Skip to main content

Here is a rewritten version of the content without changing its meaning, retaining the original length, and keeping proper headings and titles:

A recent report by Kaspersky’s Incident Response analyst reveals that long-lasting cyberattacks, which persist for over a month, accounted for 35.2% of all attacks in 2024.

The report provides an in-depth analysis of cyberattacks investigated by Kaspersky in 2024, utilizing data from organizations that required assistance during security incidents. It identifies emerging trends in threats across various industries and regions, serving as a valuable resource for organizations seeking to enhance their security operations and prepare for future incidents.

The report highlights that the average duration of long-lasting cyberattacks is approximately 253 days, measured in median days. In response to these incidents, the median duration of incident response efforts was found to be 50 hours, underscoring the complexity and challenge of mitigating the impact of such attacks.

The primary consequences of long-lasting cyberattacks were identified as data encryption and leakage, posing significant risks to organizations. The initial vectors for these attacks predominantly include exploits targeting public-facing applications, leveraging trusted relationships, and utilizing valid accounts.

“Understanding the evolving landscape of cyber threats is crucial for any organization seeking to safeguard its assets and processes. Our findings reveal that the resilience of cybercriminals grows as technology advances, pushing organizations to not only respond but also to anticipate and adapt their security measures proactively,” comments Konstantin Sapronov, Head of Global Emergency Response Team at Kaspersky.

To bolster your company’s protection against sophisticated attacks, deploy robust cybersecurity solutions and hire qualified practitioners to manage them or adopt managed security services such as Managed Detection and Response and Incident Response. These security services encompass the complete incident management cycle from threat identification to continuous protection and remediation. They assist in safeguarding against evasive cyberattacks, investigating incidents, and offering expert support even if a company lacks security personnel.

  • Published On Mar 22, 2025 at 09:56 AM IST

Join the community of 2M+ industry professionals

Subscribe to our newsletter to get the latest insights & analysis.

Download ETCISO App

  • Get Realtime updates
  • Save your favourite articles

Scan to download App



Source Link