Health Care, Ransomware Face Extra Scrutiny in Annual Verizon Data Breach Report

And socially constructed attacks continue to thrive.

James Anderson, Senior News Editor

April 10, 2018

4 Min Read
Data Breach
Shutterstock

Anderson-James-150x150.jpg

James Anderson

Ransomware accounted for 39 percent of malware-related data breaches last year, according to a new study by Verizon.

The continued rise of ransomware was one of the many findings of the 11th annual Verizon Data Breach Investigations Report (DBIR). The 68-page study examined more than 2,200 data breaches and more than 53,000 security incidents. The findings reveal an increasingly common and elegant form of ransomware.

David Hylender, senior network analyst and principal with Verizon, tells Channel Partners that ransomware began appearing in the DBIR case load approximately three years ago. The number doubled in 2016 and doubled again in 2017 to 39 percent of malware breaches.

“That’s getting pretty close to half,” Hylender said. “That’s a big deal. And in addition to becoming more common, it is becoming somewhat more advanced.”

Verizon-DBIR-3-300x260.png

Source: Verizon DBIR

The report concluded that ransomware incidents are more increasingly going into “business critical” systems like servers and databases. The monetary demands of cybercriminals are, in turn, growing.

Health Care an Outlier

While ransomware affects every industry, Hylender notes that it accounts for 85 percent of malware in health care. He cited strict compliance measures like HIPAA and HITECH that subject health organizations to scrutiny similar to that of government agencies.

“They have to disclose things that other organizations may not have to report publicly,” he said. “Therefore, the number goes up.”

This vertical yielded different results in multiple categories compared to its counterparts. In addition to reporting a higher proportion of ransomware, health care was the only industry in which more incidents came from the inside (56 percent) than from the outside.

The study called human error one of the major factors for the prevalence of insider threats. Bryan Sartin, Verizon’s executive director, security professional services, said businesses must better educate their employees about cyber-related crime.

“Employees should be a business’ first line of defense, rather than the weakest link in the security chain. Ongoing training and education programs are essential,” Sartin said. “It only takes one person to click on a phishing email to expose an entire organization.”

Outside/Inside

Health care’s insider-threat problem was a major contrast to the rest of the overall study, in which Verizon found that outsiders perpetrated 73 percent of breaches.

The conclusions of the study disagree with other reports that say …

… careless or belligerent employees are the most common threat actors.

Verizon-DBIR-1-275x300.png

Source: Verizon DBIR

“While it’s true that an insider – a rogue employee for instance – can do a lot of damage if they decide to go the dark side as it were, it’s much less likely to happen than you are to be targeted by an external attacker,” Hylender said.

The Human Factor

Social attacks where criminals prey on human gullibility accounted for 1,450 incidents and 381 disclosures of data.

Phishing and financial pretext continue to be popular modes of attack. Cybercriminals looking for employee wage and tax details have scammed human-resources departments in multiple industries. Education, public agencies and health care were hardest hit with these social breaches.

“An attacker calls up, pretends to be an executive – usually a CFO type – and says, ‘Hey, I’ll need the tax-related data for all the employees in this sector here,'” Hylender said.

The bad guys often conduct their deception using a spoof email address – perhaps adding or subtracting a single letter from the expected address – but occasionally criminals use a hacked email address. Hylender says it’s common for the threat actor to delve into the hacked email archive in order to learn and mimic the writing style of the executive.

One of the main targets is a W-2 tax form that allows the thief to file taxes and receive a refund. Verizon found that this type of “financial pretexting” rose from 70 incidents in year 2016 to 170 in 2017.

“The scams are very very honed to get a particular thing, in this case tax-related documents to score cash from,” Hylender said. “Those have been extremely lucrative for attackers.”

The Scourge of DDoS

Verizon countered the claim that DDoS (distributed denial of service) is often a distraction for another type of attack.

“We don’t see a lot of that, contrary to what we’ve been reading in the headlines. We’re not saying that doesn’t happen, but we don’t see it much in our data set. It’s DoS for DoS’ sake,” Hylender said.

The report concluded that only one breach contained an instance of DoS, but the breach actually helped launch a DDoS, according to Verizon.

“In fact, we’ve never had a year with more than single-digit breaches in the denial-of-service pattern,” the DBIR wrote. “Like the aliens, they may be out there, but we aren’t seeing them.”

The lengthy report is available of Verizon’s website. The 2017 DBIR showed that SMB victims and espionage motives are rising factors in data breaches. We compiled a list of 12 common data breach scenarios and their causes.

Read more about:

Agents

About the Author

James Anderson

Senior News Editor, Channel Futures

James Anderson is a senior news editor for Channel Futures. He interned with Informa while working toward his degree in journalism from Arizona State University, then joined the company after graduating. He writes about SD-WAN, telecom and cablecos, technology services distributors and carriers. He has served as a moderator for multiple panels at Channel Partners events.

Free Newsletters for the Channel
Register for Your Free Newsletter Now

You May Also Like