Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • IT Management
    • Networking

    Malware, Hacking Most Common Attacks in 2011 Data Breaches: Verizon DBIR

    Written by

    Fahmida Y. Rashid
    Published February 29, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      SAN FRANCISCO€”Malware and hacking were the most commonly used attack vectors in data breaches that occurred in 2011, according to a sneak peek of the 2012 Data Breach Investigations Report from Verizon.

      Verizon released a preliminary version of its 2012 Data Breach Investigations Report Feb. 29. The preliminary report contains “a few snapshots” from the Verizon caseload that was analyzed for the report. The full version of the report is expected to be released in the coming weeks.

      The full DBIR will include information about more than 850 data breaches in 2011, according to Verizon. However, a little over 10 percent of the incidents were actually investigated by the Verizon RISK team. Verizon complemented the information from those 90 incidents with data gathered from five law enforcement agencies it partnered with. The agencies included the U.S. Secret Service, the Dutch High Tech Crime Unit, the Irish Reporting and Information Service, the Australian Federal Police and the London Metropolitan Police.

      “One might consider this to be a tasty morsel to whet the appetite for the full report,” Verizon RISK researchers wrote in the report.

      The year was “exciting,” with plenty of mini-breaches and mega-breaches to keep infosec professionals awake at night, Verizon wrote. There was a little bit of everything, with hacktivism, cyber-espionage and organized crime wreaking havoc on enterprise and government systems around the world.

      Retail€”which included both online and traditional brick-and-mortar merchants€”hospitality and financial sectors suffered the most incidents in 2011, Verizon said. However, information and manufacturing industries lost the largest amount of data, measured in the number of records compromised, according to the preliminary report.

      Financial gain appeared to still be the main motivation for cyber-attacks, according to the preliminary report. While organized crime was responsible for a majority of the incidents, online protests, other forms of hacktivism and disgruntled ex-employees also caused significant damage, according to the Verizon RISK team.

      External attacks continue to rise, as Verizon researchers found that 92 percent of attacks analyzed were external in origin. This is a significant change from previous years. Between 2004 and 2007, 80 percent of the breaches involved outsiders.

      Hacking and malware remain significant threats as these two attack methods played some role in nearly all (99 percent) the incidents, according to the current report. These two methods are popular because they allow attackers remote access, automation and an easy getaway, Verizon said. Social engineering techniques are also increasing in popularity, associated with over half of the breaches investigated, Verizon said.

      However, Verizon warned against ignoring all other threats to focus on hacking and malware. The report’s finding just means that organizations should identify their weakness with respect to malware and hacking threats and prioritize related defenses.

      The most common servers breached in 2011 were point-of-sale servers, Web and application servers, and database servers. Desktops, laptops and point-of-sale terminals made up the bulk of compromised end-user devices, Verizon said.

      Payment card information, personal identifying information and authentication credentials were the most often compromised in 2011, but other types of sensitive organizational data, trade secrets and copyright information were also stolen, Verizon said.

      Organizations are still taking awhile to detect that they have been compromised. While it takes attackers a very short time to breach a network and steal data, nearly 60 percent of the incidents were detected months or years after the fact, Verizon found.

      “That’s a long time for customer data, intellectual property and other sensitive information to be at the disposal of criminals,” according to the report.

      Two-thirds of the breaches were detected when an external third-party noticed the problem. However, Verizon found a “glimmer of good news,” as the number of breaches detected because the organization was actively monitoring its logs has gone up since previous years.

      Verizon’s report affirmed just how global the cyber problem has gotten. Less than half of the data breaches reported originated in North America. The bulk of the breach reports were in Europe, the Middle East and Asia-Pacific, Verizon found.

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.