CrowdStrike Finds Rising Identity-Based Attacks in 2023

CrowdStrike Finds Rising Identity-Based Attacks in 2023

By Stefania Viscusi

CrowdStrike has announced the findings of its 2023 Threat Hunting Report offering insights into the evolving landscape of cyber threats and adversary strategies. The report uncovered a surge in identity-based attacks and criminals increasingly targeting cloud environments.

There is also a notable threefold increase in legitimate remote monitoring and management (RMM) tool usage by adversaries, and a record-low adversary breakout time. This is the average time it takes an adversary to move laterally from initial compromise to other hosts in the victim environment. An all-time record has been set - from 84 minutes in 2022 to a new record low of 79 minutes in 2023. Impressively, the swiftest breakout recorded was a brief seven minutes.

The report looked at data from July 2022 to June 2023, and its results emphasize the heightened complexity and sophistication of today's threat landscape. As threat actors are shifting to novel tactics and platforms, it has become critical for security leaders to evaluate whether their solutions can thwart these criminals quickly enough.

Another particularly significant finding in the report is the shift towards leveraging valid credentials to exploit vulnerabilities within cloud systems and software.

There was a striking 83% surge in Kerberoasting identity attacks and showcases a significant uptick in identity-focused breaches. This method enables adversaries to exploit Microsoft Active Directory service accounts to secure valid credentials, often granting them elevated privileges and enabling stealthy presence within targeted environments for extended durations.

There was also a 160% increase in efforts to gather secret keys and other credentials through cloud instance metadata APIs.

Adam Meyers, the head of Counter Adversary Operations at CrowdStrike, underscored the speed at which adversaries are operating and the intentional avoidance of conventional detection methods.

“When we talk about stopping breaches, we cannot ignore the undeniable fact that adversaries are getting faster and they are employing tactics intentionally designed to evade traditional detection methods. Security leaders need to ask their teams if they have the solutions required to stop lateral movement from an adversary in just seven minutes.”

For organizations, this means staying on top of any evolving tactics and deploying adaptive measures that can work to defend against these sophisticated threats.




Edited by Greg Tavarez
Get stories like this delivered straight to your inbox. [Free eNews Subscription]
SHARE THIS ARTICLE
Related Articles

Foxit Brings AI to Document Analysis with New Research Agent

By: Erik Linask    7/3/2025

PDF and eSignature solutions provider unveils an intelligent tool designed to transform how users extract actionable insights from dense, complex docu…

Read More

OpenMSP Brings New Profitability to MSPs Driving an Open Source Revolution

By: Erik Linask    7/3/2025

OpenMSP, a community-driven platform seeks to liberate MSPs from unsustainable software licensing costs by leveraging open-source alternatives and AI-…

Read More

TD SYNNEX's Apptium Acquisition a Win for MSPs.

By: Erik Linask    7/3/2025

TD SYNNEX's acquisition of Apptium will simplify complexities of the XaaS, economy, offering MSPs new agility, accelerated time to revenue, and stream…

Read More

Real Estate Forecast 2025: Emerging Developments and Market Shifts

By: Contributing Writer    7/1/2025

Buying or selling property can be challenging. Rising mortgage rates and fluctuating home prices leave many uncertain about their next move. Business …

Read More

Protecting Business Assets with Smarter Security Frameworks

By: Contributing Writer    7/1/2025

Protecting your business is more challenging than ever. Cyber threats are increasing every day. Hackers target small and large businesses alike, searc…

Read More