[Approx. 6 minutes reading time]
The average amount of time a cybercriminal is lurking inside a company's network before they strike their final blow is 287 days.
287 Days!!!
That's more than 9 months.
How is this possible??
First let's understand what this actually means.
What is Dwell Time?
"Dwell Time" is defined as the amount of time between the initial compromise (when the hacker first gets in) and the final event, such as notification of a breach by the FBI or a ransomware note found on a computer in the environment.
This means that a company that has been breached carries on, business as usual, while a cybercriminal sits inside of their network, sometimes for months and months on end.
Imagine what that cybercriminal can do once they've gained control over the company's directory server, file server, computers, cloud services, financial data…
The list goes on.
Hacking Doesn't Work Like You Think It Does
Most people don't truly understand how a "hack" or a "breach" event unfolds.
The common misconception is that a "hacker" attacks a network and infects it with a virus or quickly steals data.
If you've ever seen the classic 1995 movie Hackers (and so many more just like it), it would lead you to believe that hacking involves lightning-fast reflexes where a hacker in a dark room starts typing furiously on their keyboard while 1s and 0s fly across the screen.
The faster a hacker moves, the more noise they make and the higher the likelihood that they will be detected.
Additionally, a full-blown breach of a company's network is rarely conducted by one person or even one group.
Cybercriminals specialize in different areas and most times, the breaches that you read about are conducted by several different groups over a long period of time, all while the company had NO idea that any of it was taking place.
How a Breach Starts
The initial "hack" is typically conducted by a cybercriminal or cybercriminal organization that specializes in gaining persistent access.
Persistent access consists of techniques performed by the hacker that is designed to maintain access to a network through computer reboots, credential changes, and other types of interruptions that could boot the hacker out of that network.
This is an ongoing process as the individual or group responsible for this part of the breach must maintain their access to a specific network so that this access can be sold to another party.
The easiest way to think of this process is to compare it to a distributor.
A distributor buys a product in bulk and then resells that product for a profit to a retail store or the end customer.
A persistent access cybercriminal group is doing the same thing.
They are gaining persistent access over a company's network so that they can sell that access to a cybercriminal group that specializes in other areas, like data exfiltration or ransomware.
This access gets posted on the dark web and then is sold to the highest bidder.
This can sometimes take weeks or months to accomplish, all while the cybercriminals responsible for persistent access must continue to check and maintain they have not been detected and booted off the network.
Maintaining this access and selling it on the dark web is how this type of cybercriminal generates revenue.
How the Breach Continues
Once this initial breach is advertised on the dark web, a second individual or group will purchase it so that they can conduct their attack.
This individual or group usually focuses on data exfiltration and ultimately, a ransomware attack.
Their intention is to steal as much data as possible and then sell that data on the dark web.
Generally, this data will consist of personally identifiable information, financial records, or patient health information.
Once they've finished exfiltrating the data they find valuable, they may strike one final blow with a ransomware event, locking every computer they have access to within the network.