When Hackers Want Much More Than Money
Insider attack data breaches are down in 2011, but hacktivist attacks, with motives beyond money, are up, reports Verizon 2012 Data Breach Investigations Report.
Anonymous: 10 Facts About The Hacktivist Group (click image for larger view and for slideshow)
Call 2011 the year that hacktivism became the leading cause of data breaches.
Notably, 58% of all data stolen in 2011 didnt go missing for monetary-gain purposes, as has traditionally been the case. Instead, it was obtained and leaked by hacktivist groups such as
Anonymous
and
LulzSec
.
Thats according to the
2012 Data Breach Investigations Report
from Verizon, released Thursday. As in
previous years
, both the
U.S. Secret Service
and the
Dutch National High Tech Crime Unit
contributed data to the report. For the first time, however, the Australian Federal Police, the
Irish Reporting & Information Security Service
, and the
Police Central e-Crime Unit
of the London Metropolitan Police also contributed data from their investigations. All told, the report analyzed data from 855 incidents, involving 174 million compromised records.
[ Businesses are becoming more efficient in breach responses. See
Data Breach Costs Drop
. ]
Overall, the Verizon report found that 98% of attacks were caused by outsiders, although sometimes in collusion with
insiders
, who were involved in 4% of attacks, and business partners, who were involved in fewer than 1% of attacks.
Interestingly, about five years ago, previous Verizon data breach studies were reporting that about an equal number of attacks could be traced to insiders as well as outsiders. Since then, however, the number of losses traced to cyber criminals has increased, and in 2011,
hacktivism came onto the scene in force
. Were all seeing in the media the Occupy movement, Anonymous. Theres a big mentality shift where it used to be all about the money, and now were seeing a big shift where its not all about the money, said Novak. Were seeing a lot of these hacktivist groups that are doing it purely for political or social reasons.
Whether or not Anonymous and its ilk hold up a mirror to the
poor state of IT security
, as some industry watchers have said, such groups often face few obstacles. Notably, 96% of the attacks detailed in the Verizon report werent highly difficult, and 97% could have been easily avoided without needing to resort to difficult or expensive countermeasures. Furthermore, 79% of breached businesses were simply targets of opportunity.
Novak cautioned, however, that insider attacks are still a significant problem, and quantity-wise may not have changed significantly. But with the overall number of attacks and breached records reported to Verizon having increased dramatically, thats skewed the percentages away from insider attacks.
As in previous years, the Verizon report found that cybercrime attacks are global in nature. Indeed, attacks launched in 2011 that resulted in breaches originated in at least 36 countries, versus just 22 countries in 2010. In 2011, the vast majority (70%) of attacks came from Eastern Europe, while just one-quarter were launched from the United States.
Attackers often favor a one-two punch. For starters, 81% of attacks and 99% of all compromised data
involved hacking
. But
malware
was also used in 69% of all attacks, and involved in 95% of compromised records.
Interestingly, this malware is rarely encountered by accident. A lot of what were seeing is hackers getting in through some other means, then planting this malware, said Novak. So its no surprise that the malware is so good at getting this data out. In terms of the getting in part, meanwhile, he said that exploiting weak credentials--including
poor passwords
--was the leading technique used by attackers, especially for smaller businesses. For larger businesses, meanwhile, attackers often installed keystroke loggers and password stealers, to make an end run around the network security defenses.
Another interesting finding is that attacks with a physical component that resulted in data breaches appeared to decline between 2010, when theyd spiked, and 2011, when fewer than 1% of compromised records, and just 10% of attacks, involved a physical component. Whats behind the apparent decrease? First, Verizon said that
card-skimming attacks
certainly havent gone away, and also that its oftentimes difficult to quantify the number of records that went missing as a result.
But Novak said the decline also seems to be due to law enforcement agencies catching more card-skimming gangs. In fact, given the traditional emphasis placed on physical--more than cyber--investigations, he said the expectation was that law enforcement agencies would simply be catching more people behind physical crimes that led to data breaches. But in fact, it appears that these physical crimes are declining. The fact that were seeing physical go down, despite the fact that we have more law enforcement agencies reporting in, is one way we determined [that its declining], he said.
Cybercriminals shouldnt breathe easy, however, since almost every type of law enforcement agency is
adding cybercrime investigation capabilities
. Most law enforcement agencies are tooling up at an amazing rate, said Novak. Most law enforcement agencies are finding that theres a cyber piece to almost every case now. For example, people who investigate homicides, traditionally they never spoke with the cyber folks. But now they find that a cellphone in their case must be analyzed, a laptop must be analyzed.
Most external hacks of databases occur because of flaws in Web applications that link to those databases. In this report,
Protecting Databases From Web Applications
, well discuss how security teams, database administrators, and application developers can work together to improve the defenses of both front-end Web applications and back-end databases to prevent these attacks from succeeding. (Free registration required.)
Tags:
When Hackers Want Much More Than Money