“50-per cent increase in ransomware attacks”, reports Verizon
Cyberespionage is now the most common type of attack seen in manufacturing, the public sector and now education, warns the Verizon 2017 Data Breach Investigations Report. Much of this is due to the high proliferation of propriety research, prototypes and confidential personal data, which are hot-ticket items for cybercriminals. Nearly 2,000 breaches were analyzed in this year’s report and more than 300 were espionage-related many of which started life as phishing emails.
This year’s report sees a 50-per cent increase in ransomware attacks compared to last year. Despite this increase and the related media coverage surrounding the use of ransomware, many organizations still rely on out-of-date security solutions and aren’t investing in security precautions. In essence, they’re opting to pay a ransom demand rather than to invest in security services that could mitigate against a cyberattack.
“Insights provided in the DBIR are levelling the cybersecurity playing field,” said George Fischer, President of Verizon Enterprise Solutions. “Our data is giving governments and organizations the information they need to anticipate cyber-attacks and more effectively mitigate cyber-risk. By analyzing data from our own security team and that of other leading security practitioners from around the world, we’re able to offer valuable intelligence that can be used to transform an organization’s risk profile.”
This year’s DBIR – the keystone report’s 10th anniversary edition – combines up-to-date analysis of the biggest issues in cybersecurity with key industry-specific insights, putting security squarely on the business agenda. Major findings include:
· Malware is big business: Fifty-one (51) per cent of data breaches analyzed involved malware. Ransomware rose to the fifth most common specific malware variety. Ransomware – using technology to extort money from victims – saw a 50-per cent increase from last year’s report, and a huge jump from the 2014 DBIR where it ranked 22 in the types of malware used.
· Phishing is still a go-to technique: In the 2016 DBIR, Verizon flagged the growing use of phishing techniques linked to software installation on a user’s device. In this year’s report, 95 per cent of phishing attacks follow this process. Forty-three per cent of data breaches utilized phishing, and the method is used in both cyber-espionage and financially motivated attacks.
· Pretexting is on the rise: Pretexting is another tactic on the increase, and the 2017 DBIR showed that it is predominantly targeted at financial department employees – the ones who hold the keys to money transfers. Email was the top communication vector, accounting for 88 per cent of financial pretexting incidents, with phone communications in second place with just under 10 per cent.
· Smaller organizations are also a target: Sixty-one (61) per cent of victims analyzed were businesses with fewer than 1,000 employees.
“Cyber-attacks targeting the human factor are still a major issue,” says Bryan Sartin, Executive Director, Global Security Services, Verizon Enterprise Solutions.
“Cybercriminals concentrate on four key drivers of human behaviour to encourage individuals to disclose information: eagerness, distraction, curiosity and uncertainty. And as our report shows, it is working, with a significant increase in both phishing and pretexting this year.”
Now in its tenth year, the “Verizon 2017 Data Breach Investigations Report” leverages the collective data from 65 organizations across the world. This year’s report includes analysis on 42,068 incidents and 1,935 breaches from 84 countries. The DBIR series continues to be the most data-driven security publication with the largest amount of data sources combining towards a common goal – slicing through the fear, uncertainty and doubt around cybercrime.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.