May 13, 2019 By Shane Schick 2 min read

The prospect of financial gain drove 71 percent of cyberattacks in 2018, followed by the potential to conduct espionage or gain some other strategic advantage, according to a new data breach report.

Based on an analysis of more than 41,000 security incidents and more than 2,000 data breaches, Verizon’s “2019 Data Breach Investigations Report” revealed that small businesses accounted for 43 percent of all attacks, while healthcare and financial services organizations made up only 15 percent and 10 percent, respectively.

Meanwhile, top executives were targeted at a much higher rate than in previous years, and although the majority of perpetrators were outside actors (69 percent), 34 percent involved rogue employees or other internal actors.

Data Breach Report Shows the C-Suite in the Crosshairs

According to this year’s data breach report, senior executives were 12 times more likely to be targeted by cybercriminals than in the previous year. Due to their higher level of access to sensitive information, C-level executives were also nine times more likely to receive social engineering campaigns such as phishing emails.

Although phishing schemes based on simulations for data partners dropped from a 24 percent click-thru rate over the last seven years to 3 percent in 2018, 18 percent of tests showed phishing links were activated via mobile devices. This is concerning given how often C-suite executives may need to work outside the office and that ransomware still accounts for 24 percent of all attacks involving malware.

What’s Being Stolen and Who’s Stealing It?

While chief information security officers (CISOs) and their teams have been warning about password hygiene for years, the research showed 29 percent of incidents involved stolen credentials.

In addition, organized crime groups carried out 39 percent of data breaches, followed by state-affiliated organizations at 23 percent. Although more than half (51 percent) of security incidents involved hacking, internal errors accounted for 21 percent of data breaches.

How to Get Ahead of a Data Breach

The variety and volume of security threats make it difficult for organizations to keep up; the data breach report noted that 56 percent of data breaches took months or longer to discover.

Security experts suggest conducting penetration testing and red team exercises to improve the organization’s preparedness to prevent and respond to data breaches.

More from

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today