Poll: Hackers say it takes less than 12 hours to breach systems

Poll: Hackers say it takes less than 12 hours to breach systems
© Getty Images

The vast majority of hackers claim that they can compromise your cyber systems in less than 12 hours, according to a new survey.

Eighty-eight percent of professional hackers surveyed by Australia-based cybersecurity company Nuix said they can hack into a targeted system in less than half a day.

More than 4 in 10 hackers claimed to be able to breach a system within six hours and 17 percent in less than two hours, according to the company’s “Black Report” released on Friday.

ADVERTISEMENT
Nuix compiled the findings from interviews with “known hackers,” or professional penetration testers, during Black Hat USA and DEFCON 24 last year. The survey also found the most popular method for penetrating a system to be direct server attacks, followed by phishing attacks. 

Half of hacker respondents said that they change their attack methodologies with each target.

The results of the survey come amid heightened concerns about hacking campaigns by nation states and other hostile actors in the wake of Russian cyberattacks targeting the Democratic National Committee and former Democratic presidential nominee Hillary ClintonHillary Diane Rodham ClintonBiden slams Trump over golf gif hitting Clinton Overnight Cybersecurity: Equifax hit by earlier hack | What to know about Kaspersky controversy | Officials review EU-US privacy pact Overnight Tech: Equifax hit by earlier undisclosed hack | Facebook takes heat over Russian ads | Alt-right Twitter rival may lose domain MORE's campaign chairman, John Podesta.

Federal government and private sector computer systems alike have been the target of cyber intrusions, including the massive data breach of the Office of Personnel Management revealed in 2015 and a pair of security breaches disclosed by Yahoo last year.

The U.S. government is currently grappling with how to boost cybersecurity of its computer systems and critical infrastructure, as well as how to respond to cyberattacks and acts of cyber crime and espionage.