Attacks/Breaches
1/4/2011
12:41 PM
50%
50%

Hackers, Insiders Behind Most Identity Theft

Malicious activity topped human error as a cause of the 662 data breaches recorded in 2010 by the Identity Theft Resource Center.

Top 10 Security Stories Of 2010
(click image for larger view)
Slideshow: Top 10 Security Stories Of 2010
Data breaches continue to plague businesses. According to the Identity Theft Resource Center (ITRC), in 2010, there were at least 662 data breaches, exposing more than 16 million records. Nearly two-thirds of breaches exposed people's social security numbers, and 26% of breaches involved credit or debit card data.

According to the ITRC's analysis, more attacks result from malicious intent than human error. The leading malicious causes of data breaches were hacking attacks (17.1%) and insider theft (15.4%). "Data on the move -- taking information from the workplace unprotected -- was 16.6% and accidental exposure on Web/Internet was 11%," said Linda Foley, founder and chairman of the ITRC. "Both are totally preventable and should be 0%."

While the above statistics provide insights into the scale and extent of data breaches, the ITRC also cautioned that it's only a partial picture. That's because 49% of organizations that suffered a breach didn't detail the number of potentially exposed records. In addition, many organizations simply don't disclose data breaches.

What counts as a data breach? The ITRC said it defines a breach as any event that puts a person's name, as well as some piece of unencrypted, sensitive information -- a person's social security number, driver's license number, financial details, or medical records -- at risk.

Not all data breaches are digital. In fact, according to the ITRC, "paper breaches account for nearly 20% of known breaches and typically go unnoticed until a consumer reports the problem to local media." In general, it said, companies have no legal requirement to disclose when their paper records have been breached.

In 2010, organizations that revealed they'd suffered a data breach included Educational Credit Management (3.3 million records), AvMed Health Plans (1.2 million), Lincoln National Financial Securities (1.2 million), South Shore Hospital in Massachusetts (800,000), and Ohio State University (760,000).

Other organizations, such as Experian and Home Depot, also experienced data breaches, but didn't disclose the number of people or records affected. As that suggests, legally speaking, data breach notification often remains a gray territory.

Some states, but not all, have data breach notification laws, which require any organization that suffers a breach to notify that state's affected residents. Interestingly, the ITRC found that information about 29% of the 662 reported breaches for 2010 could be credited to authorities in those states. "This is a clear argument for mandatory reporting to achieve transparency for the public," said the ITRC.

The organization also renewed its call for a single, nationwide clearinghouse of data breach information. "It should be comprehensive enough to allow readers to find out what happened, what information was compromised, and why the breach happened," said the ITRC. "This would also allow law enforcement to better address this type of crime."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8802
Published: 2015-01-23
The Pie Register plugin before 2.0.14 for WordPress does not properly restrict access to certain functions in pie-register.php, which allows remote attackers to (1) add a user by uploading a crafted CSV file or (2) activate a user account via a verifyit action.

CVE-2014-9623
Published: 2015-01-23
OpenStack Glance 2014.2.x through 2014.2.1, 2014.1.3, and earlier allows remote authenticated users to bypass the storage quote and cause a denial of service (disk consumption) by deleting an image in the saving state.

CVE-2014-9638
Published: 2015-01-23
oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a WAV file with the number of channels set to zero.

CVE-2014-9639
Published: 2015-01-23
Integer overflow in oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (crash) via a crafted number of channels in a WAV file, which triggers an out-of-bounds memory access.

CVE-2014-9640
Published: 2015-01-23
oggenc/oggenc.c in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted raw file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.