-

CrowdStrike 2023 Threat Hunting Report Reveals Identity-Based Attacks and Hands-on-Keyboard Activity on the Rise as Adversaries Look to Bypass Defenses

A 583 percent increase in Kerberoasting identity attacks and 3x spike in malicious use of legitimate RMM tools take center stage, while adversary breakout time hits a record low

AUSTIN, Texas & LAS VEGAS--(BUSINESS WIRE)--BLACK HAT USA -- CrowdStrike (Nasdaq: CRWD), today announced the release of the CrowdStrike 2023 Threat Hunting Report. The company’s sixth annual edition of the report, which covers attack trends and adversary tradecraft observed by CrowdStrike’s elite threat hunters and intelligence analysts, revealed a massive increase in identity-based intrusions, growing expertise by adversaries targeting the cloud, a 3x spike in adversary use of legitimate remote monitoring and management (RMM) tools, and a record low in adversary breakout time.

Covering adversary activity between July 2022 and June 2023, the report is the first to be published by CrowdStrike’s newly unveiled Counter Adversary Operations team, which was officially announced this week at Black Hat USA 2023.

Key findings from the report include:

  • 583% increase in Kerberoasting identity attacks highlight massive escalation in identity-based intrusions: CrowdStrike found an alarming nearly 6x year-over-year (YoY) spike in Kerberoasting attacks, a technique adversaries can abuse to obtain valid credentials for Microsoft Active Directory service accounts, often providing actors with higher privileges and allowing them to remain undetected in victim environments for longer periods of time. Overall, 62% of all interactive intrusions involved the abuse of valid accounts, while there was a 160% increase in attempts to gather secret keys and other credentials via cloud instance metadata APIs.
  • 312% YoY increase in adversaries leveraging legitimate RMM tools: Giving further credence to reports from CISA, adversaries are increasingly using legitimate and wellknown remote IT management applications to avoid detection and blend into the noise of the enterprise in order to access sensitive data, deploy ransomware or install more tailored follow-on tactics.
  • Adversary breakout time hits an all time low of 79 minutes: The average time it takes an adversary to move laterally from initial compromise to other hosts in the victim environment fell from the previous all time low of 84 minutes in 2022 to a record 79 minutes in 2023. Additionally, the fastest breakout time of the year was recorded at just seven minutes.
  • The financial industry saw a stunning 80% YoY increase in interactive intrusions: Defined as intrusions that use hands-on keyboard activity, interactive intrusions were up 40% overall.
  • Access Broker advertisements increase by 147% on criminal or underground communities: Ready access to valid accounts for sale lowers the barrier to entry for eCrime actors looking to conduct criminal operations, and allow established adversaries to hone their post-exploitation tradecraft to achieve their objectives with more efficiency.
  • 3x increase in adversary use of Linux privilege-escalation tool to exploit cloud environments: CrowdStrike witnessed a threefold increase in Linux tool linPEAS, which adversaries use to gain access to cloud environment metadata, network attributes, and various credentials that they can then exploit.

“In our tracking of over 215 adversaries in the past year, we have seen a threat landscape that has grown in complexity and depth as threat actors pivot to new tactics and platforms, such as abusing valid credentials to target vulnerabilities in the cloud and in software,” said Adam Meyers, head of Counter Adversary Operations at CrowdStrike. “When we talk about stopping breaches, we cannot ignore the undeniable fact that adversaries are getting faster and they are employing tactics intentionally designed to evade traditional detection methods. Security leaders need to ask their teams if they have the solutions required to stop lateral movement from an adversary in just seven minutes.”

Additional Resources

About CrowdStrike

CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with one of the world’s most advanced cloud-native platforms for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data.

Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.

Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.

CrowdStrike: We stop breaches.

Learn more: https://www.crowdstrike.com/
Follow us: Blog | Twitter | LinkedIn | Facebook | Instagram
Start a free trial today: https://www.crowdstrike.com/free-trial-guide/

© 2023 CrowdStrike, Inc. All rights reserved. CrowdStrike, the falcon logo, CrowdStrike Falcon and CrowdStrike Threat Graph are marks owned by CrowdStrike, Inc. and registered with the United States Patent and Trademark Office, and in other countries. CrowdStrike owns other trademarks and service marks, and may use the brands of third parties to identify their products and services.

Contacts

Kevin Benacci
CrowdStrike Corporate Communications
press@crowdstrike.com

CrowdStrike

NASDAQ:CRWD

Release Versions

Contacts

Kevin Benacci
CrowdStrike Corporate Communications
press@crowdstrike.com

More News From CrowdStrike

CrowdStrike Fal.Con Gov Accelerates National Cyber Defense in the AI Threat Era

AUSTIN, Texas--(BUSINESS WIRE)--CrowdStrike (NASDAQ: CRWD) today announced Fal.Con Gov 2026 is taking place March 18 in Washington, D.C. Fal.Con Gov gathers government security leaders to advance strategy, operational execution, and AI-driven defense to protect the nation’s most critical systems. Now in its third year, this must-attend event brings together senior policymakers, national security, defense, and public sector cybersecurity leaders, including White House National Cyber Director Sea...

CrowdStrike FalconID Extends Risk-Aware Identity Security to Multi-Factor Authentication

AUSTIN, Texas--(BUSINESS WIRE)--CrowdStrike (NASDAQ: CRWD) today announced the general availability of FalconID, extending the Falcon® platform with zero-friction, phishing-resistant MFA. Identity is the front line of modern attacks, and this release advances CrowdStrike’s Next-Gen Identity Security leadership with real-time, risk-aware protection against AI-accelerated phishing attacks and credential abuse at the point of authentication. With an intelligent security fabric spanning the identit...

VAST Data and CrowdStrike Partner to Establish a Unified Security Model for the AI Lifecycle

AUSTIN, Texas & SALT LAKE CITY--(BUSINESS WIRE)--VAST Forward – Today at VAST Forward 2026, VAST Data, the AI Operating System company, and CrowdStrike (NASDAQ: CRWD) announced a strategic partnership that combines VAST’s native data-layer governance and platform-level controls with CrowdStrike’s enterprise-grade threat detection and automated response. By integrating these capabilities within the VAST AI Operating System and connecting telemetry with the CrowdStrike Falcon® cybersecurity platf...
Back to Newsroom