Categories: SecurityWorkspace

Hacktivists Pilfered More Data Than Cyber Criminals in 2011

Hacktivists like Anonymous and LulzSec stole more data than cyber criminals in 2011, even though they didn’t commit as many breaches.

Verizon’s threat report, which looked at 855 breaches across 174 million stolen records, found hacktivists got their mitts on 58 per cent of all pilfered data, yet they were behind just two percent of breaches.

Hacktivists stole over 100 million records in 2011, almost twice as many as financially-motivated cyber criminals.This was largely due to the fact that activists target large organisations sitting on rafts of records, whereas everyday cyber criminals go for the lowest hanging fruit and steal whenever and wherever they can.

Simple skills

Groups like Anonymous and LulzSec have hit major companies with relatively simple hacking techniques, such as SQL injection. Verizon found 97 percent of breaches “were avoidable without the need for organisations to resort to difficult or expensive countermeasures.”

Keylogging, or use of spyware to watch over victim activity, was responsible for more data breaches than any other threat. Number two was exploitation of default or guessable credentials, three was use of stolen login credentials.

“The type of attacks being used are not that advanced,” Jay Jacobs, senior consultant at Verizon, told TechWeekEurope. “They are going to stick to stuff that works. I don’t know if we can say hacktivists aren’t that advanced. It’s clear they don’t have to be advanced to get what they’re after.”

The insider threat has now been minimised too. Just four percent of breaches were down to employee mistakes or malicious behaviour.

There has also been a notable shift to SMEs, as hackers look to go for smaller companies without solid security stacks.

“We see hackers setting up these opportunistic attacks, where they scan basically the entire internet looking for vulnerable point of sale systems. They are going after the softer targets and it’s a much smaller haul for them,” Jacobs added.

“They look for default credentials or easily guessable credentials, log in, drop some malware in there to do some keylogging and that keylogger will then pick up the swipe of a credit card.”

Law enforcement continues to try and clamp down on hacktivism, with numerous arrests made over the past year. LulzSec suspect Ryan Ackroyd, an unemployed 25-year-old from Mexborough in South Yorkshire, appeared at Westminster Magistrates’ Court charged with conspiracy to bring down the websites of the CIA and the UK’s Serious Organised Crime Agency.

How much do you know about security? Test your knowledge with our quiz.

Thomas Brewster

Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.

Recent Posts

Craig Wright Sentenced For Contempt Of Court

Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…

2 days ago

El Salvador To Sell Or Discontinue Bitcoin Wallet, After IMF Deal

Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…

2 days ago

UK’s ICO Labels Google ‘Irresponsible’ For Tracking Change

Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…

2 days ago

EU Publishes iOS Interoperability Plans

European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…

3 days ago

Momeni Convicted In Bob Lee Murder

San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…

3 days ago