DEV Community

Cover image for Where do long-dwell attackers hide inside modern networks?
Richard Chamberlain
Richard Chamberlain

Posted on

Where do long-dwell attackers hide inside modern networks?

🧠 Discussion post

Many major breaches weren’t flashy zero-days — they were long-dwell intrusions where an attacker lived quietly inside the network for months or even years.

For anyone managing infrastructure or doing security work:

What’s the biggest blind spot that lets attackers stay undetected for so long?

Here are a few ideas I’ve heard from practitioners:

  • 🔍 Limited visibility or incomplete telemetry
  • 👥 Weak identity / credential hygiene
  • 🌐 Flat or poorly segmented networks
  • 📜 Incomplete or tamperable logging
  • 🧠 Or maybe something completely different?

I’m exploring how containment and audit automation could shorten dwell time — still in the probing phase and looking to learn from real experiences.

If you’ve seen long-dwell attacks first-hand, or built monitoring/segmentation that actually worked, I’d love to hear what made the difference.

👉 Drop a comment with your observations or favorite tools — I’ll summarize the best insights in a follow-up post.


Tags: #cybersecurity #zerotrust #linux #devops #discussion

Top comments (0)