Most 2011 cyberattacks were avoidable, Verizon says
Despite all the hype about sophisticated attack methods, 97% could have been stopped using fundamental precautions
Computerworld - Despite rising concern that cyberattacks are becoming increasingly sophisticated, hackers used relatively simple methods 97% of data breaches in 2011, according to a report compiled by Verizon.
The annual Verizon report on data breaches, released Thursday, also found that in a vast majority of attacks (80%), hackers hit victims of opportunity rather than companies they sought out.
The findings suggest that while companies are spending increasing sums of money on sophisticated new security controls, they are also continuing to overlook fundamental security precautions.
The conclusions in the Verizon report are based on the investigations into more than 850 data breaches. The report was compiled with the help of the U.S. Secret Service and law enforcement agencies in the United Kingdom, The Netherlands, Ireland and Australia, Verizon said.
Verizon said it found that attacks by so-called "hactivist" groups such as Anonymous for the first time compromised more breached records -- more than 100 million -- than the number of attacks by hackers specifically looking to steal financial or personal data.
Data breach victims and security vendors generally tend to describe attacks as highly sophisticated and involving a great deal of expertise on the part of hackers.
The Verizon report though shows a far more mundane reality.
Most of the breaches didn't require hackers to possess special skills or resources, or to do much customization work. In fact, Verizon said that 96% of the attacks "were not highly difficult" for the hackers.
"Additionally, 97% were avoidable, without the need for organizations to resort to difficult or expensive countermeasures," the report said.
Very often, the companies breached had no firewalls, had ports open to the Internet or used default or easily guessable passwords, said Marc Spitler a Verizon security analyst.
The study found that cybercriminals did not have to work any harder to break into a large organization than into a small one.
Attackers in 2011 generally didn't need new sophisticated tools to break into most organizations, Spitler said.
"We have seen nothing new. Some of the old standbys are continuing to work very well for the people going after information," he said. "Not enough has been done to raise the bar and to force them to spend" significant sums on new tools and exploits.
The most sophistication found by the researchers was in the methods used by attackers to steal data after breaking in to systems, he said.
Attackers typically have installed malware on a victim company's network to escalate privileges, set up backdoors, enable remote control and sniff out sensitive data. Many take steps to remain hidden on the network for a long time and then wipe their tracks when they are done.
Such tasks require moderate to advanced skills and extensive resources on the part of the attackers, according to Spitler. "That is one area where we have raised the bar," he said.
Most of the targeted attacks last year were directed large companies in the finance and insurance industries, according to Verizon.
Hackers, often part of organized groups, used large-scale automated methods to find vulnerable businesses to exploit.
In such cases, more than 85% of victim companies employed less than 1,000 employees and were mostly in the retail, hospitality and food services industries.
The findings once again highlight the need for companies to pay attention to security basics, Spitler said.
"It is about going back to basic security principles. A lot of the same recommendations we have used in past years, we have recommended this year," he said.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
Read more about Security in Computerworld's Security Topic Center.
- Single-Vendor Security Ecosystems Offer Concrete Benefits Over Point Solutions IT security decision-makers from companies with 100 to 5,000 employees evaluates the current endpoint security solution market based on Forrester's own market data,...
- Case Study: Intuit Turns to Self-Service IT Intuit empowered its users to resolve their own IT issues with a consumer-like experience to free IT to focus on more strategic initiatives....
- Automation for a Better Tomorrow Check out the five most common annoyances facing enterprise IT service desks today, and how automation can resolve all of them. Download the...
- Beyond the Enterprise App Store Leverage proactive, secure and automated IT Service delivery to move beyond the traditional App Store and empower your users. Read the white paper...
- Business-driven data protection Setting up data protection infrastructures with your organizations' core mission or business in mind is key. In this webinar, the ARCserve team will...
- On-Demand Webinar: Mind the Gap! Watch the webinar featuring Bob Janssen, CTO and Co-Founder of RES Software, to start building a solid foundation for business and IT to... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!