Verizon has published its 2013 Data Breach Investigations Report. Now in its sixth year of publication, the report includes data from 19 global security organisations, including the Australian Federal Police. Because it uses data from so many law enforcement agencies, the report has become one of the most definitive global analyses of cyber crime.
This year’s report analyses of over 47,000 security incidents and 621 confirmed breaches. It also offers new insight into data thieves and their motives, says Verizon’s Paul Black, the company’s Regional Managing Principal for Investigative Response.
“There’s been a big increase in state affiliated cyber espionage this year,” Black told iTWire. “But we have a much larger data set, with 19 countries. Countries are increasingly using the Internet as military weapon. We are also seeing an increase in the involvement of organised crime.”
The report includes a matrix that maps the sources of cyber crime (organised crime, state affiliates and activists) against their targets by industry, their region of operation and a range of other criteria.
“As more and more commercial activity moves online, and organisations are storing more and more payment data, the types of attacks are becoming much more sophisticated,” said Black. “Despite all the best efforts of the security industry, too many people are still using weak passwords, or even easy to guess default passwords. These are very susceptible to brute force attacks.”
Black said a major problem was often the length of time it took organisations to realise they had been attacked. “Many of them don’t know for days or weeks afterwards, and are often informed by their customers or other third parties. Everything is logged, but people don’t look at their log files.”
Key findings from the report include:
- Taking the top spot for all breaches is financially-motived cybercrime (75%) followed by state-affiliated espionage campaigns claiming second spot (20%).
- Hactivist incidents held steady but the amount of data stolen decreased as hactivists shifted to other forms of attacks, such as distributed denial of service attacks.
- Victims represented a wide range of industries, from financial organizations to manufacturing, transportation and utilities.
- 38% of breaches impacted larger organisations and represented 27 different countries.
- External attacks remain largely responsible for data breaches with 92 percent of them attributable to outsiders and 14% committed by insiders.
- Hacking is the most common way breaches occur. In fact, hacking was a factor in 52% of data breaches.
- Three quarters (76%) of network intrusions exploited weak or stolen credentials (user name/password).
- The proportion of breaches incorporating social tactics such as phishing was four-times higher in 2012, which the report found directly related to the tactic’s widespread use in targeted espionage campaigns.
“The bottom line is that unfortunately, no organisation is immune to a data breach in this day and age,” said Black. “We have the tools today to combat cybercrime, but it’s really all about selecting the right ones and using them in the right way.
“In other words, understand your adversary – know their motives and methods, and prepare your defences accordingly and always keep your guard up,“ he said.
The report contains some excellent infographics and is extremely well written. It can be accessed at http://www.verizonenterprise.com/DBIR/2013/