Feeds

Verizon: 96 PER CENT of state-backed cyber-spying traced to China

Lock up your data, folks

SANS - Survey on application security programs

Spooks carrying out state-sponsored cyber-espionage were responsible for one in five data breaches last year, researchers have claimed.

New statistics contained in Verizon’s Data Breach Investigation Report 2012 found that 19 per cent of all attacks were carried out by agents acting on behalf of their government. Researchers recorded more cyber-espionage incidents than ever before, although the majority of attacks were carried out by criminals looking to make money.

Bosses will be comforted by the finding that “external actors” were responsible for the majority of data breaches, with 92 per cent of all incidents involving an attack from someone working outside the the organisation.

Researchers examined more than 47,000 security incidents and 621 confirmed data breaches affecting international organisations from 27 countries, including government agencies, financial institutions and defence contractors. Since the first report was compiled nine years ago, boffins have pored over more than 2,500 data breaches.

The report, which was released today and covers 2012, said: “State-affiliated groups rise to the number two spot for the 2012 dataset ... We saw a dip in financially motivated cases against small organizations in our dataset, and that dip allows other trends to become more pronounced. Furthermore, our own investigations comprised more espionage cases than any previous year.”

Financial organisations suffered the most attacks, accounting for 37 per cent of recorded data breaches. Just over half (52 per cent) of all breaches involved “some sort of hacking” while 76 per cent of “network intrusions involved exploiting weak or stolen credentials” - which basically means someone didn’t set up a decent password.

Some 21 percent of the attacks were carried out by state-affiliated hackers on espionage missions, 96 percent of which could be tracked back to China.

Organised crime was responsible for 55 percent of all breaches, with the majority of attacks coming from the US or Eastern Europe.

The report added: “More than half of all external breaches tie to organized criminal groups. This reflects the high prevalence of illicit activities associated with threat actors of this ilk, such as spamming, scamming, payment fraud, account takeovers and identity theft. For professional criminals, the “why” is simple and consistent—money . As economic and social activities continue to go online, criminals will follow in order to exploit the soaring amount of data that can all too easily be converted to cash.”

Jason Hart, cloud solutions veep at SafeNet, said the data demanded a new way of thinking about security.

He said: “Verizon can always be relied on to lift the lid on hackers' motives and this new batch of data is shocking. While data breaches seem rampant, these results could trigger a real sea change in data protection strategies. Embracing a secure breach strategy renders lost or stolen worthless to the attacker, making the only serious mitigation of the threat to sensitive data held by enterprises and governments.” ®

High performance access to file storage

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.