Industry News

Seven out of 10 Cyberattacks Hack Websites Target Secondary Victims

Nearly 70% of cyber attacks target secondary victims, and not the owners of the hacked website, according to the 2015 Data Breach Investigations Report, an annual report by telecommunications company Verizon.

identity-theft-claimed-25-new-victims-every-minute-in-2013

The attackers hack websites then serve up malware to visitors, expecting that their true target will become infected.

Hackers have no real interest in the owner of the website other than using him to further the real attack, adding complexity to a breach, according to the document.

Most of the attacks originated from opportunistically compromised servers used to participate in denial-of service (DoS) attacks, host malware or be repurposed for a phishing site, not from espionage campaigns.

“Despite all the awareness and training around security, 23% of all recipients of phishing scams still open” such emails, and 11% click on the attachments, said Bryan Sartin, managing director for Verizon’s RISK team, which investigates breaches, according to Wall Street Journal’s Blog. The report says that it only takes minutes for an attacker to bypass a company’s perimeter defenses, once a successful phishing attempt has been registered.

The report analyzes more than 2,100 confirmed data breaches and approximately 80,000 reported security incidents. It addresses more than 8,000 breaches and nearly 195,000 security incidents that have occurred over more than 10 years.

About the author

Răzvan MUREȘAN

Former business journalist, Razvan is passionate about supporting SMEs into building communities and exchanging knowledge on entrepreneurship. He enjoys having innovative approaches on hot topics and thinks that the massive amount of information that attacks us on a daily basis via TV and internet makes us less informed than we even think. The lack of relevance is the main issue in nowadays environment so he plans to emphasize real news on hotforsecurity.com

Add Comment

Click here to post a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.