• About
  • Subscribe
  • Contact
Monday, May 4, 2026
  • Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
FutureCISO
No Result
View All Result
Home FutureCISO Process Cyber risk management

Internet-facing systems remain attackers’ main door

by FutureCISO Editors
May 4, 2026
Internet-facing systems remain attackers’ main door

Photo by Cup of Couple from Pexels: https://www.pexels.com/photo/person-typing-on-a-laptop-6633283/

Share on FacebookShare on Twitter

Darktrace has released new research suggesting that Chinese-nexus cyber operations are evolving from event-driven breaches into longer-term campaigns aimed at establishing persistent access to strategically important systems.

In the company’s report, Crimson Echo: Understanding Chinese-nexus Cyber Tradecraft Through Behavioral Analysis, Darktrace frames cyber activity not primarily as short, disruptive intrusions, but as a form of sustained “long-term strategic statecraft”.

The findings are based on Darktrace’s analysis of three years of data across its customer base, covering activity from July 2022 to September 2025. Darktrace reports that 88% of observed incidents targeted organisations in critical infrastructure sectors, including transportation, telecommunications, healthcare and manufacturing.

The report also states that nearly 63% of compromises began with exploitation of internet-facing systems, reinforcing the idea that exposed digital infrastructure continues to serve as a common entry point.

According to Darktrace, a key change in how cyber risk should be understood is that many operations appear designed to remain inside. “Many cyber operations are no longer just about breaking in and stealing data or causing short-term disruptions, they are about staying in,” said Nathaniel Jones, vice president of security & AI strategy at Darktrace.

He added that defenders must “move beyond incident response and focus on detecting subtle behavioral changes that could indicate a long-term compromise.”

Darktrace describes two operational models that Chinese-nexus actors reportedly use. The first, dubbed “Smash and Grab”, is characterised as a short-horizon approach: fast intrusions optimised for speed and scale, with a median dwell time of around 10 days and exfiltration often occurring within 48 hours.

Related:  Cohesity enhances data security offerings to address cyber resilience in the AI era

The second, “Low and Slow”, is positioned as a long-horizon method, emphasising covert persistence, identity control, legitimate administrative tooling, and dormancy that can last months or even years in critical infrastructure environments.

Importantly, Darktrace argues that the two models are not mutually exclusive. It suggests the same operational ecosystem may employ both tactics depending on target value, urgency and the intended access—meaning that observing short-horizon behaviour does not automatically indicate a lack of tradecraft capability.

The report also highlights the geographic emphasis on Western economies, stating that over half of observed activity affected the U.S. and major European countries, with the U.S. accounting for 22.5% of cases.

Darktrace’s overall message is that risk management should shift from focusing solely on preventing breaches to understanding what access may already exist, how long it has been present, and what it enables over time.

“Organisations need to rethink what risk looks like,” Jones added. “It’s not just about preventing breaches, it’s about understanding who may already have access, how long they’ve had it, and what that access enables over time.”

Tags: behavioural analysisChinese-nexus cyber tradecraftcritical infrastructure cyber riskDarktracepersistent access threat detection

FutureCISO Editors

No Result
View All Result

Recent Posts

  • Internet-facing systems remain attackers’ main door
  • Analyst feedback improves threat detection loop
  • PodChats for FutureCISO: Quantum-safe communication without disrupting your security
  • Hiring pushback slows cybersecurity staffing
  • Visibility gaps worsen as AI expands APIs

Categories

  • AI and Machine Learning
  • Artificial Intelligence
  • Blogs
  • CHRO
  • CISO
  • CISO strategies
  • Cloud, Platforms and Ecosystems
  • Cloud, Virtualization, Operating Environments and Middleware
  • Compliance and Governance
  • Compliance and Governance
  • Compliance and Governance|People
  • Compliance and Governance|Technology
  • Computer, Storage, Networks, Connectivity
  • Culture and Behaviour
  • Culture and Behaviour|People
  • Cyber risk management
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity careers
  • Cybersecurity operations
  • Cybersecurity operations
  • Data Protection
  • Data Protection
  • Endpoint Security
  • Future Workplace
  • FutureCISO
  • Governance, Risk and Compliance
  • Governance, Standards and Regulations
  • HR, education and Training
  • Incident Response
  • IT-OT integration
  • Network Security
  • Operations
  • People
  • Process
  • Remote work
  • Resources
  • Risk Management
  • Risk Management
  • Security
  • Tactics and Strategies
  • Technology
  • Training and awarenes
  • Videos
  • Vulnerabilities and threats
  • Vulnerabilities and threats
  • Webcasts/Podcasts
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

[wpli_login_link]

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
  • Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl