Attacks/Breaches
2/28/2014
03:27 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%
Repost This

Verizon Shares Glimpse Into Upcoming 2014 Data Breach Investigations Report

Breach data for upcoming Verizon report comes from some 50 contributing organizations from 95 nations, including Eastern European and Latin American CERTs

RSA CONFERENCE 2014 – San Francisco -- A decade of breach data gathered by Verizon for its Data Breach Investigations Report shows that the bad guys are winning when it comes to the efficiency of hacking into their victims' systems, executives from the company said here this week.

RSA Conference 2014
Click here for more articles about the RSA Conference.

Wade Baker, managing principal of RISK Intelligence for Verizon and one of the main authors of the company's renowned annual breach report, gave a little sneak peek here at some of the findings of the upcoming 2014 DBIR, due this spring. Baker says in three-fourths of the cases, it takes attackers days or less to compromise their target, while one-fourth of the time, victim organizations discover the attack in days or less.

"Attackers are getting quicker at compromising systems over the past 10 years," Baker said. "Less than 25 percent of good guys discovered these incidents in days or less. This is not a good situation ... The bad guys are winning at a faster rate than the good guys are winning."

[Verizon Data Breach Investigations Report 2013 says financial cybercrime accounting for three-fourths of real-world breaches, followed by cyberespionage in one-fifth of breaches. See No 'One Size Fits All' In Data Breaches, New Verizon Report Finds.]

This year's DBIR draws from 50 different contributing organizations from 95 different countries, including the U.S. Secret Service, the Poland CERT, and Latin American CERTs. That's a big jump from the 19 contributors representing 27 countries in the 2013 Verizon DBIR.

Bryan Sartin, director of Verizon's RISK Team, said incident detection is the underlying problem with the delayed awareness and reaction of victim organizations to attacks. Verizon in its report last year said most intrusions go undiscovered for seven months on average. "Victims don't even find out on their own. They are finding out from someone else," Sartin said. "Clearly, [what] has to change is detection -- the inability of victims to recognize and react to indicators of a cyberattack before it ends up a data breach and is in the headlines. That inability is security's greatest single failure."

U.S. Secret Service special agent Edward Lowery, who heads up the agency's criminal investigative division, said in a panel discussion hosted by Verizon here that it's all about the money for the bad guys his agency tracks. "They are in it for the profit, and their business model requires that they be surreptitious. It's all about the money," Lowery said.

He said the surge in retail breaches of late isn't really new to that industry. But these and other breaches are becoming more sophisticated compared with earlier attacks, such as the one on TJX. "We have seen changes in the attack vectors ... how long these individuals have been in the system. They study for their future crimes, looking for the vulnerabilities they can exploit," Lowery said. "The actual intrusion may happen really quickly, but the work they do beforehand may not happen quickly."

Verizon's Baker says the bad news from this year's report is that the cybercriminals and other attackers are getting better at what they do, while the security community is not improving its game quickly enough to keep pace.

Verizon said its upcoming DBIR will include more specific recommendations for incidents and more "actionable" information.

The 2013 Verizon DBIR found attacks occurring in minutes or less in 84 percent of the cases, while 66 percent of breaches go undetected for months or even years.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-1421
Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Craig Knudsen WebCalendar before 1.2.5, 1.2.6, and other versions before 1.2.7 allows remote attackers to inject arbitrary web script or HTML via the Category Name field to category.php.

CVE-2013-2105
Published: 2014-04-22
The Show In Browser (show_in_browser) gem 0.0.3 for Ruby allows local users to inject arbitrary web script or HTML via a symlink attack on /tmp/browser.html.

CVE-2013-2187
Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Apache Archiva 1.2 through 1.2.2 and 1.3 before 1.3.8 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, related to the home page.

CVE-2013-4116
Published: 2014-04-22
lib/npm.js in Node Packaged Modules (npm) before 1.3.3 allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names that are created when unpacking archives.

CVE-2013-4472
Published: 2014-04-22
The openTempFile function in goo/gfile.cc in Xpdf and Poppler 0.24.3 and earlier, when running on a system other than Unix, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names.

Best of the Web