DEV Community

Cover image for Where do long-dwell attackers hide inside modern networks?
Richard Chamberlain
Richard Chamberlain

Posted on

Where do long-dwell attackers hide inside modern networks?

๐Ÿง  Discussion post

Many major breaches werenโ€™t flashy zero-days โ€” they were long-dwell intrusions where an attacker lived quietly inside the network for months or even years.

For anyone managing infrastructure or doing security work:

Whatโ€™s the biggest blind spot that lets attackers stay undetected for so long?

Here are a few ideas Iโ€™ve heard from practitioners:

  • ๐Ÿ” Limited visibility or incomplete telemetry
  • ๐Ÿ‘ฅ Weak identity / credential hygiene
  • ๐ŸŒ Flat or poorly segmented networks
  • ๐Ÿ“œ Incomplete or tamperable logging
  • ๐Ÿง  Or maybe something completely different?

Iโ€™m exploring how containment and audit automation could shorten dwell time โ€” still in the probing phase and looking to learn from real experiences.

If youโ€™ve seen long-dwell attacks first-hand, or built monitoring/segmentation that actually worked, Iโ€™d love to hear what made the difference.

๐Ÿ‘‰ Drop a comment with your observations or favorite tools โ€” Iโ€™ll summarize the best insights in a follow-up post.


Tags: #cybersecurity #zerotrust #linux #devops #discussion

Top comments (0)