{"id":79811,"date":"2018-01-23T09:00:13","date_gmt":"2018-01-23T17:00:13","guid":{"rendered":"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/?p=79811"},"modified":"2023-05-15T23:07:43","modified_gmt":"2023-05-16T06:07:43","slug":"overview-of-rapid-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/01\/23\/overview-of-rapid-cyberattacks\/","title":{"rendered":"Overview of rapid cyberattacks"},"content":{"rendered":"
Rapid cyberattacks like Petya and WannaCrypt have reset our expectations on the speed and scope of damage that a cyberattack can inflict. The Microsoft Enterprise Cybersecurity Group Detection and Response team worked extensively to help customers respond to and recover from these kinds of attacks. In 2017, among the global enterprise customers that we worked with, these rapid cyberattacks took down most or all IT systems in just about one hour, resulting in $200M – 300M USD of damage at several customers. [1]<\/a><\/p>\n Attackers assembled several existing techniques into a new form of attack that was both:<\/p>\n Rapid cyberattacks are fast, automated, and disruptive\u2014setting them apart from the targeted data theft attacks and various commodity attacks, including commodity ransomware, that security programs typically encounter:<\/p>\n <\/p>\n Figure 1: Characteristics of rapid cyberattacks<\/em><\/p>\n From a technical perspective, this represents the near-worst case technical risk, and resulting business risk, from a cybersecurity attack. While many of us in cybersecurity have grown accustomed to and jaded with sales presentations describing \u201cdoomsday scenario\u201d tactics, these attacks indisputably represent real world cases of mass business impact on organizations.<\/p>\n For many of the Petya victims, most or all their computers were taken down in about one hour (~62,000 servers and workstations in a global network, in one case). In these customer environments where our incident response teams were engaged, many critical business operations came to a full stop while the IT team recovered systems.<\/p>\n From a business perspective, some organizations suffered losses in the range $200M – 300M USD and had to change the operating results they reported to shareholders. Note that the actual level of business impact can vary by industry, organization size, existing risk management controls, and other factors. However, it\u2019s clear that the monetary and resource impacts from rapid attacks can be significant.<\/p>\n Petya differed from several accepted attack norms, taking many defenders by surprise. Here are four of the ways it did so:<\/p>\n <\/p>\n Figure 2: What made Petya different<\/em><\/p>\n Look out for the next blog post of a 3-part series to learn how Petya works and key takeaways.<\/p>\n [1]<\/a> https:\/\/www.enterprisemobilityexchange.com\/news\/notpetya-cyber-attack-costs-maersk-at-least-200m<\/a><\/p>\n","protected":false},"excerpt":{"rendered":" Rapid cyberattacks like Petya and WannaCrypt have reset our expectations on the speed and scope of damage that a cyberattack can inflict. The Microsoft Enterprise Cybersecurity Group Detection and Response team worked extensively to help customers respond to and recover from these kinds of attacks. In 2017, among the global enterprise customers that we worked […]<\/p>\n","protected":false},"author":61,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3662],"topic":[3674,3688],"products":[],"threat-intelligence":[],"tags":[3753,3822],"coauthors":[1906],"class_list":["post-79811","post","type-post","status-publish","format-standard","hentry","content-type-news","topic-incident-response","topic-threat-trends","tag-cybersecurity-policy","tag-microsoft-security-insights"],"yoast_head":"\n\n
What is a rapid cyberattack?<\/h2>\n
\n
What are the technical and business impacts of a rapid cyberattack?<\/h2>\n
What makes rapid cyberattacks different from other attacks?<\/h2>\n
\n
More information<\/h2>\n
To learn more about rapid cyber attacks and how to protect against them, watch the on-demand webinar: Protect Against Rapid Cyberattacks (Petya [aka NotPetya], WannaCrypt, and similar)<\/a>.<\/h4>\n
\n