18 Common Data Breach Scenarios

Data Breach, Hacker, Information Management, IT, IT Security, Data Center, Verizon, Atlanta, Jacksonville, Dothan, Tallahassee, Thomasville, Albany, Tifton, Valdosta


Verizon has just released their annual Data Breach Digest, outlining the themes that came out of their investigation of 500 cases pertaining to cyber security. All of these breaches were broken down into 18 common scenarios, clustered into four groups. I’ve outlined them below to give you a teaser of the 84 page document.

  1. The human element—five scenarios highlighting human threats or targets (48% of breaches)
    1. Social Engineering (16% of breaches)
      • This is generally used for cyber espionage by organized crime or a government such as China, Argentina, North Korea, and Russia
    2. Financial Pretexting (7% of breaches)
      • This is generally used for financial gain by organized crime
    3. Digital Extortion (9% of breaches)
      • This is generally used for financial gain by organized crime using ransomware on an organization’s server
    4. Insider Threat (12% of breaches)
      • This is generally used by employees with access to money or financial transactions with a grudge.
    5. Partner Misuse (4% of breaches)
      • This is generally when a principal takes advantage of partners
  2. Conduit devices—five scenarios covering device misuse or tampering (65% of breaches).
    1. USB Infection (4% of breaches)
      • This is generally associated with state and organized crime, used for corporate espionage and financial gain
    2. Peripheral Tampering (1% of breaches)
      • Organized crime in Eastern Europe, Brazil, and the US are typically associated with the payment card skimmer breach
    3. Hactivist Attack (3% of breaches)
      • Groups like Anonymous target organizations they have differences with to shut down or deface their websites and interrupt their ability to operate
    4. Rogue Connection (4% of breaches)
      • Organized crime uses phishing, spyware, and key logger software to steal financial information.
    5. Logic Switch (53% of breaches)
      • State and organized crime use SQL injection and stolen credentials to manipulate account balances, create non existent funds, bypass security, and cash out quickly.
  3. Configuration exploitation—four scenarios focusing on reconfigured ormisconfigured settings (100% of breaches – some use multiple methods simultaneously).
    1. SQL Injection (11% of breaches)
      • These attacks abuse an application’s interaction with its backend database. They frequently target web applications.
    2. Content Management System (CMS) Compromise (46% of breaches)
      • CMS vulnerabilities are used to install backdoor software the attacker can come back to later to access the data or use the system.
    3. Backdoor Access (51% of breaches)
      • Once a backdoor has been created in an application, the infiltrator can push further into the organization’s systems and install other malware to capture keystrokes, escalate privileges, compromise accounts and export data.
    4. Domain Name System (DNS) Tunneling (1% of breaches)
      • This involves creating an unintended communication channel to a C2 server to exfiltrate data. Networks with particularly tough security protocols are typically the target of these attacks.
  4. Malicious software—four scenarios centering on sophisticated orspecial-purpose illicit software (86% of breaches).
    1. Data Ransomware (4% of breaches)
      • This malware is used to prevent users from accessing data until they pay a ransom to have it unlocked. Organized crime are the typical perpetrators.
    2. Sophisticated Malware (32% of breaches)
      • Antivirus software is rendered ineffective because this utilizes custom-written, special purpose malware. This generally occurs in targeted attacks.
    3. RAMscraping (8% of breaches)
      • Organized crime uses customized tools for identifying and exporting specific data, generally financial.
    4. Credential Theft (42% of breaches)
      • These spyware/keylogger attacks involve unauthorized software or hardware used to gain access to protected elements of an organization’s IT infrastructure and are used for financial gain and espionage.



Our Latest Consulting Insights

Why Quality Control Matters for Document Scanning Services

Document scanning services may seem simple. But document management pros know that it’s much more complex than just pressing a button and saving a file. Experience tells us that insufficiently digitized documents can result in significant and often permanent challenges. This underscores the importance of […]

Read More

HR Records Scanning: Digital Document Solutions for Your Business

HR records scanning can be a useful and efficient part of your small business’s document management plans. Scanning offers a mean of digitizing records and managing them in digital format, allowing you to save on space and other expenses associated with managing paper records. Digitization […]

Read More

How do Privacy Laws Influence Media Destruction?

At Secure Records Solutions, we know that staying abreast of federal and state privacy regulations can be a daunting task for any business. A multitude of laws govern how your company handles and disposes of sensitive information. The team at Secure Records Solutions knows that […]

Read More

How Document Management Can Save Money for Your Business

As business grow and evolve, they accumulate large numbers of records. This is often in the form of paper documents, and usually in amounts not previously anticipated. Now more than ever, businesses seek document management solutions for these records. Businesses acquire records for many reasons: […]

Read More

Document Management: An Alternative to Digitization

As the trend of digitization in business continues, business leaders must themselves continue to manage paper documents. They must do so with compliance standards and retention strategy in mind. This all makes paper record sets or other physical documents seem like extra weight to carry. […]

Read More

Four Document Management New Year’s Resolutions

A new year means new plans and resolutions, and 2023 is no different. We create new aspirations, both personal and professional, that we set each new year. When setting a professional goal for your business, think through to uncover the root of your problem. If […]

Read More