Bitdefender Unveils 45-Day Plan to Secure Organizations from Internal Cyber Threats

Unveiling Hidden Threats: A 45-Day Journey to Secure Your Organization’s Tools

In the realm of cybersecurity, the most insidious threats often masquerade as routine administrative activities. Tools like PowerShell, WMIC, netsh, Certutil, and MSBuild, integral to daily IT operations, have become the preferred instruments for cyber adversaries. A comprehensive analysis by Bitdefender of 700,000 high-severity incidents revealed that 84% involved the misuse of legitimate tools.

Recognizing this pervasive issue, Bitdefender introduced the Internal Attack Surface Assessment—a 45-day, low-effort engagement designed for organizations with 250 or more employees. This initiative aims to transform the abstract challenge of living off the land into a concrete, prioritized list of users, endpoints, and tools that can be restricted from attackers without disrupting business operations.

The Urgency of Addressing Internal Threats

A standard Windows 11 installation includes 133 unique living-off-the-land binaries across 987 instances. Bitdefender Labs’ telemetry indicates that PowerShell is active on 73% of endpoints, often invoked silently by third-party applications. This scenario underscores an over-entitlement problem that cannot be resolved through traditional patching methods.

Gartner projects that by 2030, preemptive cybersecurity will constitute 50% of IT security spending, a significant increase from less than 5% in 2024. Additionally, 60% of large enterprises are expected to adopt dynamic attack surface reduction (DASR) technologies by 2030, up from less than 10% in 2025. This shift is driven by the realization that when most intrusions involve no malware and adversaries can act within minutes, the traditional detect and respond approach is insufficient. Proactively eliminating potential attack vectors becomes imperative.

The Four-Step Assessment Process

The Internal Attack Surface Assessment unfolds over approximately 45 days, leveraging GravityZone PHASR—Bitdefender’s Proactive Hardening and Attack Surface Reduction technology. This process integrates seamlessly with existing endpoint stacks and comprises four key steps:

1. Kickoff and Behavioral Learning: PHASR develops behavioral profiles for each machine-user pair over a typical period of 30 days.

2. Attack Surface Dashboard Review: Participants receive an exposure score (ranging from 0 to 100) and a prioritized list of findings across five categories: living-off-the-land binaries, remote administration tools, tampering tools, cryptominers, and piracy tools. Each finding is mapped to specific users and devices.

3. Optional Reduction Sprint: Organizations can apply controls manually or utilize PHASR’s Autopilot to enforce them. Users have the option to request access through a built-in, one-click approval workflow.

4. Reduction Review: A final session quantifies the reduction in the attack surface and identifies any shadow IT and unauthorized binaries that emerged during the process.

Early adopters of this assessment have reported a reduction in their attack surface by 30% or more within the first 30 days. One organization achieved nearly a 70% reduction by restricting living-off-the-land binaries and remote tools, all without additional investigation overhead or end-user disruption.

Implications for Various Stakeholders

– For the Chief Information Security Officer (CISO): The assessment provides a defensible, board-ready exposure metric that demonstrates week-over-week improvement, directly linked to behaviors exploited by attackers.

– For the Security Operations Center (SOC) and IT Administrators: The initiative can lead to up to a 50% reduction in investigation and response workloads. By eliminating entire classes of suspicious-but-legitimate behavior on unnecessary endpoints, the operational burden is significantly decreased.

– For Business Decision-Makers: The documented, ongoing reduction in the attack surface aligns with the expectations of regulators, auditors, and cyber-insurers, showcasing a proactive approach to cybersecurity.

Proactive Defense: A Strategic Imperative

The most significant risks are no longer external or unknown—they reside within the existing environment. By undertaking the Internal Attack Surface Assessment, organizations can obtain a precise, prioritized map of these risks within 45 days, at no cost, and without altering their current security infrastructure.

For Windows-centric environments with 250 or more users, initiating this assessment is a strategic move. While compromises may be inevitable, the extent of a breach is largely determined by what an attacker can access once inside. The most effective way to limit this access is to proactively identify and mitigate internal vulnerabilities.