Threat Intelligence

5/8/2018
08:00 AM
Connect Directly
Twitter
Twitter
RSS
E-Mail
50%
50%

Publicly Disclosed Breaches Down Drastically in Q1 2018

Quietest first quarter since 2012, according to new report from Risk Based Security.

The early part of 2018 has brought a spot of good news, as reports from first quarter show that the number of publicly reported breaches dropped dramatically compared to the same period of time last year.

"We haven't seen a Q1 this quiet since 2012," says Inga Goddijn, executive vice president for Risk Based Security, which today released the statistics from its Q1 2018 Data Breach Trends report

The study shows that organizations experienced 686 breaches that exposed approximately 1.4 billion records. That's nothing to sneeze at, but the good news is that compared to Q1 2017 both numbers have gone down more than half. In the first three months of 2017, the number of exposed records had already added up to 3.4 billion.

Goddijn and the Risk Based Security team are not sure exactly why the numbers have shifted lower, though they have a few theories. First of all, the number of attacks phishing for employee W-2 wage and salary data has plummeted. Last year's report saw 200 of these incidents in Q1 and this year it's dropped down to 35. Additionally, the change could also be attributable to the momentum growing in cryptomining activity. 

"We also think the shift toward cryptomining is possibly easing some of the attention on data theft," says Goddijn. This would reduce the number of publicly disclosed breaches but could represent a jump in malicious activity that's off the books, so to speak. "It's still too early to say for sure but it does go to show, malicious activity will follow the best opportunities for making a profit."

Regardless of shifts in attack trends, Goddijn says that all of the same old security fundamentals still apply to new threats. 

"Take cryptomining for example," she says. "Many of the same processes that are used to protect against ransomware - like good vulnerability management, restricting code execution, strong email filtering and helping users stay safe on line - are helpful for stopping mining malware too."

Organizations should also probably keep things in perspective. While the number of incidents is at a six-year low for early year activity, the only reason year-over-year number of breached records dropped is because there was such a huge spike in 2017. The 1.4 billion records exposed early this year is still more than double than the number of records exposed during Q1 of 2014, 2015 and 2016 combined.   

Interestingly, aside from the drop in W-2 phishing incidents, the mix of incident types and victim organization still remains largely static.

"The other metrics we track, such as breach types, who is being impacted, (and) size of breaches, are very similar to recent quarters," says Goddijn. "We have not observed sizable changes in the type of organizations being breached, the type of data that is being exposed, the number of large events, insider vs outsider activity, breach severity scores or where breaches are taking place. We would have expected other sizable shifts to be evident along with the drop in the number of breaches but that is not the case."

Related Content:

 

 

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
5/9/2018 | 8:16:56 AM
PUBLIC DISCLOSED
OK - what about the ones we do not know about?  
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.