• ABOUT US
  • Advertise With Us
  • Contact US
  • Edit Calendar
IT Magazine for Channel Partners in India | SMEChannels
Advertisement
  • Home
  • News
    • AI & ML
    • Cloud Computing
    • Cyber Security
    • Server & Storage
    • Networking
  • Hardware News
    • Printers & Peripherals
    • Software
  • Events & Webinars
    • Channel Accelerator Awards 2025
    • Channel Accelerator Awards 2024
    • MSP India Summit 2024
    • MSP India Summit 2023
    • Channel Accelerator Awards 2023
    • SME Channels Summit & Awards 2022
    • SME Channels Summit & Awards 2021
    • WEBINAR
    • SME AWARDS 2020
  • Corporate News
  • Interview
  • Executives Movement
  • Partner Corner
No Result
View All Result
  • Home
  • News
    • AI & ML
    • Cloud Computing
    • Cyber Security
    • Server & Storage
    • Networking
  • Hardware News
    • Printers & Peripherals
    • Software
  • Events & Webinars
    • Channel Accelerator Awards 2025
    • Channel Accelerator Awards 2024
    • MSP India Summit 2024
    • MSP India Summit 2023
    • Channel Accelerator Awards 2023
    • SME Channels Summit & Awards 2022
    • SME Channels Summit & Awards 2021
    • WEBINAR
    • SME AWARDS 2020
  • Corporate News
  • Interview
  • Executives Movement
  • Partner Corner
No Result
View All Result
IT Magazine for Channel Partners in India | SMEChannels
No Result
View All Result
Home Cyber Security

Nation-States Exploit Legitimate Credentials to Pose as Insiders: 2024 CrowdStrike Threat Hunting Report

SME Channels by SME Channels
August 21, 2024
in Cyber Security, News

The report reveals an alarming rise in nation-state and eCrime adversaries exploiting legitimate credentials and identities to evade detection and bypass legacy security controls, as well as a rise in hands-on-keyboard intrusions, cross-domain attacks, and cloud control plane exploits

CrowdStrike released the 2024 Threat Hunting Report, highlighting the latest adversary trends, campaigns and tactics based on the frontline intelligence from CrowdStrike’s elite threat hunters and intelligence analysts. The report reveals a rise in nation-state and eCrime adversaries exploiting legitimate credentials and identities to evade detection and bypass legacy security controls, as well as a rise in hands-on-keyboard intrusions, cross-domain attacks, and cloud control plane exploits.

“Our comprehensive, human-led threat hunting directly informs the algorithms that power the AI-native Falcon platform, ensuring that we stay ahead of these evolving threats and continue to deliver the industry’s most effective cybersecurity solutions.”

Adam Meyers, Head of Counter Adversary Operations at CrowdStrike

Key findings include:

  • North Korea-Nexus Adversaries Pose as Legitimate U.S. Employees: FAMOUS CHOLLIMA infiltrated over 100 primarily U.S. technology companies. Leveraging falsified or stolen identity documents, malicious insiders gained employment as remote IT personnel to exfiltrate data and carry out malicious activity.
  • Hands-on-Keyboard Intrusions Increase by 55%: More threat actors are engaging in hands-on-keyboard activities to blend in as legitimate users and bypass legacy security controls. 86% of all hands-on intrusions are executed by eCrime adversaries seeking financial gains. These attacks increased by 75% in healthcare and 60% in technology, which remains the most targeted sector for seven years in a row.
  • RMM Tool Abuse Grows by 70%: Adversaries including CHEF SPIDER (eCrime) and STATIC KITTEN (Iran-nexus) are using legitimate Remote Monitoring and Management (RMM) tools like ConnectWiseScreenConnect for endpoint exploitation. RMM tool exploitation accounted for 27% of all hands-on-keyboard intrusions.
  • Cross-Domain Attacks Persist: Threat actors are increasingly exploiting valid credentials in order to breach cloud environments and eventually using that access to access endpoints. These attacks leave minimal footprints in each of those domains, like separate puzzle pieces, making them harder to detect.
  • Cloud Adversaries Target the Control Plane: Cloud-conscious adversaries like SCATTERED SPIDER (eCrime) are leveraging social engineering, policy changes and password manager access to infiltrate cloud environments. They exploit connections between the cloud control plane and endpoints to move laterally, maintain persistence and exfiltrate data.

 
“For over a decade, we’ve vigilantly tracked the most prolific hacktivist, eCrime, and nation-state adversaries,” said Adam Meyers, Head of Counter Adversary Operations at CrowdStrike. “In tracking nearly 250 adversaries this past year, a central theme emerged—threat actors are increasingly engaging in interactive intrusions and employing cross-domain techniques to evade detection and achieve their objectives. Our comprehensive, human-led threat hunting directly informs the algorithms that power the AI-native Falcon platform, ensuring that we stay ahead of these evolving threats and continue to deliver the industry’s most effective cybersecurity solutions.”

Previous Post

NLB Services invests in GenAI IP-powered SaaS services venture Humanize

Next Post

AN ANTIDOTE TO CYBER ATTACKS

Related Posts

Divesh Agarwal, Founder and CEO, Aumni Techworks
Guest Article

GCCs Need Ownership, Not Just Capability

April 24, 2026
ASUS
Corporate News

ASUS ExpertBook Ultra: Redefining the AI Flagship for India’s Business Elite

April 24, 2026
Yanbing Li, Chief Product Officer at Datadog.
Cyber Security

Datadog Announces GPU Monitoring to Help Businesses Optimize Spend and Performance as They Aim to Scale AI Projects

April 24, 2026
Narinder Kumar
AI & ML

TO THE NEW Achieves Amazon Web Services (AWS) AI Services Competency

April 24, 2026
Kaspersky
Cyber Security

Kaspersky blocked over 50 Lakh web attacks on businesses in India last year

April 23, 2026
Blueprints
AI & ML

SUSE Launches SUSE AI Factory with NVIDIA

April 23, 2026

Print Magazine

About Us

SMEChannels is a leading IT Channel magazine, which represents the voice of more than 32,000 partners in India. The focus is to work towards the growth of the entire channel ecosystem. Therefore, the magazine covers all the topics that are relevant to the partner ecosystem. Broadly we cover technologies that go as solutions and services. Therefore, the topics we cover include cloud computing, big data & analytics, security, surveillance, mobility, enterprise applications, data center, 3D printing, robotics, machine learning, IOT, etc.

Contact Us

For Editorial:
Sanjay Mohapatra, Group Editor
Email : sanjay@accentinfomedia.com
Phone No. +91 99100 97969
Manash Ranjan Debata, Editor
Email : manash@accentinfomedia.com

For Print and Online Advertisement :

Rhythm
Email :info@accentinfomedia.com
Phone No. +917042031678

For Events and Webinar:
Sanjib Mohapatra, Director
Email : sanjib@accentinfomedia.com

Usefull Links

  • ABOUT US
  • Advertise With Us
  • Contact US
  • Edit Calendar
  • ABOUT US
  • Advertise With Us
  • Contact US
  • Edit Calendar

@2026 Powered By SMEChannels Theme By Accent Info Media

No Result
View All Result
  • Home
  • News
    • AI & ML
    • Cloud Computing
    • Cyber Security
    • Server & Storage
    • Networking
  • Hardware News
    • Printers & Peripherals
    • Software
  • Events & Webinars
    • Channel Accelerator Awards 2025
    • Channel Accelerator Awards 2024
    • MSP India Summit 2024
    • MSP India Summit 2023
    • Channel Accelerator Awards 2023
    • SME Channels Summit & Awards 2022
    • SME Channels Summit & Awards 2021
    • WEBINAR
    • SME AWARDS 2020
  • Corporate News
  • Interview
  • Executives Movement
  • Partner Corner

@2026 Powered By SMEChannels Theme By Accent Info Media