Data Breaches Focus on Money: Study

Friday, March 23, 2012 @ 05:03 PM gHale


More than half of data stolen from companies in 2011 was a result of hacktivist actions, even though the majority of data breaches came from financially motivated cyber criminals, a new report said.

Up to 98 percent of data breach incidents covered by the new report were from external agents and the vast majority of them, 83 percent, ended up being organized criminal groups, according to the Verizon 2012 Data Breach Investigations Report.

RELATED STORIES
Agile Hackers will Break Security
Cyber Report: U.S. Knows Groups Behind Attacks
Execs Unaware of Security Risks
Security to Industry: Time to Wake Up

Hacktivists were responsible for only 3 percent of data breaches. However, they had the biggest impact in terms of compromised records, over 100 million of the 174 million.

One explanation is financially motivated cyber criminals tend to target small and medium-size organizations and are looking for particular types of data, while hacktivists primarily target large organizations and grab anything they can get their hands on, from customer records to internal emails, said Bryan Sartin, vice president of the Verizon Research Investigations Solutions Knowledge (RISK) team.

A decrease in the sophistication of attacks launched by financially motivated cyber criminals is also out there with most of them becoming repetitive in nature, Sartin said.

Meanwhile, hacktivists are more unpredictable. They employ more-sophisticated techniques like DNS tunneling and use diversionary tactics, such as distributed denial-of-service (DDoS) attacks. “There’s a different landscape for hacktivism, that’s for sure,” Sartin said.

The data breach expert is “cautiously pessimistic” about hacktivist attacks decreasing in number or impact in 2012, despite the multiple hacktivism-related arrests made by law enforcement agencies worldwide in recent months.

The origin of external attacks is different depending on the size of the targeted organizations. In 67 percent of cases for the entire set of data breaches, the origin was Eastern Europe.

However, when looking only at large organizations with over 1,000 employees, the percentage was much lower — 27 percent. In 47 percent of cases, external attacks against such organizations originated from North America.

Out of the 885 incidents included in the report, 81 percent included some form of hacking and 69 percent included malware activity; 61 percent included a combination of both.

In the vast majority of cases that involved malware the remote attackers installed it after they obtained unauthorized access to the organization’s network or systems. The most prevalent type of malware used in these attacks falls into the spyware category and includes keyloggers and Web form grabbers.

However, even though the use of spyware was predominant, this type of malware resulted in a lower number of compromised records than backdoors, which were in 20 percent of incidents. Over 90 percent of known record loss comes from attacks that use backdoors, the report said.

As far as hacking methods go, the exploitation of default, guessable, or stolen login credentials is by far the most common one. SQL injection, which is a popular hacking technique, was only in 3 percent of data breach incidents.

Login credentials for remote access services like Microsoft’s RDP or VNC ended up exploited in 88 percent of data breach incidents that involved hacking. This suggests such services are widely used in corporate environments and are often easy to access by attackers, which makes the recent disclosure of details about a remote code execution vulnerability in Microsoft’s RDP service even more worrying.

Verizon’s recommendation for small and medium-sized organizations is to deploy firewalls on Internet-facing services and to change the default credentials of point-of-sale (POS) and other systems to prevent unauthorized access. Organizations that outsource their technical support to other vendors, should ensure that those vendors follow these recommendations too.

Large enterprises should eliminate unnecessary data, monitor and mine event logs for suspicious activity and establish essential security controls, Verizon said.

The report spanned 855 data breach incidents investigated by the company and several law enforcement agencies — the U.S. Secret Service, the Dutch National High Tech Crime Unit, the Australian Federal Police, the Irish Reporting & Information Security Service and the Police Central e-Crime Unit of the London Metropolitan Police. These incidents resulted in 174 million compromised records, the second-highest volume of compromised records since Verizon began compiling data breach statistics in 2004.



Leave a Reply

You must be logged in to post a comment.