The Channel logo


By | John Leyden 8th June 2016 09:58

Cyber burglars love to pillage Euro businesses they've pwned before

Hackers stay longer in compromised EMEA networks - Mandiant

Traditional methods including spear phishing and social engineering still account for more than a third of hacker attacks.

A new study by Mandiant reports that many hacked European organisations are re–compromised within months of an initial attack, in a similar way to how burglars revisit homes and offices they’ve already successfully robbed. Outdated "forensic" or "follow the breadcrumbs" approaches – used by some in the US a decade ago - means many European organisation are missing threats on their networks.

Breach notifications from external agencies are very low, indicating that businesses cannot rely on local governments to detect and alert them about a breach. Fewer than one in eight (12 per cent) of breach notifications in EMEA last year came from an external source, FireEye/Mandiant reports.

While organisations discovered breaches internally 88 per cent of the time, this often came too late in the process.

FireEye’s incident response business further reports the mean "dwell time" for breaches in EMEA is 469 days, versus 146 globally. ®

comment icon Read 5 comments on this article or post a comment alert Send corrections


Baby looks taken aback/shocked/affronted. Photo by Shutterstock

Kat Hall

Plans for 2 million FTTP connections in next four years 'not enough'
Microsoft CEO Satya Nadella

Chris Mellor

Thousands of layoffs announced as spinning rust enters its death spiral


Locker room jocks photo via Shutterstock
Best locker-room strategy: Avoid emulating AWS directly
STRASBOURG, JUNE 29, 2016: The seat of the European Parliament. by Marco Aprile for shutterstock. EDITORIAL USE ONLY
Plan b, image via Shutterstock
EU workers, new markets: post-Brexit pressure on May & Co
Tough question, pic via Shutterstock