider access, theft, and destruction, according to data published today by computer security company CrowdStrike. By comparison, the second-fastest groups were North Koreans, who needed an average of two hours to jump from the first compromised computer to the second; Chinese groups needed an average of four hours. Dubbed “breakout time,” the statistic refers to the amount of time it takes the attacker to jump between network nodes once on the network. It also “shows how much time defenders have on average to detect an initial intrusion, investigate it and eject the attacker from the network, before sensitive data can be stolen or destroyed,” CrowdStrike analysts wrote in a 2018 post introducing the concept. The agility of Russian groups has long been known; it was a signature element of both the 2015 penetration of the Joint Chiefs’ civilian email system and the following year’s attack on the Democratic National Committee’s network. But the new data is eye-opening.

Sen. Richard Blumenthal, D-Conn., hinted at certain classified “successes” by U.S. Cyber Command against Russian hackers in 2018. “The threat from Russia remains unabated. Can you say that in public?” asked Blumenthal of Gen. Paul Nakasone, the head of U.S. Cyber Command and the NSA. Nakasone responded, “Russia provides a sophisticated threat to our nation.” The CrowdStrike data further cements Russian cyber operators’ reputation as aggressive and effective, echoing earlier analysis. “The Russians are the most aggressive and risk-tolerant because they've broken so many international norms and faced so few repercussions that they don’t really believe there will be any serious consequences to their action,” said Mike Carpenter, a former deputy assistant defense secretary for Russia, Ukraine, and Eurasia who now helps lead the Biden Center for Diplomacy and Global Engagement at the University of Pennsylvania. “That’s partly why the Russians are so comfortable going beyond network intrusion and actually manipulating data or taking down power systems, as they've done in Ukraine.”

Kremlin hackers attacking Ukraine have taken out entire electric grids (2015/2016) and attacked (2017) the country’s government, top energy companies, private/state banks, the main airport, and Kyiv’s metro system using the WannaCry and NotPetya malware. These attacks are RL practice operations for attacking NATO/Western military/power/finance/infrastructure targets.

Related: Key Trends From the CrowdStrike 2019 Global Threat Report
 
If "Russia" wanted to get anything off my local ISP's network they'd first have to fix it then improve it to get the speed up to something where they wouldn't have to wait five minutes for responses. Kinda makes me wish they'd give it a whack!
 
You Have 19 Minutes to React If the Russians Hack Your Network

After Moscow's hackers breach one PC, that network's defenders have less than a half-hour to prevent wider data theft or destruction.
defense-large.png


"Nineteen minutes.
That’s how long the average victim of a Russian state-sponsored hacking group has to react before the initial penetration of a network becomes wider access, theft, and destruction, according to data published today by computer security company CrowdStrike. By comparison, the second-fastest groups were North Koreans, who needed an average of two hours to jump from the first compromised computer to the second; Chinese groups needed an average of four hours. Dubbed “breakout time,” the statistic refers to the amount of time it takes the attacker to jump between network nodes once on the network. It also “shows how much time defenders have on average to detect an initial intrusion, investigate it and eject the attacker from the network, before sensitive data can be stolen or destroyed,” CrowdStrike analysts wrote in a 2018 post introducing the concept. The agility of Russian groups has long been known; it was a signature element of both the 2015 penetration of the Joint Chiefs’ civilian email system and the following year’s attack on the Democratic National Committee’s network. But the new data is eye-opening.

Sen. Richard Blumenthal, D-Conn., hinted at certain classified “successes” by U.S. Cyber Command against Russian hackers in 2018. “The threat from Russia remains unabated. Can you say that in public?” asked Blumenthal of Gen. Paul Nakasone, the head of U.S. Cyber Command and the NSA. Nakasone responded, “Russia provides a sophisticated threat to our nation.” The CrowdStrike data further cements Russian cyber operators’ reputation as aggressive and effective, echoing earlier analysis. “The Russians are the most aggressive and risk-tolerant because they've broken so many international norms and faced so few repercussions that they don’t really believe there will be any serious consequences to their action,” said Mike Carpenter, a former deputy assistant defense secretary for Russia, Ukraine, and Eurasia who now helps lead the Biden Center for Diplomacy and Global Engagement at the University of Pennsylvania. “That’s partly why the Russians are so comfortable going beyond network intrusion and actually manipulating data or taking down power systems, as they've done in Ukraine.”

Kremlin hackers attacking Ukraine have taken out entire electric grids (2015/2016) and attacked (2017) the country’s government, top energy companies, private/state banks, the main airport, and Kyiv’s metro system using the WannaCry and NotPetya malware. These attacks are RL practice operations for attacking NATO/Western military/power/finance/infrastructure targets.

Related: Key Trends From the CrowdStrike 2019 Global Threat Report
Sen. Richard Blumenthal, D-Conn., hinted at certain classified “successes”-Don't quote Lying DaNang Dick or I'll lose all respect for you. Saw him up close when he visited our defense plant-he looked like 10 miles of bad road. He is such a toady-I would trust AOC before him.
 
You Have 19 Minutes to React If the Russians Hack Your Network

After Moscow's hackers breach one PC, that network's defenders have less than a half-hour to prevent wider data theft or destruction.
defense-large.png


"Nineteen minutes.
That’s how long the average victim of a Russian state-sponsored hacking group has to react before the initial penetration of a network becomes wider access, theft, and destruction, according to data published today by computer security company CrowdStrike. By comparison, the second-fastest groups were North Koreans, who needed an average of two hours to jump from the first compromised computer to the second; Chinese groups needed an average of four hours. Dubbed “breakout time,” the statistic refers to the amount of time it takes the attacker to jump between network nodes once on the network. It also “shows how much time defenders have on average to detect an initial intrusion, investigate it and eject the attacker from the network, before sensitive data can be stolen or destroyed,” CrowdStrike analysts wrote in a 2018 post introducing the concept. The agility of Russian groups has long been known; it was a signature element of both the 2015 penetration of the Joint Chiefs’ civilian email system and the following year’s attack on the Democratic National Committee’s network. But the new data is eye-opening.

Sen. Richard Blumenthal, D-Conn., hinted at certain classified “successes” by U.S. Cyber Command against Russian hackers in 2018. “The threat from Russia remains unabated. Can you say that in public?” asked Blumenthal of Gen. Paul Nakasone, the head of U.S. Cyber Command and the NSA. Nakasone responded, “Russia provides a sophisticated threat to our nation.” The CrowdStrike data further cements Russian cyber operators’ reputation as aggressive and effective, echoing earlier analysis. “The Russians are the most aggressive and risk-tolerant because they've broken so many international norms and faced so few repercussions that they don’t really believe there will be any serious consequences to their action,” said Mike Carpenter, a former deputy assistant defense secretary for Russia, Ukraine, and Eurasia who now helps lead the Biden Center for Diplomacy and Global Engagement at the University of Pennsylvania. “That’s partly why the Russians are so comfortable going beyond network intrusion and actually manipulating data or taking down power systems, as they've done in Ukraine.”

Kremlin hackers attacking Ukraine have taken out entire electric grids (2015/2016) and attacked (2017) the country’s government, top energy companies, private/state banks, the main airport, and Kyiv’s metro system using the WannaCry and NotPetya malware. These attacks are RL practice operations for attacking NATO/Western military/power/finance/infrastructure targets.

Related: Key Trends From the CrowdStrike 2019 Global Threat Report
That would fix the dems being all tricked and confused again at the voting booth ?
 
R
If "Russia" wanted to get anything off my local ISP's network they'd first have to fix it then improve it to get the speed up to something where they wouldn't have to wait five minutes for responses. Kinda makes me wish they'd give it a whack!
Right and who's going to call everyone 19 minutes ago..
 
What I like is how the Russians sign their work.
That way you know who is hacking you...
 
Litwin,
I would say the overwhelming vast majority of Americans......

1). Have no clue how serious the threat is, or even WHAT the threat is
2). In their ignorance, think it's funny...if it exists at all
3). Will argue you're a fool if you suggest something needs to be done

In many ways, Americans seem to be the most self-destructive people on Earth.
We're loosely held together by nothing more than the strength of bonds made long long ago. But they are failing under pressure.
 
Litwin,
I would say the overwhelming vast majority of Americans......

1). Have no clue how serious the threat is, or even WHAT the threat is
2). In their ignorance, think it's funny...if it exists at all
3). Will argue you're a fool if you suggest something needs to be done

In many ways, Americans seem to be the most self-destructive people on Earth.
We're loosely held together by nothing more than the strength of bonds made long long ago. But they are failing under pressure.


still USA is the greatest state on the planet. D Trump is not forever , the next president will start re-consolidation of nation and the free world . one for sure putler , has to be stopped
 
What I like is how the Russians sign their work.
That way you know who is hacking you...
ask experts : CrowdStrike - SaaS Endpoint Protection, Threat Intelligence, & Cloud Security

“The agility of Russian groups has long been known; it was a signature element of both the 2015 penetration of the Joint Chiefs’ civilian email system and the following year’s attack on the Democratic National Committee’s network. But the new data is eye-opening. The stats are likely driven by a cross of several factors: the skills and capability of each; the relative risk calculus each is making in their likelihood of getting caught and the consequences; to whether they are just exploring for targets that present themselves or going into a predetermined target with something very specific in mind. But an average of 18 minutes is really quite amazing given the scale. Game respects game,” said Peter Singer, a senior fellow at New America and author, most recently, of LikeWar: The Weaponization of Social Media. "
 

Forum List

Back
Top