Attacks/Breaches
10/8/2012
12:24 PM
50%
50%

Cybercrime Attacks, Costs Escalating

Successful attacks against U.S. businesses have increased by 42% since last year, with individual businesses being hit with an average of two attacks per week, says study from Ponemon Institute and HP.

The frequency of online attacks against U.S. businesses continues to increase, along with the cost of defending against those attacks and mitigating any resulting data breaches. Cybercrime now costs a U.S. business $8.9 million per year, an increase of 6% from 2011 and 38% from 2010.

Those findings come from the "2012 Cost of Cyber Crime Study," which was sponsored by security intelligence tool vendor HP and released Monday by the Ponemon Institute. The 56 businesses profiled in the study also reported that on average, they're collectively seeing 102 successful attacks per week, up from 72 attacks per week in 2011 and 50 attacks per week in 2010. Individual businesses, meanwhile, see on average 1.8 successful attacks against them per week.

Are the increased cybercrime costs a direct result of businesses being hit by a greater quantity of attacks? "This is a little bit of conjecture on my part, but I think we've found evidence--and pretty strong evidence in some cases--that it's not just about the frequency of attacks, but also the sophistication," said Larry Ponemon, chairman and founder of the Ponemon Institute, speaking by phone. "Some attacks are pretty surgical and stealthy; they're very hard to detect, and even when detected, they're hard to contain."

[ Cybercriminals don't target only big companies with lots of financial transactions. Read How Cybercriminals Choose Their Targets. ]

Likewise, Michael Callahan, VP of product and solution marketing for enterprise security at HP, said via phone that the increased frequency of successful attacks stems from attackers' skill and impetus. "It's not that the technology to do the attacks has changed, it's more the motivation. You've seen this broad move from attacks being about fame, to fortune," he said. In addition, he noted that formerly independent groups of attackers now often appear to band together for individual attack campaigns, which makes them harder to stop.

Another cost factor is that it's taking businesses longer to respond to security breaches. On average, it now takes a business 24 days to spot and resolve an attack, although some cleanup operations extended to 40 days. On average, each cleanup cost $592,000, a 42% increase from the average reported 2011 cleanup costs of $416,000.

Accordingly, said HP's Callahan, it's essential to stop attacks as early in the "kill chain" as possible, by which he's referring to the stages of an attack: reconnaissance, weaponization, delivery, exploitation, command and control, and exfiltration. "The earlier you stop it, the less it's going to cost you as an organization to remediate," he said. "Once you move through that kill chain, it becomes harder and harder to stop." Furthermore, if an attack isn't discovered until attackers are already exfiltrating data, then attackers may have already succeeded.

In terms of how cybercrime costs break down, businesses told Ponemon that their biggest hits in 2012 have come from lost information (comprising 44% of total cybercrime costs) and business disruption (30%)--both of those figures are virtually unchanged from 2011--as well as lost revenue (19%) and equipment damages (5%).

The study also looked at regional cybercrime cost differences. Businesses in the United States spend the most on cybercrime (on average, $8.9 million annually per business), followed by Germany ($6.0 million). But cybercrime costs were much lower in Australia ($3.4 million) and the United Kingdom ($3.3 million). According to Ponemon, attacks in the latter two countries appear to be primarily aimed at disrupting businesses--for example, by knocking their websites offline. But in the United States and Germany, intellectual property attacks are much more common, and economically also more damaging.

Given the study's findings, what can businesses do to lower their cybercrime-related costs? In the United States, businesses with the lowest relative cybercrime costs tend to have a good information security governance program and to use some type of security intelligence or security intelligence and event management tool, according to Ponemon. In particular, he said that businesses that employed security intelligence tools lowered their cybercrime costs by an average of $1.6 million per year, in part by being able to spot and respond to breaches more quickly.

"It's not that the costs go to zero [by putting those two approaches in place], but it does have a positive effect on the organization when it comes to cybercrime," Ponemon said. "You can become less of a victim."

Cybercriminals are taking aim at your website. Is your security strategy up to the challenge? Also in the new, all-digital 10 Steps To E-Commerce Security issue of Dark Reading: About half of the traffic to e-commerce sites is machine generated--and much of it is malicious. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-2808
Published: 2015-04-01
The PRNG implementation in the DNS resolver in Bionic in Android before 4.1.1 incorrectly uses time and PID information during the generation of random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a rel...

CVE-2014-9713
Published: 2015-04-01
The default slapd configuration in the Debian openldap package 2.4.23-3 through 2.4.39-1.1 allows remote authenticated users to modify the user's permissions and other user attributes via unspecified vectors.

CVE-2015-0259
Published: 2015-04-01
OpenStack Compute (Nova) before 2014.1.4, 2014.2.x before 2014.2.3, and kilo before kilo-3 does not validate the origin of websocket requests, which allows remote attackers to hijack the authentication of users for access to consoles via a crafted webpage.

CVE-2015-0800
Published: 2015-04-01
The PRNG implementation in the DNS resolver in Mozilla Firefox (aka Fennec) before 37.0 on Android does not properly generate random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2...

CVE-2015-0801
Published: 2015-04-01
Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving anchor navigation, a similar issue to CVE-2015-0818.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.