After a breach, a quarter of most firms don't know how the attackers got in Credit: Vijay S The majority of large companies have experienced a breach over the past twelve months, but almost a quarter, 23 percent, of firms do not know how the hackers got in, according to a new survey.“That was pretty eye-opening,” said Tim Helming, director of product management at DomainTools, the company that sponsored the research. “If you don’t know how it got onto your network, you can’t protect against it.”Of the firms who did know how the attackers got in, 67 percent said that malware had infiltrated their networks through email, 63 percent named web surfing as a vector of infection, 12 percent cited cloud apps or social media, and 4 percent pointed to instant messaging.Helming said that there are things companies can do to analyze malware in a secure lab environment. “You can intentionally take apart the malware and look inside and it and find information like domains in there that you can use to continue your investigation,” he said.One reason that so many companies could not spot the channel through which malware got into their network was that almost half, or 46 percent, of all organizations surveyed did not have a threat intelligence solution in place. The most frequent reason sited was that the cyberthreats they had experienced have not been serious enough, according to an Osterman Research survey of 120 security and business executives at large companies.Another 36 percent said that the cost of the technology is too high.But threat intelligence is a broad category, said DomainTools CEO Tim Chen. It covers everything from free Web-based, open-sourced data that’s available to anyone who can find it to threat intelligence platforms that are sold independently or are embedded in bigger solutions or SIEM products.“When people complain that it’s expensive and they can’t afford it, they’re talking about some of these more sophisticated platforms,” said Chen.But even free or low-cost resources can be useful for investigators trying to analyze a threat.For example, according to Helming, identifying a piece of malware can tell a company about who the attackers are. “Then often you can find information about what their MO is,” he said. “Such as, this attack group spreads malware through phishing attacks. Or this group tries to send downloadable malware files as email attachments.”That can help a company zero in on the attackers’ access point.A toe-hold can start with something as small as a domain name, he said.Using online domain lookup tools, investigators can often tell if it’s a legitimate domain hijacked by criminals, or a domain associated with other nefarious organizations and activities. “That can help close that visibility gap,” he said.According to the Osterman report, this kind of painstaking manual investigation can take weeks — and isn’t worth the hassle for smaller incursions.And that could be be a problem.“We’ve all seen that the leading edge of a very serious breach might look like something that’s not a big deal,” said Chen.“However, current-generation tools make the process of attack attribution much more cost effective,” said the report.Security researchers understand the value of threat intelligence, Helming said.According to the survey, 82 percent said they would use it all the time if it was available to them. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe