Image: Verizon
More Than Half Of Web Application Attacks Via Stolen Credentials
Web application security often focuses on the bugs: SQL injection, cross-site scripting, validation errors, and other flaws. But the Verizon report shows that most breaches occur via stolen user credentials harvested via key loggers or other malware, for instance.
Spitler points out that 95% of Web application attacks in financial, public, and information industries, came via credentials stolen from their customers. The attackers basically used their customers' credentials to access the Web apps.
"What we have here are companies … relying on the security of their customer base," he says. "Over one half of Web app attacks came from the use of stolen credentials … regardless of the [attackers'] motives."