Is it your turn now?

August 2016 Editor's Choice, Information Security

There is a continual stream of news about who has just been hacked, who has had their Twitter or Facebook account compromised (the latest was the CEO of Twitter, preceded ironically enough by the CEO of Facebook) and who has lost money or brand prestige as a result of cybercrime.

While we tend to shake our heads and perhaps even have a good chuckle about breaches, such as the RSA (a security company) breach a few years ago that cost the company millions, the reality is nobody is safe and breaches affect everyone, not only the companies concerned. In fact, back in 2013, South Africa ranked third in the world when it came to the number of cybercrime victims (after Russia and China) according to the 2013 Norton Cybercrime report, so we have nothing to be complacent about when it comes to cybercrime, no matter how unimportant you think you are to criminals.

The Verizon 2016 Data Breach Investigations Report (DBIR), an annual report backed by the leading security operations globally, from EuroPol to US-CERT (Computer Emergency Readiness Team) and many more (the report can be found at http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/), delivers some frightening statistics about the risks we face in the cyber world and the apparent ease with which the cyber criminals gain access to almost anything.

Far from the old idea that breaches are just hackers showing off, the DBIR found that “89% of breaches had a financial or espionage motive”. The most unpleasant fact about the report, if one can choose one fact from the many presented, was that the researchers found in “93% of cases, it took attackers minutes or less to compromise systems. Organisations, meanwhile, took weeks or more to discover that a breach had even occurred – and it was typically customers or law enforcement that sounded the alarm, not their own security measures.”

Allowing criminals to stay in your system for days or weeks simply enables them to infiltrate more of your systems, obtaining access to more sensitive data which they can sell or use in their financial or espionage pursuits. It’s worth noting that espionage refers to ‘spying’ from a national perspective, such as the American NSA snooping on everything they can find, as well as industrial espionage where competitors can download your IP, your plans, your pricing models and your customer database, among other interesting things you would prefer they don’t have. Of course, certain countries have intelligence agencies that steal IP to assist their own country’s businesses.

Stopping these breaches is therefore critical; however, we know that no system is invulnerable. Let’s remember that Standard Bank was hit for around R300 million recently, and one would assume its security is a notch or two above that of your average company.

Nine patterns

The DBIR reports that 95% of the security breaches and 86% of the incidents included in its 2016 report fit into nine patterns, which may be a good place for vulnerable companies to start planning their defensive strategies. It’s also worth noting that the criminal element is always improving its game and looking for new information to sell or use, so information security is a continual process of improvement.

In short, the nine patterns highlighted in the DBIR are as follows:

1. Miscellaneous errors: These are unintentional mistakes that compromise security. This can include a shortage of server capacity where key applications crash during spikes in activity, or it can be a simple or careless mistake on the part of an employee – and not always those with administrator privileges. The industries most affected by these vulnerabilities include the public sector, healthcare and information sectors (these are global findings and not specific to South Africa or Africa).

2. Insider and privilege misuse: In this pattern, insiders are part of the plot to either make themselves a buck or part of a team looking for profit or intellectual property. Collusion often allows outsiders to access the organisation’s network and the damage is done from there. Another entry point is from contractors and business partners who have been granted access in order to streamline the companies’ interactions with the host. DBIR notes that healthcare, public sector and administrative industries are the most affected.

3. Physical theft and loss: It’s not all hacking and gaining access to the corporate network. The loss of laptops, mobile devices, USB sticks and even paper documents with sensitive information on them is also a factor in information crimes. Interestingly, DBIR found that 39% of this theft is from victim’s work areas and 34% from their personal vehicles. Once again, healthcare and the public sector are the primary targets.

4. Denial of service (DoS): DoS attacks bring IT systems to their knees by flooding them with requests for information, such as millions of requests for a web page. According to the DBIR: “The median traffic of a DoS attack is 1.89 million packets per second – that’s like over 113 million people trying to access your server every minute.” Normal operations grind to a halt and chaos ensues. These attacks are mostly used to cause problems and not to steal data or money, but can also be used as a diversion. DBIR found that they are the fourth most common attack pattern and they mostly affect the entertainment, professional and educational sectors.

5. Crimeware: The DBIR defines crimeware as any malware (malicious software) that “doesn’t fit into a more specific pattern”. The attacks are opportunistic, such as an email containing an infected attachment and so forth. The report shows that 39% or crimeware in 2015 involved ransomware, a statistic which is sure to be higher in 2016 given the profitability of this form of attack. While everyone is a target, including consumers, the DBIR notes that the most affected industries are the public, manufacturing and information sectors.

6. Web app attacks: These attacks focus on the weaknesses in web applications, such as content management systems or e-commerce platforms, where malware is introduced to the organisation’s server through these vulnerabilities. The majority (95%) are motivated by financial motives and the most common targets are the financial services, retail and information sectors.

7. Point-of-sale (PoS) intrusions: These attacks, such as the famous Target attack in the US, are targeted at PoS applications and aim to capture payment data, such as credit card information. The attacks are mostly aimed at retail and hospitality (accommodation) organisations where security is often not the top concern. The DBIR report notes that 95% of confirmed breaches in 2015 in the hospitality sector were via PoS intrusions.

8. Cyber espionage: These attacks are mostly carried out by national players on the lookout for intellectual property of various sorts. The attacks start with the other patterns mentioned here, but then take a far more sophisticated turn once the criminals are in. The manufacturing, information and professional sectors are most affected, with DBIR finding “47% of all confirmed breaches in manufacturing could be classified as cyber espionage”.

9. Payment card skimmers: A firm favourite in South Africa, skimmers can be used at ATMs or PoS stations, or even with handheld card scanners. The favourite destinations for these attacks are the financial services, hospitality and retail sectors.

With most of the cyber attacks focused on these areas, companies have a place to start in developing a security strategy. However, it’s always wise to remember the basics. The DBIR reports: “The top 10 vulnerabilities [Common Vulnerabilities and Exposures, or CVEs] accounted for 85% of successful exploit traffic. The other 15% comprises over 900 CVEs.”

Keeping your software patches up-to-date is therefore a ‘simple’ task that will offer protection from many attacks. Of course, it’s not always easy to know when a new patch is available for various applications and what the knock-on effects on other applications may be, but there are solutions to assist organisations in this process. Using intelligence is key to remaining informed and secure.

Interestingly, the DBIR report states that vulnerabilities in Adobe products were the quickest to be exploited, while Mozilla (developers of the Firefox browser) applications took the longest time to be breached.

The information in this article is a small sample from the 2016 Data Breach Investigations Report from Verizon. The full report is packed with information and advice on information security and is well worth the effort to read. To download the report and sign up for additional information, go to http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/ (short URL: securitysa.com/*vz16si”).



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.