Find them. Know them. Stop them.
Discover the adversaries targeting your industry.

Your Personalized Threat Landscape
Today’s threat actors are smarter, more sophisticated, and more well resourced than they have ever been. Only by understanding them can you remain one step ahead of today’s increasingly relentless adversaries.
Adversaries targeting you:
Featured Cloud-Conscious Adversaries
eCrime Index (ECX)
61.52
The eCrime ecosystem is an active and diffuse economy of financially motivated entities who engage in myriad criminal activities in order to generate revenue. With the eCrime Index (ECX), CrowdStrike’s Intelligence team maintains a composite score to track changes to this ecosystem, including changes in eCrime activity, risk and related costs.


Recommended solution:
CrowdStrike Falcon® Complete stops breaches on endpoints, workloads, and identities, with expert management, threat hunting, monitoring and remediation, and is backed by CrowdStrike’s Breach Prevention Warranty. *
This includes:
- Proactive platform management
- 24/7 monitoring
- Operated by experts
- Investigates all detections: critical, high, med, low
- 24/7 continuous threat hunting-based protection
- Proactive surgical remediation
- Backed by breach prevention warranty
Recommended solution:
CrowdStrike Falcon® Complete stops breaches on endpoints, workloads, and identities, with expert management, threat hunting, monitoring and remediation, and is backed by CrowdStrike’s Breach Prevention Warranty. *
This includes:
- Proactive platform management
- 24/7 monitoring
- Operated by experts
- Investigates all detections: critical, high, med, low
- 24/7 continuous threat hunting-based protection
- Proactive surgical remediation
- Backed by breach prevention warranty
Recommended solution:
CrowdStrike Falcon® Complete stops breaches on endpoints, workloads, and identities, with expert management, threat hunting, monitoring and remediation, and is backed by CrowdStrike’s Breach Prevention Warranty. *
This includes:
- Proactive platform management
- 24/7 monitoring
- Operated by experts
- Investigates all detections: critical, high, med, low
- 24/7 continuous threat hunting-based protection
- Proactive surgical remediation
- Backed by breach prevention warranty
Recommended solution:
This includes:
- Proactive platform management
- 24/7 monitoring
- Operated by experts
- Investigates all detections: critical, high, med, low
- 24/7 continuous threat hunting-based protection
- Proactive surgical remediation
- Backed by breach prevention warranty

33
new adversaries introduced by CrowdStrike Intel in 2022; now tracking 200+ total adversaries
84 min.
average eCrime breakout time — down from 98 minutes in 2021
112%
increase in access broker advertisements on the dark web
71%
of attacks detected were malware-free (up from 62% in 2021)
50%
increase in interactive intrusions (hands-on-keyboard activity) in 2022 (compared to 2021)
95%
increase in cloud exploitation in 2022; 3x increase in 'cloud-conscious' threat actors
- CrowdStrike Global Threat Report, 2023Stopping breaches requires an understanding of the adversary, including their motivations, techniques and how they’re going to target your organization.
* Breach Prevention Warranty: Not available in all locations, see FAQ here for additional information.
Defend your business with precision
Unlock your custom threat landscape

Your Personalized Threat Landscape
Today’s threat actors are smarter, more sophisticated, and more well resourced than they have ever been. Only by understanding them can you remain one step ahead of today’s increasingly relentless adversaries.