Most Damaging Attacks Rely On Stolen Log-Ins - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News
News
8/28/2006
03:15 PM
50%
50%

Most Damaging Attacks Rely On Stolen Log-Ins

Security safeguards need to identify not just the user, but also the machine logging in to the network.

More than 8 out of every 10 computer attacks against businesses could be stopped if enterprises checked the identity of not only the user, but also the machine logging onto its network, a report released Monday claimed.

The study, conducted by a California research firm and paid for by BIOS maker Phoenix Technologies, used data from cases prosecuted by federal authorities between 1999 and 2006 to reach its conclusions.

"We wanted to get an honest viewpoint that wasn't opinion- or survey-based," said Dirck Schou, the senior director of security solutions at Phoenix. The problem with acquiring data on computer attacks, including the amount of damage done, is that companies are often hesitant to admit to a breach. "That's the beauty of this [data]," said Schou. "It's only looking at those who have actually suffered an attack."

According to the report, attacks based on logging in with stolen or hijacked credentials cost businesses far more, on average, than the typical worm or virus assault. When a privileged account is penetrated by an unauthorized user, the average damage runs to $1.5 million, the report said. The average cost from a single virus attack was much smaller: under $2,400.

"Cyber criminals who accessed privileged accounts obtained IDs and passwords through many means," the report said. "Network sniffing, use of password cracking programs, and collusion with insiders. It was also common for employees to share their IDs and passwords with coworkers who later left the organization and used that knowledge to gain access."

To bolster that outsider-as-attacker claim, the study also said that nearly 6 in 10 attackers had no relationship with the victim. (Just over a third (36 percent) were current and former employees.) Although the report's data contradicts other surveys that have pegged company insiders as the root of most attacks, the idea that credentials are good for ill-gotten gains isn't new. Earlier this year, for example, IBM predicted that attackers would increase their attacks against employees rather than networks.

"Viruses equal vandalism, but unauthorized log-ons lead to theft," said Schou. However, he acknowledged that the latter can come from the former, with worms and Trojan horses increasingly after information such as usernames and passwords rather than hoping to injure or bring down a network.

Overall, unsanctioned computers -- not among the systems actually expected to access the network -- were used in 84 percent of the attacks. The bulk of the attacks -- 78 percent -- came from at-home personal computers.

Naturally, Phoenix made much of that conclusion. It claimed that 84 percent of the attacks in the survey could have been prevented had the victim been protected by device authentication schemes. Such security identifies not only the user by checking ID and password, but can tell if the hardware has been authorized to connect to the network. Phoenix, for instance, sells a solution dubbed TrustConnector 2, that creates a unique identity for every authorized PC.

"What surprised us was the intensity and preponderance in unauthorized access attacks," said Schou. "We think device authentication is in the right time, right place.

"There are a lot of companies that aren't securing the device."

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
The State of Cloud Computing - Fall 2020
The State of Cloud Computing - Fall 2020
Download this report to compare how cloud usage and spending patterns have changed in 2020, and how respondents think they'll evolve over the next two years.
Commentary
Why 2021 May Turn Out to be a Great Year for Tech Startups
John Edwards, Technology Journalist & Author,  2/24/2021
News
How GIS Data Can Help Fix Vaccine Distribution
Jessica Davis, Senior Editor, Enterprise Apps,  2/17/2021
Slideshows
11 Ways DevOps Is Evolving
Lisa Morgan, Freelance Writer,  2/18/2021
Register for InformationWeek Newsletters
Video
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll