Thursday, March 13, 2025, 4:19PM |  62°
MENU
Advertisement

Data breach methods getting more sophisticated

Data breach methods getting more sophisticated

Malware, phishing scams and other old-fashioned hacking techniques took the lead as the primary causes of more than 2,000 confirmed data breaches last year that were examined in a new report by communications company Verizon.

Compiled with the help of 70 national and international cybersecurity organizations, the report used data breach insurance claims as well as data from a dozen contributing companies to examine 79,790 security incidents and 2,122 confirmed data breaches in more than 61 countries.

The good news: Smartphones were relatively safe. Only 0.03 percent per week, out of tens of millions of Android phones within the Verizon Wireless network, contained what was called “truly malicious” malware. Those using iPhones had even less reason to worry since most of the suspicious activity found on the iOS platform were “failed Android exploits,” according to the study.

Advertisement

The bad news: The research pinpointed approximately 170 million malware events — an average of 5 events per second — last year. Companies with confirmed breaches lost around $400 million, an average of 58 cents per stolen record.

Companies are taking longer than experts would like to discover breaches, according to Bob Rudis, lead author of the report and Verizon managing principal.

“The attackers are still moving really fast and getting faster and better, and while the defenders are getting better, they’re still not getting better faster than the attackers are,” Mr. Rudis said during a conference call Tuesday.

Most of the cracks that let hackers into systems could be traced directly to human error.

Advertisement

Ninety-six percent of all security breach incidents fell into 9 patterns that were narrowed down further to categories of miscellaneous errors, crimeware, insider misuse and lost/​stolen devices. Common vulnerabilities and exploits — vulnerabilities within software and other systems — followed a similar pattern: 99 percent were compromised long after existence of that vulnerability was identified, with 71 percent being exposed at least a year later.

The latest malware — malicious software downloaded to computers — and phishing attacks — email traps used to break into systems — often appear as the same robbers from a decade ago wearing different masks, according to Amy Baker, vice president of marketing for Oakland security training firm Wombat Security. Wombat was one of the 70 firms tapped to help Verizon compile the report.

“It’s not exactly the same playing field as it might have been 10 years ago when it comes to phishing attacks. They’ve certainly become a lot more sophisticated …,” she said.

Where attacks of yesteryear might have involved a foreign prince and promises of riches through shady exchanges of currency, Mrs. Baker said today’s phishers scan social media for birthdays, job titles and anything else that can be used to create the appearance an email request is coming from a legitimate source.

Regardless of increasing sophistication, companies aren’t taking the possibility of threats as seriously as they could, said Erik Knight, CEO of Phoenix firewall company SimpleWan. He thinks that could change once individuals are held accountable for errors that lead to attacks.

“Traditionally, when you ask why you haven’t seen a whole lot of change in the past decade [it’s] because the liability — what’s basically a slap on the wrist for that company — hasn’t been that big. But with [payment card industry] changes, a lot of medical record changes, the government’s starting to step in,” he said.

“You’ve got Congress reviewing bills, and it’s going to become more and more costly for these businesses to have a breach. When these go down, I have no doubt there will be related firings to go with it.”

First Published: April 15, 2015, 4:00 a.m.

RELATED
SHOW COMMENTS (0)  
Join the Conversation
Commenting policy | How to Report Abuse
If you would like your comment to be considered for a published letter to the editor, please send it to letters@post-gazette.com. Letters must be under 250 words and may be edited for length and clarity.
Partners
Advertisement
Pittsburgh Steelers head coach Mike Tomlin greets New York Jets quarterback Aaron Rodgers (8) after an NFL football game, Sunday, Oct. 20, 2024, in Pittsburgh.
1
sports
Gerry Dulac: Steelers have made offer to Aaron Rodgers, but holdup has nothing to do with money
Pittsburgh Steelers head coach Mike Tomlin, left, reacts during the first half of an NFL football game against the Los Angeles Chargers, Sunday, Sept. 22, 2024, in Pittsburgh.
2
sports
Joe Starkey: Stories of freshly departed Steelers don’t reflect well on Mike Tomlin, Omar Khan
Mason Rudolph of the Pittsburgh Steelers warms up before the game against the Buffalo Bills at Highmark Stadium on January 15, 2024 in Orchard Park, New York.
3
sports
Mason Rudolph coming back to Steelers as they await Aaron Rodgers decision
A member of civil defense canine unit searches for Sudiksha Konanki, a university student from the U.S. who disappeared on a beach in Punta Cana, Dominican Republic, Monday, March. 10, 2025. (AP Photo/Francesco Spotorno)
4
news
Interpol issues global alert for Pitt student missing in Dominican Republic
Steelers general manager Omar Khan watches warm-ups before the game between the Steelers and the New York Giants on Monday, Oct. 28, 2024.
5
sports
Brian Batko's Steelers mailbag: How did they end up grasping at quarterback straws like this?
Advertisement
LATEST business
Advertisement
TOP
Email a Story