Deleted data drives new data breaches

Cyber criminals are beginning to use digital forensics to retrieve sensitive information from computers

According to a new report on data breaches from Verizon Business, cyber criminals are no longer attacking where the credit card files are, but where they once were.

"Criminals are borrowing from digital forensics tools," said Bryan Sartan, director of investigative response for Verizon Business Security Solutions. He said criminals are now able to read deleted transaction data from unallocated disk space and from the pagefile, and he attributed some of that to businesses retrofitting or upgrading software on older payment appliances to be compliant with payment card industry regulations. "New software, old data."

Last year Verizon Business released a massive four-year study on data breaches. Although this year's report covers only one year the volume is nonetheless staggering: 285 million compromised records from 90 confirmed data breaches in 2008.

Sartan was unable to name the specific organizations investigated for this report, but he did say that last year targeted attacks against financial institutions rose sharply to 30 percent, just behind retail at 31 percent. He said targeted attacks, where the criminals knew what they wanted, had gone up in part because prices for credit card information on the black market had gone down. Knowing the data came from a financial institution increases its value, he said.

Ninety-nine percent of the records breached were from compromised servers and applications. Of those, 67 percent of the breaches were aided by significant configuration errors. Sixty-four percent of the breaches were the result of hacking. While SQL injection remained high as a means of attack, Sartan said the overall SQL numbers were on the decline.

Seventy four percent of the breaches were from outside sources, dispelling the idea that data breaches were largely the work of insiders. According to the report, IP addresses associated with external attacks came from Eastern Europe (22 percent), East Asia (18 percent) and North America (15 percent).

Thirty-nine percent of the breaches involved multiple parties, where a software flaw used at one company lead it being used against another company. "(The) attacker exploits Software X at Brand A Stores and later learns that Brand B Stores also runs Software X. An attack is then directed at Brand B Stores but only because of a known exploitable weakness."

Behind all this data is the fact that organized crime, not the lone criminal hacker, has the resources and patience to carry out these attacks. Sartan said that scraping credit data from volatile memory or reading deleted data takes a bit of technical sophistication. He said Verizon Business has found that software used in the breaches is often unique, specific to the targeted organization.

The full 2009 Data Breach Investigations report is available on the Verizon Business site.

Robert Vamosi is a freelance computer security writer specializing in covering criminal hackers and malware threats.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags cyber criminalsSQLCredit card frauddigital forensics

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Robert Vamosi

PC World (US online)
Show Comments

Father’s Day Gift Guide

Brand Post

Bitdefender 2019

Bitdefender’s best-in-class security solutions have been awarded Product of the Year. Get cybersecurity that 500 MILLION users already have and trust!

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Featured Content

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?