Project manager working and update tasks with milestones progress planning and Gantt chart scheduling virtual diagram.Businessman hand pressing an imaginary button on virtual screen
Share on facebook
Share on twitter
Share on pinterest
Share on linkedin

If you doubled down on Russia, your bet’s safe

By Richard Arneson

In the event you’re keeping score at home, Russia sits atop the medal standings at the Hacker Olympics. And there’s no indication they’ll lose that top spot any time soon. Unfortunately, these olympics don’t happen every four (4) years. It’s a race that will never end.

In its latest threat report, CrowdStrike, the organization that uncovered Russia’s Democratic National Committee hacking prior to the 2016 election, has determined that Russia is leading the cybercrime pack against nearest competitors North Korea, Chinese and Iran.

It’s a timed event

This Hacker Olympics is comprised of only one (1) event, and it’s measured not with judges or style points, but in time. In this case, it’s called “Breakout time,” a measurement CrowdStrike created that refers to the time between the breach of the initial point of entry (starting line) to the network (finish line). Once the network is reached, the data theft can begin (we’ll call that the medal podium).

According to CrowdStrike, the average breakout time in 2018 was 4 hours and 37 minutes. They garnered these results from analyzing over 30,000 thwarted breach attempts among its customer base. Russia’s gold medal-winning speed? A frightening 18 minutes and 49 seconds.

Here’s how the others fared:

Silver Medal—North Korea (2 hours and 20 minutes)

Bronze Medal—China (4 hours)

Dishonorable Mentions—Iran (5 hours and 9 minutes); Organized criminal groups (9 hours and 42 minutes)

Eight times (8x) faster!

While Russia’s stunningly fast time is impressive—or, rather, scary—what’s probably more concerning is China’s precipitous increase targeting the United States. Russia’s attacks weren’t as prejudiced as China’s and evenly spanned the globe (lucky globe). North Korea’s were highly focused on revenue-generating attacks, and Iran’s were more focused on the Middle East and North African countries, primarily those also in the Gulf Cooperation Council (GCC).

Don’t be a statistic in the Hacker Olympics

To find out how to secure your organization’s network and protect its mission critical data, contact GDT’s tenured and talented engineers and security analysts at From their Security and Network Operations Centers, they manage, monitor and protect the networks of companies of all sizes, including those for some of the most notable enterprises, service providers, healthcare organizations and government agencies in the world. They’d love to hear from you.

If you want more information about network security, cyberattack,s and how to stay at least one (1) step ahead of the bad guys, read more about it here:

What happens in an ATM, doesn’t always stay in an ATM

Google launches itself into cybersecurity space

Getting Stuffed at Dunkin’ Donuts?

Security Myths Debunked

State of the Union address focuses on technology–briefly

The technology arms race was just amped up

Apparently, cyber attackers also consider imitation to be the sincerest form of flattery

Last week’s DHS “alert” upgraded to “an emergency directive”

The Collection #1 data breach—sit down first; the numbers are pretty scary

Shutdown affects more than workers

DDoS Attacks will deny a Massachusetts Man Ten (10) years of Freedom

Phishing for Apples

This isn’t fake news

Don’t get blinded by binge-watching

Mo Money, Mo Technology―Taylor Swift uses facial recognition at concerts

Step aside all ye crimes—there’s a new king in town

Q & A for a Q & A website: Quora, what happened?

They were discovered on Google Play, but this is no game

And in this corner…

Elections are in, but there’s one (1) tally that remains to be counted

Hiring A Hacker Probably Shouldn’t Be Part of Your Business Plan

Gen V

Sexy, yes, but potentially dangerous

Tetration—you should know its meaning

It’s in their DNA

When SOC plays second fiddle to NOC, you could be in for an expensive tune

How to protect against Ransomware


Subscribe to our Newsletter

WordPress Image Lightbox