Hacktivism dominated more than just the headlines in 2011; according to Verizon, it also dominated the world of data breaches.
In its 2012 Data Breach Investigations Report, hacktivism was linked to 58 percent of the data that was stolen in 855 incidents last year around the world.
“(Hacktivists), traditionally they did do the DDoS-type attack where it was kind of flashy…But in 2011, I mean you saw in the media reports, hacktivism turned to any way that they could get a headline, and that then became stealing data as well and making that publicly available,” said Jay Jacobs, a principal on Verizon’s RISK Intelligence team.
Though only a small percentage of the attackers were actually hacktivists – just two percent – the smash-and-grab approach of the hacktivists allowed them to get their hands on large amounts of personally-identifiable information, he said.
“The scale of data breach thefts by hacktivists, 100 million of a total of 174 million records, is startling, particularly since hacktivism was only touched upon in passing in the previous year's report,” opined Neil Roiter, research director at Corero Network Security. “The report is a red flag to large organizations, which are almost exclusively the hacktivists' targets.”
The Verizon report comes on the heels of a report from Symantec and the Ponemon Institute that found the cost per record in the data breaches they examined in the U.S. fell from $214 in 2010 to $194 last year.
According to Verizon’s report, external attacks were involved in the vast majority of criminal breaches (98 percent). Malicious insiders were responsible for four percent, with that number including incidents where both insiders and external agents were involved. Business partners were responsible for less than one percent of the beaches.
Eighty-one percent of the incidents involved hacking. Sixty-nine percent incorporated malware, while 10 percent involved physical attacks. Almost all of the breaches analyzed by Verizon were discovered by a third-party (92 percent).
In many cases, the attacks were not that sophisticated, Jacobs said, and organizations can defend against breaches by taking some simple steps. Among those defensive actions are: eliminating unnecessary data, establishing and monitor security controls, monitoring and mining event logs and prioritizing security strategy.
“With the participation of our law enforcement partners around the globe, the ‘2012 Data Breach Investigations Report’ offers what we believe is the most comprehensive look ever into the state of cybersecurity,” said Wade Baker, Verizon’s director of risk intelligence, in a statement. “Our goal is to increase the awareness of global cybercrime in an effort to improve the security industry’s ability to fight it while helping government agencies and private sector organizations develop their own tailored security plans.”
The full Verizon 2012 Data Breach Investigations Report can be found here.