With an unprecedented number of people working remotely, phishing and ransomware attacks increased by 11% and 6% respectively, with instances of Misrepresentation increasing by 15 times compared to last year, according to Verizon Business’ 2021 Data Breach Investigations Report (2021 DBIR). Additionally, breach data showed that 61% of breaches involved credential data (95% of organizations suffering credential stuffing attacks had between 637 and 3.3 billion malicious login attempts through the year).
The report examines more breaches than ever before, and sheds light on how the most common forms of cyber-attacks affected the international security landscape during the global pandemic. This year’s report saw 5,258 breaches from 83 contributors across the globe, a third more breaches analyzed than last year.
The report also highlighted the challenges facing businesses as they move more of their business functions to the cloud - with attacks on web applications representing 39% of all breaches.
“The COVID-19 pandemic has had a profound impact on many of the security challenges organizations are currently facing,” said Tami Erwin, CEO, Verizon Business. “As the number of companies switching business-critical functions to the cloud increases, the potential threat to their operations may become more pronounced, as malicious actors look to exploit human vulnerabilities and leverage an increased dependency on digital infrastructures”.
The report outlines 95.8% of analyzed breaches and 99.7% of analyzed incidents over all time, and provides a better understanding of the threats that exist, and how organizations can best avoid them.
Industries under the spotlight
The 2021 DBIR includes detailed analysis of 12 industries, and shows that, while security remains a challenge across the board, there are significant differences across verticals. For example, in Financial and Insurance industries, 83% of data compromised in breaches was personal data, whilst in Professional, Scientific and Technical services only 49% was personal. Further highlights include:
- Financial and Insurance - Misdelivery represented 55% of Financial sector errors. The Financial sector frequently faces credential and Ransomware attacks from External actors.
- Healthcare - Basic human error continues to beset this industry as it has for the past several years. The most common Error continues to be Misdelivery (36%), whether electronic or of paper documents.
- Public Administration - By far the biggest threat in this industry is the social engineer. Actors who can craft a credible phishing email are absconding with Credentials data at an alarming rate in this sector.
- Retail Trade - The Retail industry continues to be a target for Financially motivated criminals looking to cash in on the combination of Payment cards and Personal information this sector is known for. Social tactics include Pretexting and Phishing, with the former commonly resulting in fraudulent money transfers.
Regional trends
Some of the regional cyber-trends highlighting key similarities and differences between them are:
- Asia Pacific (APAC) - Many of breaches that took place in APAC were caused by Financially motivated attackers Phishing employees for creds, and then using those stolen creds to gain access to mail accounts and web application servers.
- Europe, Middle East and Africa (EMEA) - EMEA continues to be beset by Basic Web Application Attacks, System Intrusion, and Social Engineering.
- Northern America (NA) - NA is often the target of Financially motivated actors searching for money or easily monetizable data. Social Engineering, Hacking and Malware continue to be the favored tools utilized by actors in this region.
Alex Pinto, Lead Author of the DBIR, comments, “It is tempting to think that a vast array of threats demands a sweeping and revolutionary solution. However, the reality is far more straightforward. The truth is that, whilst organizations should prepare to deal with exceptional circumstances, the foundation of their defences should be built on strong fundamentals - addressing and mitigating the threats most pertinent to them.”
Add new comment