18 common data breach scenarios

Data Breach, Hacker, Information Management, IT, IT Security, Data Center, Verizon, Atlanta, Jacksonville, Dothan, Tallahassee, Thomasville, Albany, Tifton, Valdosta

Data Breach, Hacker, Information Management, IT, IT Security, Data Center, Verizon, Atlanta, Jacksonville, Dothan, Tallahassee, Thomasville, Albany, Tifton, Valdosta

Verizon has just released their annual Data Breach Digest, outlining the themes that came out of their investigation of 500 cases pertaining to cyber security. All of these breaches were broken down into 18 common scenarios, clustered into four groups. I’ve outlined them below to give you a teaser of the 84 page document.

  1. The human element—five scenarios highlighting human threats or targets (48% of breaches)
    1. Social Engineering (16% of breaches)
      1. This is generally used for cyber espionage by organized crime or a government such as China, Argentina, North Korea, and Russia
    2. Financial Pretexting (7% of breaches)
      1. This is generally used for financial gain by organized crime
    3. Digital Extortion (9% of breaches)
      1. This is generally used for financial gain by organized crime using ransomware on an organization’s server
    4. Insider Threat (12% of breaches)
      1. This is generally used by employees with access to money or financial transactions with a grudge.
    5. Partner Misuse (4% of breaches)
      1. This is generally when a principal takes advantage of partners
  2. Conduit devices—five scenarios covering device misuse or tampering (65% of breaches).
    1. USB Infection (4% of breaches)
      1. This is generally associated with state and organized crime, used for corporate espionage and financial gain
    2. Peripheral Tampering (1% of breaches)
      1. Organized crime in Eastern Europe, Brazil, and the US are typically associated with the payment card skimmer breach
    3. Hactivist Attack (3% of breaches)
      1. Groups like Anonymous target organizations they have differences with to shut down or deface their websites and interrupt their ability to operate
    4. Rogue Connection (4% of breaches)
      1. Organized crime uses phishing, spyware, and key logger software to steal financial information.
    5. Logic Switch (53% of breaches)
      1. State and organized crime use SQL injection and stolen credentials to manipulate account balances, create non existent funds, bypass security, and cash out quickly.
  3. Configuration exploitation—four scenarios focusing on reconfigured ormisconfigured settings (100% of breaches – some use multiple methods simultaneously).
    1. SQL Injection (11% of breaches)
      1. These attacks abuse an application’s interaction with its backend database. They frequently target web applications.
    2. Content Management System (CMS) Compromise (46% of breaches)
      1. CMS vulnerabilities are used to install backdoor software the attacker can come back to later to access the data or use the system.
    3. Backdoor Access (51% of breaches)
      1. Once a backdoor has been created in an application, the infiltrator can push further into the organization’s systems and install other malware to capture keystrokes, escalate privileges, compromise accounts and export data.
    4. Domain Name System (DNS) Tunneling (1% of breaches)
      1. This involves creating an unintended communication channel to a C2 server to exfiltrate data. Networks with particularly tough security protocols are typically the target of these attacks.
  4. Malicious software—four scenarios centering on sophisticated orspecial-purpose illicit software (86% of breaches).
    1. Data Ransomware (4% of breaches)
      1. This malware is used to prevent users from accessing data until they pay a ransom to have it unlocked. Organized crime are the typical perpetrators.
    2. Sophisticated Malware (32% of breaches)
      1. Antivirus software is rendered ineffective because this utilizes custom-written, special purpose malware. This generally occurs in targeted attacks.
    3. RAMscraping (8% of breaches)
      1. Organized crime uses customized tools for identifying and exporting specific data, generally financial.
    4. Credential Theft (42% of breaches)
      1. These spyware/keylogger attacks involve unauthorized software or hardware used to gain access to protected elements of an organization’s IT infrastructure and are used for financial gain and espionage.



Our Latest Consulting Insights

Earth Day Sustainability

This past Earth Day, April 22, 2019, the hashtag #onegreenthing circulated around social media. Some companies donned green attire and took part in a recycling or clean-up project in their community; others shared images of people planting trees or taking part in an urban garden. Secure […]

Read More

GDPR IS HERE | Is your business ready?

Disclaimer: We are not attorneys. Nothing within this post should be considered legal advice, but rather a spur to put your research hat on! Does your company collect, maintain, or process personal data of individuals within the European Union (EU)?  If so, the General Data Protection […]

Read More

PRISM International & NAID Merge to Form New Industry Association

Secure Records Solutions was honored to participate in the 2018 PRISM International Summit this week as history was made with a vote finalizing the merger between PRISM International and NAID, two industry associations in which we were already very involved. Our Consulting Team Leader, Christopher Jones, first […]

Read More

NAID Conference, NAID AAA Certification, Tallahassee Shredding, Valdosta Shredding

NAID Conference 2018

The Secure Records Solutions management team just returned from an exciting and productive National Association for Information Destruction Annual Conference in Nashville, TN. The conference was full of networking with friends in the industry, educational and motivating sessions (including one given by our very own […]

Read More

Tallahassee, Sunshine Law, Open Records Request, Public Records

Tallahassee is asked: “Are Text Messages Public Records?”

As the premier information management company in the Tallahassee area, we thought it important to share this debate with you. ABC27 WTXL introduced the discussion here on November 29th. In a world where business is conducted by text, it is not unreasonable to think that City of […]

Read More

Anonymous Location Data

Anonymous Location Data

Have you ever noticed your phone making subtle suggestions, like how long it will take for you to go somewhere at a time you often go to that place, even when you aren’t using a maps application? It was a minor annoyance in the back […]

Read More

PRISM Conference, Document Management Industry

PRISM 2017 – What’s Next for the Document Management Industry?

We’ve just returned from the summer gathering of our document management industry’s leadership, PRISM 2017. The conference was an excellent opportunity to network with contemporaries from 6 continents, all focused on the future of document management. Beyond the networking, Secure Records Solutions was in the […]

Read More

Paper Shredder, NAID Conference, Document Shredding, Paper Shredding

2017 NAID Conference

March and April have been a whirlwind around here, and it’s easy to see why when I look back over the last year. Our shredding business in Tallahassee, Thomasville, Albany, Tifton, and Valdosta has grown by 43%! While we’ve been busy on boarding new document […]

Read More

Stay Safe Online, Internet Security, Secure Records Solutions, Document Management

How to Stay Safe Online

I was traveling abroad recently when I started thinking about all of the work I do on the road, and how difficult it is to stay safe online. Just think of the many opportunities to use public or loosely managed WiFi in airport lounges, hotels, […]

Read More

Information Security, Data Management, National Data Privacy Day, January 28

National Data Privacy Day January 28th

National Data Privacy Day is a good reminder of the responsibility every organization has for taking necessary steps to protect sensitive information and prevent a data breach of client records. The responsibility of data privacy is governed by a series of laws at the industry, state, […]

Read More

EMR Software Solutions

New Year’s Resolution: Paperless. Check!

Our team establishes company goals and individual goals so that we know we are all rowing in the same direction. If your team has been talking about going paperless, but the scanning you’ve been tasked with feels like a hamster wheel that you can’t get […]

Read More