Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security //

Data Leakage

5/8/2018
08:05 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now
50%
50%

Number of Data Breach Reports Fell More Than 50% in Q1 Study

The number of reported data breaches fell more than 50% in the first quarter of this year compared to the same time in 2017, as attackers focused more on cryptomining and cryptojacking schemes.

The number of reported data breaches fell by more than 50% when comparing the first quarter of this year to the same time period in 2017, as cybercriminals switched from ransomware to more lucrative cryptomining and cryptojacking schemes, a new industry survey released Tuesday revealed.

In the first quarter of 2017, there were 1,442 data breaches reported and that resulted in over 3 billion records being exposed. In the first three months of this year, however, the number of reported breaches dropped to 686 incidents with 1.4 billion records exposed.

Most of the records exposed this year are related to a single incident that happened in India, according to Risk Based Security, which released its first-quarter data breach report on May 8.

While the number of data breaches fell 52% year-over-year, attackers remained busy as the number of cryptomining and crypojacking incidents increased as cybercriminals turned their attention to the volatile cryptocurrency market, where speculators and investors have pushed prices upward over the last six months.

The Risk Based Security report reflects other industry surveys that show as the price of Bitcoin and other cryptocurrencies began to rise at the end of 2017, cybercriminals turned away from ransomware as cryptomining schemes became much more lucrative. (See Malwarebytes: Cryptomining Surges as Ransomware Declines.)

While trends in security and cybercrime are hard to predict, Inga Goddijn, the executive vice president of Risk Based Security, notes that these cryptomining and cryptojacking incidents are unlikely to stop anytime soon. (See Android Crypto Mining Attacks Go for Monero .)

"For financially motivated actors, it appears to be a much more reliable method of monetizing their activity," Goddijn wrote an email to Security Now, adding:

Ransomware can be very effective -- we wouldn't have seen the level of activity in 2017 that we did if it wasn't -- but for ransomware to work as a money-making scheme the impacted organization has to pay the extortion demand. Stealing resources to mine for currency can produce more consistent returns. That's the beauty of these schemes -- they don't rely on people making the decision to pay. The malware starts to produce results once it's successfully launched in the victim's system. As long as crypto mining activities produce income, I expect the activity will be with us even if currency valuations decline somewhat.

These cryptomining incidents are now so widespread, Google took the unusual step of announcing that it would ban all cryptomining extensions from its Chrome store by the end of the year. (See Google Web Store Bans Cryptomining Extensions.)

Breaches still a factor
Despite the shift from stealing data to cryptomining schemes, data breaches remain a significant concern for many enterprises. The report finds that more than 50% of the reported incidents in the first quarter involved the business sector, with government (14.4%), medical (10.2%) and education (7%) affected during this time as well.

The report notes that one incident, a data breach involving India's Aadhaar database, which the government uses to track identification and biometric documents of citizens, accounted for 81% of the 1.4 billion record exposed during the quarter.

Also of interest in the report is that the number of data breaches involving fraud jumped, with 1.27 billion records exposed by this method during the quarter. (Hacking remains the most common cause of a data breaches, with nearly 39% of incidents related to this type of attack.)


The fundamentals of network security are being redefined -- don't get left in the dark by a DDoS attack! Join us in Austin from May 14-16 at the fifth-annual Big Communications Event. There's still time to register and communications service providers get in free!

Once again, this is due to one specific case: The Facebook and Cambridge Analytica incident first reported by the UK press about two months ago. (See Facebook Privacy Policy Is Under Investigation by FTC.)

In her email, Goddijn noted that while the Facebook and Cambridge Analytica incident does not reflect a typical data breach, the fallout and security questions it raised should serve as a warning sign to enterprises everywhere.

"The event had all of the classic fallout we'd expect to see from a security breach," Goddijin wrote. "Lawsuits were filed, regulatory investigations were launched, executives were summoned to testify at governmental hearings and the public backlash was immediate. What's more, Facebook's response was very similar with what we'd expect to see with a major security breach, announcing a sweeping audit of third-party application providers and even a data abuse bounty program to complement their existing bug bounty program. As data collection and use issues start to look more and more like data security problems, we should expect the security industry to be tapped to provide solutions."

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-34362
PUBLISHED: 2021-10-22
A command injection vulnerability has been reported to affect QNAP device running Media Streaming add-on. If exploited, this vulnerability allow remote attackers to run arbitrary commands. We have already fixed this vulnerability in the following versions of Media Streaming add-on: QTS 5.0.0: Media ...
CVE-2021-41127
PUBLISHED: 2021-10-21
Rasa is an open source machine learning framework to automate text-and voice-based conversations. In affected versions a vulnerability exists in the functionality that loads a trained model `tar.gz` file which allows a malicious actor to craft a `model.tar.gz` file which can overwrite or replace bot...
CVE-2021-41169
PUBLISHED: 2021-10-21
Sulu is an open-source PHP content management system based on the Symfony framework. In versions before 1.6.43 are subject to stored cross site scripting attacks. HTML input into Tag names is not properly sanitized. Only admin users are allowed to create tags. Users are advised to upgrade.
CVE-2021-27746
PUBLISHED: 2021-10-21
"HCL Connections Security Update for Reflected Cross-Site Scripting (XSS) Vulnerability"
CVE-2021-36869
PUBLISHED: 2021-10-21
Reflected Cross-Site Scripting (XSS) vulnerability in WordPress Ivory Search plugin (versions <= 4.6.6). Vulnerable parameter: &post.