throbber
2019 Data Breach
`Investigations
`Report
`
`business ready
`
`4
`
`e 6 f 2
`
`0 6
`
`3 6 f 7
`
`6 6
`
`5 7
`
`2 2
`
`0 6
`
`3 6
`
`8 6 1 6
`
`c 6
`
`c 6
`
`5 6
`
`e 6
`
`7 6
`
`5 2
`
`0 7
`
`4 6
`
`8 6
`
`9 7
`
`3 2
`
`0 7
`
`9 6
`
`5 6 1 7
`
`2
`
`WIZ, Inc. EXHIBIT - 1027
`WIZ, Inc. v. Orca Security LTD.
`
`

`

`2
`
`A couple of tidbits
`
`Before we formally introduce you to the 2019 Data Breach Investigations Report (DBIR),
`let us get some clarifications out of the way first to reduce potential ambiguity around terms,
`labels, and figures that you will find throughout this study.
`
`VERIS resources
`
`Industry labels
`
`We align with the North American Industry Classification
`System (NAICS) standard to categorize the victim organizations
`in our corpus. The standard uses 2 to 6 digit codes to classify
`businesses and organizations. Our analysis is typically done at
`the 2-digit level and we will specify NAICS codes along with an
`industry label. For example, a chart with a label of Financial (52)
`is not indicative of 52 as a value. 52 is the NAICS code for the
`Finance and Insurance sector. The overall label of “Financial” is
`used for brevity within the figures. Detailed information on the
`codes and classification system is available here:
`
`https://www.census.gov/cgi-bin/sssd/naics/naicsrch?chart=2017
`
`New chart, who dis?
`
`You may notice that the bar chart shown may not be as, well, bar-
`ish as what you may be used to. Last year we talked a bit in the
`Methodology section about confidence. When we say a number is
`X, it’s really X +/- a small amount.
`
`Server (Just large organization breaches, n=335)
`
`Server (All breaches, n=1,881)
`
`The terms “threat actions,” “threat actors,” “varieties,” and “vectors”
`will be referenced a lot. These are part of the Vocabulary for Event
`Recording and Incident Sharing (VERIS), a framework designed to
`allow for a consistent, unequivocal collection of security incident
`details. Here are some select definitions followed by links with
`more information on the framework and on the enumerations.
`
`Threat actor:
`Who is behind the event? This could be the external “bad guy”
`that launches a phishing campaign, or an employee who leaves
`sensitive documents in their seat back pocket.
`
`Threat action:
`What tactics (actions) were used to affect an asset? VERIS uses
`seven primary categories of threat actions: Malware, Hacking,
`Social, Misuse, Physical, Error, and Environmental. Examples at a
`high level are hacking a server, installing malware, and influencing
`human behavior.
`
`Variety:
`More specific enumerations of higher level categories - e.g.,
`classifying the external “bad guy” as an organized criminal group,
`or recording a hacking action as SQL injection or brute force.
`
`Learn more here:
`• github.com/vz-risk/dbir/tree/gh-pages/2019 – DBIR figures and
`figure data.
`• veriscommunity.net features information on the framework with
`examples and enumeration listings.
`• github.com/vz-risk/veris features the full VERIS schema.
`• github.com/vz-risk/vcdb provides access to our database on
`publicly disclosed breaches, the VERIS Community Database.
`• http://veriscommunity.net/veris_webapp_min.html
`allows you to record your own incidents and breaches. Don’t fret,
`it saves any data locally and you only share what you want.
`
`Incident vs. breaches
`
`We talk a lot about incidents and breaches and we use the
`following definitions:
`
`Incident:
`A security event that compromises the integrity, confidentiality
`or availability of an information asset.
`
`Breach:
`An incident that results in the confirmed disclosure—not just
`potential exposure—of data to an unauthorized party.
`
`1https://en.wikipedia.org/wiki/Confidence_interval
`
` 80%
`
` 100%
`
` 40%
`
` 60%
`
`0%
` 20%
`Breaches
`Figure 1. Top asset variety in breaches
`Figure 1. Top asset variety in breaches
`This year we’re putting it in the bar charts. The black dot is the
`value, but the slope gives you an idea of where the real value could
`be between. In this sample figure we’ve added a few red bars to
`highlight it, but in 19 bars out of 20 (95%),1 the real number will
`be between the two red lines on the bar chart. Notice that as the
`sample size (n) goes down, the bars get farther apart. If the lower
`bound of the range on the top bar overlaps with the higher bound of
`the bar beneath it, they are treated as statistically similar and thus
`statements that x is more than y will not be proclaimed.
`
`Questions? Comments? Brilliant ideas?
`We want to hear them. Drop us a line at dbir@verizon.com,
`find us on LinkedIn, tweet @VZEnterprise with the #dbir.
`Got a data question? Tweet @VZDBIR!
`
`

`

`4
`
`5
`
`6
`
`20
`
`24
`
`27
`
`30
`
`35
`
`38
`
`41
`
`44
`
`46
`
`49
`
`52
`
`55
`
`58
`
`61
`
`62
`
`65
`
`68
`
`71
`
`75
`
`3 T
`
`able of contents
`
`Introduction
`
`Summary of findings
`
`Results and analysis
`
`Unbroken chains
`
`Incident classification patterns and subsets
`
`Data breaches: extended version
`
`Victim demographics and industry analysis
`
`Accommodation and Food Services
`
`Educational Services
`
`Financial and Insurance
`
`Healthcare
`
`Information
`
`Manufacturing
`
`Professional, Technical and Scientific Services
`
`Public Administration
`
`Retail
`
`Wrap up
`
`Year in review
`
`Appendix A: Transnational hacker debriefs
`
`Appendix B: Methodology
`
`Appendix C: Watching the watchers
`
`Appendix D: Contributing organizations
`
`

`

`It is our charge to present information on the common
`tactics used by attackers against organizations in
`your industry. The purpose of this study is not to
`rub salt in the wounds of information security, but to
`contribute to the “light” that raises awareness and
`provides the ability to learn from the past. Use it as
`another arrow in your quiver to win hearts, minds, and
`security budget. We often hear that this is “required
`reading” and strive to deliver actionable information in
`a manner that does not cause drowsiness, fatigue,
`or any other adverse side effects.
`
`We continue to be encouraged and energized by
`the coordinated data sharing by our 73 data sources,
`66 of which are organizations external to Verizon.
`This community of data contributors represents an
`international group of public and private entities willing
`to support this annual publication. We again thank
`them for their support, time, and, of course, DATA.
`
`We all have wounds, none of us knows everything,
`let’s learn from each other.
`
`Excelsior!2
`
`4 I
`
`ntroduction
`
`“The wound is the place where the light enters you.”
`— Rumi
`
`Welcome! Pull up a chair with the 2019 Verizon
`Data Breach Investigations Report (DBIR).
`The statements you will read in the pages that follow
`are data-driven, either by the incident corpus that
`is the foundation of this publication, or by non-incident
`data sets contributed by several security vendors.
`
`This report is built upon analysis of 41,686 security
`incidents, of which 2,013 were confirmed data
`breaches. We will take a look at how results are
`changing (or not) over the years as well as digging
`into the overall threat landscape and the actors,
`actions, and assets that are present in breaches.
`Windows into the most common pairs of threat
`actions and affected assets also are provided.
`This affords the reader with yet another means to
`analyze breaches and to find commonalities above
`and beyond the incident classification patterns that
`you may already be acquainted with.
`
`Fear not, however. The nine incident classification
`patterns are still around, and we continue to focus on
`how they correlate to industry. In addition to the nine
`primary patterns, we have created a subset of data to
`pull out financially-motivated social engineering (FMSE)
`attacks that do not have a goal of malware installation.
`Instead, they are more focused on credential theft and
`duping people into transferring money into adversary-
`controlled accounts. In addition to comparing industry
`threat profiles to each other, individual industry
`sections are once again front and center.
`
`Joining forces with the ever-growing incident/breach
`corpus, several areas of research using non-incident
`data sets such as malware blocks, results of phishing
`training, and vulnerability scanning are also utilized.
`Leveraging, and sometimes combining, disparate data
`sources (like honeypots and internet scan research)
`allows for additional data-driven context.
`
`2If you didn’t expect a Stan Lee reference in this report, then you are certainly a first-time reader. Welcome to the party pal!
`
`

`

`69% perpetrated by outsiders
`
`34% involved Internal actors
`
`2% involved Partners
`
`5% featured Multiple parties
`
`Organized criminal groups
`were behind 39% of breaches
`
`5 S
`
`ummary
`of findings
`
`16% were breaches of Public sector entities
`
`15% were breaches involving Healthcare organizations
`
`10% were breaches of the Financial industry
`
`43% of breaches involved small business victims
`
`Actors identified as nation-state or state-
`a(cid:17)liated were involved in 23% of breaches
`
` 40%
`
`0%
` 20%
`Breaches
`Figure 2. Who are the victims?
`
` 60%
`
` 80%
`
` 100%
`
`52% of breaches featured Hacking
`
`33% included Social attacks
`
`28% involved Malware
`
` 40%
`
`0%
` 20%
`Breaches
`Figure 4. Who's behind the breaches?
`
` 60%
`
` 80%
`
` 100%
`
`71% of breaches were financially motivated
`
`25% of breaches were motivated by the gain
`of strategic advantage (espionage)
`
`Errors were causal events in 21% of breaches
`
`32% of breaches involved phishing
`
`15% were Misuse by authorized users
`
`29% of breaches involved use of stolen credentials
`
`Physical actions were present in 4% of breaches
`
`56% of breaches took months or longer to discover
`
` 40%
`
`0%
` 20%
`Breaches
`Figure 3. What tactics are utilized?
`
` 60%
`
` 80%
`
` 100%
`
` 40%
`
`0%
` 20%
`Breaches
`Figure 5. What are other commonalities?
`
` 60%
`
` 80%
`
` 100%
`
`

`

`6
`
`Results and analysis
`
`year the trend continues. There are some subsets
`of data that are removed from the general corpus,
`notably over 50,000 botnet related breaches. These
`would have been attributed to external groups and,
`had they been included, would have further increased
`the gap between the External and Internal threat.
`
`External
`
`Internal
`
`Partner
`
`2011
`
`2013
`
`2015
`
`2017
`
`Figure 6. Threat actors in breaches over time
`
`Financial
`
`Espionage
`
`2011
`
`2013
`
`2015
`
`Other
`
`2017
`
`Figure 7. Threat actor motives in breaches over time
`
`80%
`
`60%
`
`40%
`
`20%
`
`0%
`
`Breaches
`
`75%
`
`50%
`
`25%
`
`0%
`
`Breaches
`
`The results found in this and subsequent sections
`within the report are based on a data set collected
`from a variety of sources such as publicly-disclosed
`security incidents, cases provided by the Verizon
`Threat Research Advisory Center (VTRAC)
`investigators, and by our external collaborators. The
`year-to-year data set(s) will have new sources of
`incident and breach data as we strive to locate and
`engage with organizations that are willing to share
`information to improve the diversity and coverage
`of real-world events. This is a convenience sample,
`and changes in contributors, both additions and
`those who were not able to participate this year, will
`influence the data set. Moreover, potential changes
`in their areas of focus can stir the pot o’ breaches
`when we trend over time. All of this means we are not
`always researching and analyzing the same fish in
`the same barrel. Still other potential factors that may
`affect these results are changes in how we subset
`data and large-scale events that can sometimes
`influence metrics for a given year. These are all
`taken into consideration, and acknowledged where
`necessary, within the text to provide appropriate
`context to the reader.
`
`With those cards on the table, a year-to-year view of
`the actors (and their motives),3 followed by changes
`in threat actions and affected assets over time is
`once again provided. A deeper dive into the overall
`results for this year’s data set with an old-school
`focus on threat action categories follows. Within
`the threat action results, relevant non-incident data
`is included to add more awareness regarding the
`tactics that are in the adversaries’ arsenal.
`
`Defining the threats
`
`Threat actor is the terminology used to describe
`who was pulling the strings of the breach (or if an
`error, tripping on them). Actors are broken out into
`three high-level categories of External, Internal, and
`Partner. External actors have long been the primary
`culprits behind confirmed data breaches and this
`
`3And we show the whole deck in Appendix B: Methodology.
`
`

`

`Organized crime
`
`State-a(cid:26)liated
`
`Cashier
`
`Activist
`
`2011
`
`2013
`
`2015
`
`2017
`
`Figure 8. Select threat actors in breaches over time
`
`System Admin
`
`7
`
`80%
`
`60%
`
`40%
`
`20%
`
`0%
`
`Breaches
`
`Financial gain is still the most common motive behind
`data breaches where a motive is known or applicable
`(errors are not categorized with any motive). This
`continued positioning of personal or financial gain at
`the top is not unexpected. In addition to the botnet
`breaches that were filtered out, there are other
`scalable breach types that allow for opportunistic
`criminals to attack and compromise numerous
`victims.4 Breaches with a strategic advantage as the
`end goal are well-represented, with one-quarter of
`the breaches associated with espionage. The ebb
`and flow of the financial and espionage motives are
`indicative of changes in the data contributions and
`the multi-victim sprees.
`
`This year there was a continued reduction in
`card-present breaches involving point of sale
`
`environments and card skimming operations.
`Similar percentage changes in organized criminal
`groups and state-affiliated operations are shown in
`Figure 8 above. Another notable finding (since we
`are already walking down memory lane) is the bump
`in Activists, who were somewhat of a one-hit wonder
`in the 2012 DBIR with regard to confirmed data
`breaches. We also don’t see much of Cashier (which
`also encompasses food servers and bank tellers)
`anymore. System administrators are creeping up
`and while the rogue admin planting logic bombs and
`other mayhem makes for a good story, the presence
`of insiders is most often in the form of errors. These
`are either by misconfiguring servers to allow for
`unwanted access or publishing data to a server that
`should not have been accessible by all site viewers.
`Please, close those buckets!
`
`4In Appendix C: “Watching the Watchers”, we refer to these as zero-marginal cost attacks.
`
`

`

`8
`
`Hacking
`
`Malware
`
`Social
`
`Error
`
`Misuse
`
`Physical
`
`Environmental
`
`2018
`
`2013
`
`53%
`
`56%
`
`DIFF
`
`-3
`
`Server
`
`2018
`
`2013
`
`63%
`
`65%
`
`29
`
`30
`
`17
`
`35
`
`17
`
`21
`
`14
`
`16
`
`4
`
`10
`
`0
`0
`
`-1
`
`+18
`
`+5
`
`-2
`
`-6
`
`0
`
`User Dev
`
`28
`
`30
`
`Person
`
`19
`
`39
`
`Media
`
`9
`
`17
`
`Kiosk/Term
`
`Network
`
`1
`
`7
`
`0
`
`1
`
`DIFF
`
`-2
`
`+2
`
`+20
`
`-8
`
`-5
`
`+1
`
`Breaches
`Figure 9. Threat actions in data breaches over time
`Figure 9. Threat actions in data breaches over
`n=2,501 (2013), n=1,638 (2018)
`time n=2,501 (2013), n=1638 (2018)
`
`Breaches
`Figure 10. Asset categories in data breaches over
`Figure 10. Asset categories in data breaches over time
`time n=2,294 (2013), n=1,513 (2018)
`n=2,294 (2013), n=1,513 (2018)
`
`Figures 9 and 10 show changes in threat actions and
`affected assets from 2013 to 2018.5,6 No, we don’t have
`some odd affinity for seven-year time frames (as far
`as you know). Prior years were heavily influenced by
`payment card breaches featuring automated attacks
`on POS devices with default credentials, so 2013
`was a better representative starting point. The rise in
`social engineering is evident in both charts, with the
`action category Social and the related human asset
`both increasing.
`
`Threat action varieties
`
`When we delve a bit deeper and examine threat actions
`at the variety level, the proverbial question of “What are
`the bad guys doing?” starts to become clearer. Figure 11
`shows Denial of Service attacks are again at the top
`
`of action varieties associated with security incidents,
`but it is still very rare for DoS to feature in a confirmed
`data breach. Similarly, Loss, which is short for Lost or
`misplaced assets, incidents are not labeled as a data
`breach if the asset lost is a laptop or phone, as there
`is no feasible way to determine if data was accessed.
`We allow ourselves to infer data disclosure if the asset
`involved was printed documents.
`
`Switching over to breaches in Figure 12, phishing and
`the hacking action variety of use of stolen credentials
`are prominent fixtures. The next group of three
`involves the installation and subsequent use of back-
`door or Command and Control (C2) malware. These
`tactics have historically been common facets of data
`breaches and based on our data, there is still much
`success to be had there.
`
`5 Credit where it’s due. These dumbbell charts are based on the design at http://www.pewglobal.org/2016/02/22/social-networking-very-popular-among-adult-internet-users-in-emerging-and-developing-nations/ and code at
`https://rud.is/b/2016/04/17/ggplot2-exercising-with-ggalt-dumbbells/
`6Note these are incident years, not DBIR years. All of the 2018 will be represented in this year’s data, but a 2012 breach not discovered until 2013 would be part of the 2014 DBIR.
`
`

`

`9
`
`DoS
`
`Loss
`
`C2
`
`Misdelivery
`
`Phishing
`
`Phishing
`
`Use of stolen creds
`
`Backdoor
`
`C2
`
`Use of backdoor or C2
`
`Use of stolen creds
`
`Privilege abuse
`
`Ransomware
`
`Privilege abuse
`
`Backdoor
`
`Spyware/Keylogger
`
`Misdelivery
`
`Capture app data
`
`Use of backdoor or C2
`
`Data mishandling
`
`Spyware/Keylogger
`
`Adminware
`
`Pretexting
`
`Data mishandling
`
`Adminware
`
`Adware
`
`Publishing error
`
`Pretexting
`
`Exploit vuln
`
`Misconfiguration
`
` 40%
`
`0%
` 20%
`Incidents
`Figure 11. Top threat action varieties in incidents, (n=17,310)
`
` 60%
`
` 80%
`
` 100%
`
` 40%
`
` 60%
`
`0%
` 20%
`Breaches
`Figure 12. Top threat action varieties in breaches (n=1,774)
`
` 80%
`
` 100%
`
`

`

`10
`
`Hacking
`
`A quick glance at the figures below uncovers two
`prominent hacking variety and vector combinations.
`The more obvious scenario is using a backdoor or
`C2 via the backdoor or C2 channel, and the less
`obvious, but more interesting, use of stolen
`credentials. Utilizing valid credentials to pop web
`applications is not exactly avant garde.
`
`The reason it becomes noteworthy is that 60%
`of the time, the compromised web application vector
`was the front-end to cloud based email servers.
`
`Web application
`
`Backdoor or C2
`
`Desktop sharing
`
`Desktop sharing software
`
`Other
`
`VPN
`
`Partner
`
`Command shell
`
`3rd party desktop
`
`Physical access
`
`Use of stolen creds
`
`Use of backdoor or C2
`
`Exploit vuln
`
`Brute force
`
`Bu(cid:6)er overflow
`
`Abuse of functionality
`
`RFI
`
`SQLi
`
`Other
`
` 40%
`
`0%
` 20%
`Breaches
`Figure 13. Top hacking action varieties in breaches (n=755)
`
` 60%
`
` 80%
`
` 40%
`
` 60%
`
`0%
` 20%
`Breaches
`Figure 14. Top hacking action vectors in breaches (n=862)
`
` 80%
`
` 100%
`
` 100%
`
`Even though stolen credentials are not directly
`associated with patch currency, it is still a necessary
`and noble undertaking. At most, six percent of
`breaches in our data set this year involved exploiting
`vulnerabilities. Remember that time your network
`was scanned for vulnerabilities and there were zero
`findings? You slept soundly that night only to be
`jolted from your drowsy utopia by your alarm radio
`blaring “I Got You Babe.” Vulnerability scanning always
`yields findings (even benign informational ones) and
`it is up to the administrators to determine which are
`accepted, and which are addressed.
`
`

`

`Malware
`
`Malware can be leveraged in numerous ways to
`establish or advance attacks. Command and Control
`(C2) and backdoors are found in both security
`incidents and breaches. Ransomware is still a major
`issue for organizations and is not forced to rely on
`data theft in order to be lucrative.
`
`C2
`
`Ransomware
`
`Backdoor
`
`Spyware/keylogger
`
`Adminware
`
`Adware
`
`Capture app data
`
`Spam
`
`Downloader
`
`Capture stored data
`
`11
`
`Figure 15 shows the patching behavior of hundreds
`of organizations from multiple vulnerability scanning
`contributors. Based on scan history, we determine
`that organizations will typically have a big push to
`remediate findings after they are initially discovered
`and after that there is a steady increase in percentage
`of findings fixed until it levels out. Not unlike the
`amount of romance and mutual regard that occurs
`while dating vs. once married. You get the idea.
`
`The area under the curve (AUC) is how protected
`you are while you are actively patching. Quick
`remediation will result in a higher AUC. The
`percentage completed-on-time (COT) is the amount
`of vulnerabilities patched at a pre-determined
`cut-off time; we used 90 days. Your COT metric
`could be different, and it would make sense to have
`different COTs for Internet-facing devices or browser
`vulnerabilities, and certainly for vulnerabilities with
`active exploitation in the wild.
`
`It is important to acknowledge that there will always
`be findings. The key is to prioritize the important
`ones and have a plan for the remaining actionable
`vulnerabilities; and to be able to defend acceptance of
`unaddressed findings.
`
`AUC: 32.4%
`COT: 43.8%
`
`30
`7
`Days taken to patch
`Figure 15. Time to patch
`
`60
`
`90
`
`100%
`
`75%
`
`50%
`
`25%
`
`0%
`
`Findings fixed
`
` 40%
`
` 60%
`
`0%
` 20%
`Incidents
`Figure 16. Top malware action varieties in incidents (n=2,103)
`
` 80%
`
` 100%
`
`

`

`12
`
`We were at a hipster coffee shop and it was packed
`with people talking about cryptomining malware as
`the next big thing. The numbers in this year’s
`data set do not support the hype, however, as this
`malware functionality does not even appear in the
`top 10 varieties. In previous versions of VERIS,
`
`cryptominers were lumped in with click-fraud, but
`they received their own stand-alone enumeration
`this year. Combining both the new and legacy
`enumerations for this year, the total was 39—more
`than zero, but still far fewer than the almost 500
`ransomware cases this year.
`
`Backdoor
`
`C2
`
`Spyware/keylogger
`
`Capture app data
`
`Adminware
`
`Downloader
`
`Email attachment
`
`Direct install
`
`Email unknown
`
`Web drive-by
`
`Download by malware
`
`Remote injection
`
`Capture stored data
`
`Email link
`
`Password dumper
`
`Network propagation
`
`Ram scraper
`
`Ransomware
`
`Other
`
`Web download
`
` 40%
`
` 60%
`
`0%
` 20%
`Breaches
`Figure 17. Top malware action varieties in breaches (n=500)
`
` 80%
`
` 100%
`
` 40%
`
` 60%
`
`0%
` 20%
`Incidents
`Figure 18. Top malware action vectors in incidents (n=795)
`
` 80%
`
` 100%
`
`

`

`13
`
`Delivery Method
`
`File Type
`
`94%
`
`23%
`
`0%
`
`45%
`
`26%
`
`22%
`
`email
`
`web
`
`other
`
`O(cid:19)ce doc
`
`Windows app
`
`other
`
`Figure 19. Malware types and delivery methods
`
`100%
`
`75%
`
`50%
`
`25%
`
`0%
`
` 100%
`
` 80%
`
`Figure 18 displays that when the method of malware
`installation was known, email was the most common
`point of entry. This finding is supported in Figure 19,
`which presents data received from millions of
`malware detonations, and illustrates that the median
`company received over 90% of their detected
`malware by email. Direct install is indicative of a
`device that is already compromised and the malware
`is installed after access is established. It is possible
`for malware to be introduced via email, and once the
`foothold is gained, additional malware is downloaded,
`encoded to bypass detection and installed directly. Like
`most enumerations, these are not mutually exclusive.
`
`Social
`
`While hacking and malicious code may be the words
`that resonate most with people when the term “data
`breach” is used, there are other threat action catego-
`ries that have been around much longer and are still
`ubiquitous. Social engineering, along with Misuse,
`Error, and Physical, do not rely on the existence of
`“cyberstuff” and are definitely worth discussing. We
`will talk about these “OGs” now, beginning with the
`manipulation of human behavior.
`
`There is some cause for hope in regard to phishing,
`as click rates from the combined results of multiple
`security awareness vendors are going down. As you
`can see in Figure 21, click rates are at 3%.
`
`Phishing
`
`Pretexting
`
`Bribery
`
`Extortion
`
`Forgery
`
`Influence
`
`Other
`
`Scam
`
` 40%
`
` 60%
`
`0%
` 20%
`Breaches
`Figure 20. Top social action varieties in breaches (n=670)
`
`

`

`25%
`
`20%
`
`15%
`
`10%
`
`5%
`
`0%
`2012
`
`2014
`
`2016
`
`2.99%
`
`2018
`
`Clicked
`
`Figure 21. Click rates over time in sanctioned
`Figure 21. Click rates over time in sanctioned phishing exercises
`phishing exercises
`
`14
`
`With regard to the event chain for these attacks, if the
`device on which the communication was read and/or
`interacted with does not have malicious code installed
`as part of the phish, it may not be recorded as an
`affected asset. For example, if a user is tricked into
`visiting a phony site and he/she then enters credentials,
`the human asset is recorded as well as the asset that
`the credentials are used to access. To that end, those
`moments when the users thoughts are adrift provide
`an excellent opportunity for criminals to phish via SMS
`or emails to mobile devices. This is supported by the
`18% of clicks from the sanctioned phishing data that
`were attributed to mobile. Below is a window into
`mobile devices and how the way humans use them can
`contribute to successful phishing attacks provided by
`researcher Arun Vishwanath, Chief Technologist, Avant
`Research Group, LLC.
`
`Research points to users being significantly
`more susceptible to social attacks they
`receive on mobile devices. This is the case for
`email-based spear phishing, spoofing attacks
`that attempt to mimic legitimate webpages, as
`well as attacks via social media.7, 8, 9
`
`The reasons for this stem from the design
`of mobile and how users interact with these
`devices. In hardware terms, mobile devices
`have relatively limited screen sizes that restrict
`what can be accessed and viewed clearly.
`Most smartphones also limit the ability to
`view multiple pages side-by-side, and navi-
`gating pages and apps necessitates toggling
`between them—all of which make it tedious
`for users to check the veracity of emails and
`requests while on mobile.
`
`Mobile OS and apps also restrict the
`availability of information often necessary
`for verifying whether an email or webpage is
`fraudulent. For instance, many mobile browsers
`limit users’ ability to assess the quality of a
`website’s SSL certificate. Likewise, many
`mobile email apps also limit what aspects of
`the email header are visible and whether the
`email-source information is even accessible.
`
`Mobile software also enhances the prominence
`of GUI elements that foster action—accept,
`reply, send, like, and such —which make it easier
`for users to respond to a request. Thus, on the
`one hand, the hardware and software on mobile
`devices restrict the quality of information that
`is available, while on the other they make it
`easier for users to make snap decisions.
`
`The final nail is driven in by how people use
`mobile devices. Users often interact with
`their mobile devices while walking, talking,
`driving, and doing all manner of other activities
`that interfere with their ability to pay careful
`attention to incoming information. While
`already cognitively constrained, on screen
`notifications that allow users to respond to
`incoming requests, often without even having
`to navigate back to the application from which
`the request emanates, further enhance the
`likelihood of reactively responding to requests.
`
`Thus, the confluence of design and how
`users interact with mobile devices make it
`easier for users to make snap, often
`uninformed decisions—which significantly
`increases their susceptibility to social
`attacks on mobile devices.
`
`7 Vishwanath, A. (2016). Mobile device affordance: Explicating how smartphones influence the outcome of phishing attacks. Computers in Human Behavior, 63, 198-207.
`8Vishwanath, A. (2017). Getting phished on social media. Decision Support Systems, 103, 70-81.
`9 Vishwanath, A., Harrison, B., & Ng, Y. J. (2018). Suspicion, cognition, and automaticity model of phishing susceptibility. Communication Research, 45(8), 1146-1166.
`
`

`

`15
`
`Misuse
`
`Misuse is the malicious or inappropriate use of
`existing privileges. Often it cannot be further defined
`beyond that point in this document due to a lack
`of granularity provided; this fact is reflected in the
`more generic label of Privilege abuse as the
`
`
`top variety in Figure 22. The motives are
`predominantly financial in nature, but employees
`taking sensitive data on the way out to provide
`themselves with an illegal advantage in their next
`endeavor are also common.
`
`Privilege abuse
`
`Data mishandling
`
`Unapproved workaround
`
`Knowledge abuse
`
`Email misuse
`
`Possession abuse
`
`Financial
`
`Espionage
`
`Fun
`
`Grudge
`
`Other
`
`Unapproved hardware
`
`Convenience
`
`Unapproved software
`
`Net misuse
`
`Illicit content
`
`Ideology
`
`Fear
`
`Secondary
`
` 40%
`
`0%
` 20%
`Breaches
`Figure 22. Top misuse varieties in breaches (n=292)
`
` 60%
`
` 80%
`
` 100%
`
` 40%
`
` 60%
`
`0%
` 20%
`Breaches
`Figure 23. Actor motives in misuse breaches (n=245)
`
` 80%
`
` 100%
`
`

`

`16
`
`Error
`
`Affected assets
`
`As we see in Figure 24, the top two error varieties
`are consistent with prior publications, with
`Misconfiguration increasing at the expense of Loss
`and Disposal Errors. Sending data to the incorrect
`recipients (either via email or by mailed documents)
`is still an issue. Similarly, exposing data on a public
`website (publishing error) or misconfiguring an asset
`to allow for unwanted guests also remain prevalent.
`
`Workstations, web applications, and surprisingly,
`mail servers are in the top group of assets affected
`in data breaches. There is a great deal to be
`learned about how threat actions associate with
`assets within the event chains of breaches. We
`get down to business in Table 1 to pull out some of
`the more interesting stories the 2019 DBIR data
`has to tell us.
`
`Misdelivery
`
`2010
`
`2018
`
`32%
`
`37%
`
`DIFF
`
`+5
`
`Publishing
`error
`
`16
`
`21
`
`Misconfiguration
`
`0
`
`21
`
`Loss
`
`7
`
`31
`
`Programming
`error
`
`0
`
`5
`
`Disposal
`error
`
`5
`
`14
`
`Omission
`
`Ga(cid:13)e
`
`2
`
`4
`
`0
`
`4
`
`+5
`
`+21
`
`-24
`
`+5
`
`-9
`
`+2
`
`-4
`
`Breaches
`Figure 24. Top error varieties in breaches
`Figure 24. Top error varieties in breaches over time
`over time n=100 (2010), n=347 (2018)
`n=100 (2010), n=347 (2018)
`
`Server - Mail
`
`User Dev - Desktop
`
`Server - Web application
`
`Server - Database
`
`Media - Documents
`
`Person - End-user
`
`User Dev - Laptop
`
`Server - POS controller
`
`User Dev - POS terminal
`
`Person - Finance
`
` 40%
`
`0%
` 20%
`Breaches
`Figure 25. Top asset varieties in breaches (n=1,699)
`
` 60%
`
` 80%
`
` 100%
`
`

`

`17
`
` Action
`
` Hacking - Use of stolen creds
`
` Social - Phishing
`
` Social - Phishing
`
` Malware - Backdoor
`
` Malware - C2
`
`Asset
`
`Server - Mail
`
`Server - Mail
`
`User Dev - Desktop
`
`User Dev - Desktop
`
`User Dev - Desktop
`
` Hacking - Use of backdoor or C2
`
`User Dev - Desktop
`
` Malware - Spyware/Keylogger
`
` Malware - Adminware
`
` Misuse - Privilege abuse
`
`User Dev - Desktop
`
`User Dev - Desktop
`
`Server - Database
`
` Malware - Capture app data
`
`Server - Web application
`
`Table 1
`Top action and asset variety combinations within breaches, (n= 2,013)
`
`Count
`
`340
`
`270
`
`251
`
`229
`
`210
`
`208
`
`103
`
`91
`
`90
`
`83
`
`The table above does exclude assets where a
`particular variety was not known. In the majority of
`phishing breaches, we are not privy to the exact
`role of the influenced user and thus, Person -
`Unknown would have been present. We can deduce
`that phishing of Those Who Cannot Be Named
`leads to malware installed on desktops or tricking
`users into providing their credentials.
`
`Most often, those compromised credentials were to
`cloud-based mail servers. There was an uptick
`in actors seeking these credentials to compromise a
`user’s email account. It turns out there are
`several ways to leverage this newly found access.
`Actors can launch large phishing campaigns from
`
`the account, or if the account owner has a certain
`degree of clout, send more targeted and elaborate
`emails to employees who are authorized to pay
`bogus invoices.
`
`There were also numerous cases where an
`organization’s email accounts were compromised
`and the adversary inserted themselves into
`conversations that centered around payments. At
`this point, the actors are appropriately positioned
`to add forwarding rules in order to shut out the
`real account owner from the conversation. Then
`they simply inform the other recipients that
`they need to wire money to a different account on
`this occasion because…reasons.
`
`

`

`18
`
`Another trend in this year’s data set is a marked shift
`away from going after payment cards via ATM/gas
`pump skimming or Point of Sale systems and towards
`e-commerce applications. The 83 breaches with
`the association of web application and the action of
`type capture application data is one indicator of this
`change. Figure 26 below illustrates how breaches
`with compromised payment cards are becoming
`increasingly about web servers –

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket