Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Hacktivists Change Tactics From Data Breaches to Disruption: Verizon

    Written by

    Brian Prince
    Published April 23, 2013
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Last year, much of the blame for data theft chronicled in Verizon’s massive data breach report for 2011 was laid at the doorstep of hacktivists driven by political motives. Verizon’s report on data breaches in 2012, however, reveals that the main ideology driving external attackers could be summed up this way: Greed is good.

      Overall, organized crime was blamed for 55 percent of all external threat actors, compared with roughly 2 percent for hacktivists.

      “They stole more data than any other type of threat actor in our 2012 report [for 2011],” explained Wade Baker, principal author of the Data Breach Investigations Report series. “In this report, there were far, far, far, far fewer records … whereas [in 2011] they stole over half of all the information.”

      “I think they just shifted their activity a little bit away from data breaches back to sort of your more traditional denial-of-service attack and causing disruption rather than stealing information,” he said.

      That shift means organizations must also shift what they prepare for, he said.

      “Understanding the adversaries that are likely to attack you is extremely important,” he told eWEEK. “If you’re a financial institution right now, there is a good chance that you are getting attacked by these hacktivist groups. They are performing denial-of-service attacks on major financial institutions over the last six months. A year ago that wasn’t as much the case.”

      For the most part, financially motivated attackers targeted the finance, retail and food industries, and put a bull’s eye on point-of-sale [POS] devices as well as databases and desktops.

      The biggest jump, however, can be seen in the amount of state-sponsored attacks, which disproportionately emanate from China. According to the report, 21 percent of the external attacks could be traced to nation-states, with as much as 96 percent of those coming from China. The remaining 4 percent were listed as unknown.

      According to Wade, Verizon’s attribution for the attacks is not just based on the geo-location of an IP address involved in the attack; instead, it is based on multiple layers of evidence and research connecting the dots between attack activity and hackers tied to the Chinese government.

      “This may mean that other threat groups perform their activities with greater stealth and subterfuge,” the report notes in its explanation of the figures. “But it could also mean that China is, in fact, the most active source of national and industrial espionage in the world today.”

      By and large, the attacks from nation-states target the manufacturing and transportation industries and go after credentials, internal data, trade secrets and system information.

      At the center of these attacks is often a spear-phishing attack that enabled the culprits to get their hands on usernames and password information. In fact, the study found that the proportion of breaches using social-engineering tactics such as phishing was four times higher in 2012 than in 2011, in part due to its widespread use in espionage campaigns.

      In most cases (69 percent), Verizon’s forensic investigators were unable to determine who in the breached organizations had fallen victim to the social engineering or phishing attacks. However, in 30 percent of the cases involving enterprises, the victim was at the executive level. Twenty-seven percent of the cases in the enterprise world could be traced to managers. For small and midsized businesses [SMBs], however, the percentages were different, with just 11 percent of the issues traced to executives. The largest percentage belonged to cashiers, who accounted for 13 percent of the breaches.

      Interestingly, a recent study by Symantec found that the number of targeted attacks focused on chief executive or board-level employees fell from 25 percent in 2011 to 17 percent in 2012, reflecting what one researcher speculated could be a shift among attackers to focus on employees directly involved in research and development.

      Still, the Verizon report notes that executives and managers “make sweet targets for criminals looking to gain access to sensitive information via spear-phishing campaigns” because they have a higher profile than the average end user and are likely to have access to proprietary information. In addition, an executive may be more likely to open a booby-trapped PowerPoint or PDF attachment due to their everyday activity.

      The report is available for download here.

      Brian Prince
      Brian Prince

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.