June 23, 2016 By Michelle Alvarez 2 min read

According to recent IBM X-Force Interactive Security Incident data, 6 percent of the more than 1,100 companies with reported security incidents since 2011 were repeat offenders — that is, they experienced a security incident more than once in less than six years. Attack types associated with these security incidents included distributed denial-of-service (DDoS), brute-force and SQL injection attacks, as well as malware and phishing.

During this period, at least one organization experienced a total of eight incidents — seven separate reported successful DDoS attacks against its website and one incident involving the compromise of customer accounts as a result of a brute-force attack on weak or reused passwords.

Several of these repeat offenders are attractive to attackers because of their niche target audiences; they allow attackers to serve malicious content to a targeted browsing population. Operators of such websites may not be as focused on security as larger, more mainstream entities. Their weak security posture makes them a sitting duck for cybercriminals.

Repeat Offenders by the Numbers

According to X-Force data:

  • More than 460 million records were compromised as a result of the 176 incidents associated with the 70-plus repeat offenders.
  • Of the 14 repeat offenders with three or more incidents tied to their name, eight were financial institutions.
  • Of the incidents for which the attack type was known, nearly 53 percent involved DDoS. Malware was the second-most popular attack vector, making up over 14 percent of incidents.
  • About 23 percent of the 176 incidents were claimed by Qassam Cyber Fighters, who targeted U.S. banks in an ongoing hacktivist DDoS campaign over an almost two-year period. This resulted in service interruptions and downtime for customers.

Shame on My Security Posture?

Is your security posture to blame? Not necessarily.

DDoS attacks can be mounted against any organization despite a strong security posture. Internet service providers and their partners aren’t always able to defend against a major DDoS attack. Attackers keep finding new DDoS techniques, so repeat victimization is almost expected. However, removal of these incidents from the equation still paints a concerning picture.

  • According to X-Force data, the most compromised organizations (there are two) experienced a total of four security incidents, including SQL injection malware, watering-hole and brute-force attacks.
  • Forty repeat offenders totaled more than 100 incidents.
  • Of the incidents for which the attack type was known, nearly 28 percent involved malware.

Multiple Incidents, Different Attack Types

Of the companies where more than one attack types was known, about half did not experience the same attack type. In other words, a targeted company may have experienced a SQL injection attack one year and a DDoS attack with an element of extortion the following.

The main takeaway here? History doesn’t always repeat itself. Design a security strategy for the future that not only incorporates lessons learned from past breaches, but also reduces risk from multiple attack vectors and protects critical assets.

Read the complete IBM 2016 Cyber Security Intelligence Index

More from X-Force

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

Being a good CLR host – Modernizing offensive .NET tradecraft

14 min read - The modern red team is defined by its ability to compromise endpoints and take actions to complete objectives. To achieve the former, many teams implement their own custom command-and-control (C2) or use an open-source option. For the latter, there is a constant stream of post-exploitation tooling being released that takes advantage of various features in Windows, Active Directory and third-party applications. The execution mechanism for this tooling has, for the last several years, relied heavily on executing .NET assemblies in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today