Vulnerabilities / Threats
2/7/2012
05:12 AM
Dark Reading
Dark Reading
Quick Hits
50%
50%

How (And Why) Attackers Choose Their Targets

To build a sure defense, you need to know what makes you a juicy target. Here are some tips

[The following is excerpted from "How (and Why) Attackers Choose Their Targets," a new report posted this week on Dark Reading's Vulnerability Management Tech Center.]

Every day, we hear another story about a company whose sensitive data has been breached. Press releases, tweets, customer support email, and followup articles all provide insight into the kind of information that’s been compromised, the company’s plans to investigate, and how affected parties can protect themselves. But what’s almost never shared—unless the attacker spreads the word—is how and why the target was chosen and which methods and tools were used.

To effectively fend off attacks and protect our data systems, we must determine how hackers identify their targets and exploit weaknesses to extract data. We must also understand what motivates hackers.

Verizon’s 2011 Data Breach Investigations Report found that 92 percent of data breaches studied stemmed from external agents, 17 percent from implicated insiders, 9 percent from multiple parties and fewer than 1 percent from business partners.

There is no single method used to identify and compromise vulnerable targets. Much like rock stars and CEOs, each attacker has a unique style and process. However, some methods are simply more successful than others and thus tend to be used more often.The 2011 Verizon Data Breach Investigations Report found that 50 percent of breaches studied resulted from some form of hacking, 49 percent incorporated malware, 29 percent involved physical attacks, 17 percent resulted from privilege misuse, and 11 percent employed social tactics.

To identify vulnerable hosts, an attacker will begin scanning for a specific set of vulnerabilities known to be exploitable and prevalent in the wild. And, much like security industry professionals discuss best practices, attackers share knowledge about how quickly each finds targets vulnerable to specific attacks.

Many scripts and scanners are used to find and exploit vulnerabilities—the MySql 5 Enumeration script from Blackhat Academy, for instance, is used to automatically exploit SQL injection flaws. It is trivial to wrap this script with a scanner that spiders a provided URL list and tests for SQL injection flaws. This type of attack targets a known type of vulnerability rather than a specifically known application flaw. These attacks allow a hacker to exploit flaws a company isn’t even aware of and thus probably won’t have an immediate fix for.

To learn more about how attackers find vulnerabilities and choose the organizations they want to go after, download the full report on how hackers choose their targets.

Have a comment on this story? Please click "Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2188
Published: 2015-02-26
The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connecti...

CVE-2015-0594
Published: 2015-02-26
Multiple cross-site scripting (XSS) vulnerabilities in the help pages in Cisco Common Services, as used in Cisco Prime LAN Management Solution (LMS) and Cisco Security Manager, allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCuq54654 and CSCun1...

CVE-2015-0632
Published: 2015-02-26
Race condition in the Neighbor Discovery (ND) protocol implementation in Cisco IOS and IOS XE allows remote attackers to cause a denial of service via a flood of Router Solicitation messages on the local network, aka Bug ID CSCuo67770.

CVE-2015-0651
Published: 2015-02-26
Cross-site request forgery (CSRF) vulnerability in the web GUI in Cisco Application Networking Manager (ANM), and Device Manager (DM) on Cisco 4710 Application Control Engine (ACE) appliances, allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuo99753.

CVE-2015-0882
Published: 2015-02-26
Multiple cross-site scripting (XSS) vulnerabilities in zencart-ja (aka Zen Cart Japanese edition) 1.3 jp through 1.3.0.2 jp8 and 1.5 ja through 1.5.1 ja allow remote attackers to inject arbitrary web script or HTML via a crafted parameter, related to admin/includes/init_includes/init_sanitize.php an...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.