Skip to Content
Computing

Russian hackers are eight times faster than North Korean groups

February 19, 2019

Russian hackers are way ahead of the next-fastest state-sponsored hackers, North Korea, who themselves are nearly twice as fast as Chinese groups, according to a new report by US cybersecurity firm Crowdstrike.

“Breakout time”: Speed is one of the most important factors within cybersecurity today, according to the company’s CTO, Dmitri Alperovitch, making it a good proxy for operational sophistication and tradecraft. As a result, Crowdstrike decided to create a new measurement it calls “breakout time”—the time it takes for an intruder to get beyond the initial point of entry to reach other systems in the network to steal data. In 2018, average breakout time was 4 hours and 37 minutes. Crowdstrike drew the data from the 30,000 breach attempts it managed to derail across its customer base. (The report didn’t include data on US-sponsored hacks.)

The rankings: The report compared four nation-states—Russia, China, Iran, and North Korea—and organized criminal groups (consolidated into a single category) by breakout time and found the following averages:

  • Russia: 18 minutes and 49 seconds
  • North Korea: 2 hours and 20 minutes
  • China: 4 hours
  • Iran: 5 hours and 9 minutes
  • Organized criminal groups: 9 hours and 42 minutes

The significance: Cybersecurity will always be an arms race between attackers and defenders. As intrusions get detected and stopped faster than ever, attackers have had to up their game, too. It isn’t a shock to security experts that Russia is top of the list, but the extent to which it’s so far ahead speaks volumes as to how good their government-sponsored hacking teams are at digital forms of breaking and entering.

Deep Dive

Computing

child outside a destroyed residential building in Kiev
child outside a destroyed residential building in Kiev

Russia hacked an American satellite company one hour before the Ukraine invasion

The attack on Viasat showcases cyber’s emerging role in modern warfare.

hacked telecom concept
hacked telecom concept

Chinese hackers exploited years-old software flaws to break into telecom giants

A multi-year hacking campaign shows how dangerous old flaws can linger for years.

stock image of robots in a car plant
stock image of robots in a car plant

Transforming the automotive supply chain for the 21st century

Cloud-based tech solutions are helping manufacturers manage a new ecosystem of suppliers with greater agility and resilience.

Stay connected

Illustration by Rose WongIllustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.