FireEye Report: 53% of attacks successfully infiltrate environments without detection

FireEye has released the Mandiant Security Effectiveness Report 2020 which reveals data about how well organizations are protecting themselves against cyber threats and the overall effectiveness of their security infrastructure.

The report summarizes the results of thousands of tests performed by experts from the Mandiant Security Validation (previously known as Verodin) team. The tests consisted of real attacks, specific malicious behaviors, and actor-attributed techniques and tactics run in enterprise-level production environments representing 11 industries against 123 market-leading security technologies — including network, email, endpoint, and cloud solutions. The report reveals that while organizations continue to invest significant budget dollars in security controls and assume that this means assets are fully protected, the reality is that a majority of the tested attacks successfully infiltrated the organizations’ production environments without their knowledge. Additionally, the report includes guidance to help organizations ensure that their security controls perform as expected by implementing a strategy that includes continuous security validation.

A Snapshot of Security Effectiveness Challenges

In the tests, 53% of attacks successfully infiltrated environments without detection. 26% of attacks successfully infiltrated environments but were detected, while 33% of attacks were prevented by security tools. Alerts for only 9% of attacks were generated, demonstrating that most organizations and their security teams do not have the visibility they need into serious threats, even when they use central SIEM, SOAR and analysis platforms.

In conducting its analysis, the Mandiant Security Validation team observed that the most common reasons for poor optimization of organizations’ security tools were:
• Deployed under default “out-of-the-box” configurations
• Lack of resources to tune and tweak post-deployment
• Security events not making it to the SIEM
• Inability to force controls testing
• Unexpected changes or drift in the underlying infrastructure

The report also takes a deeper look into techniques and tactics used by attackers and outlines the primary challenges most commonly uncovered in enterprise environments through security validation and conducting testing:

Reconnaissance: In testing network traffic, organizations reported only 4% of reconnaissance activity generated an alert
Infiltrations & Ransomware: 68% of the time, organizations reported their controls did not prevent or detect the detonation within their environment
Policy Evasion: 65% of the time, security environments were not able to prevent or detect the approaches being tested
• Malicious File Transfer: 48% of the time, controls in place were not able to prevent or detect the delivery and movement of malicious files
Command & Control: 97% of the behaviors executed did not have a corresponding alert generated in the SIEM
Data Exfiltration: Exfiltration techniques and tactics were successful 67% of the time during initial testing
• Lateral Movement: 54% of the techniques and tactics used to execute testing of lateral movement were missed

In addition to the above insights and most likely underlying causes of each issue, the Mandiant Security Effectiveness Report 2020 offers real-world examples that demonstrate the negative impact these performance gaps have caused in various industry sectors.

Related posts

IBM Study: More Companies Turning to Open-Source AI Tools to Unlock ROI

RUCKUS Wi-Fi 6 Solution Improves Campus Experience for Amrita University

Team Computers Launches Global Delivery Center in Uttarakhand to Transform Rural India

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More