The Verizon Business 2021 Data Breach Investigations Report (2021 DBIR) examines more breaches than ever before, and sheds light on how the most common forms of cyber-attacks affected the international security landscape during the global pandemic.
This year’s report saw 5,258 breaches from 83 contributors across the globe, a third more breaches analysed than last year.
With an unprecedented number of people working remotely, phishing and ransomware attacks increased by 11% and 6% respectively, with instances of misrepresentation increasing by 15 times compared to last year.
Breach data showed that 61% of breaches involved credential data 95% of organisations suffering credential stuffing attacks had between 637 and 3.3 billion malicious login attempts.
The report also highlighted the challenges facing businesses as they move more business functions to the cloud with attacks on web applications representing 39% of all breaches.
Commentary on the Verizon Data Breach report
“As the number of companies switching business-critical functions to the cloud increases, the potential threat to their operations may become more pronounced.”
“Malicious actors look to exploit human vulnerabilities and leverage an increased dependency on digital infrastructures.”
This year, the Incident Classification Patterns the DBIR report team uses to classify security threats have also been improved and refreshed.
The updated report patterns explain 95.8% of analysed breaches and 99.7% of analysed incidents over all time, and should provide customers with a better understanding of the threats that exist, and how their organisations can best avoid them.
Industries under the spotlight
The 2021 DBIR includes detailed analysis of 12 industries, and shows that, while security remains a challenge across the board, there are significant differences across verticals.
For example, in Financial and Insurance industries, 83% of data compromised in breaches was personal data, whilst in Professional, Scientific and Technical services only 49% was personal.
Further highlights include
- Financial and Insurance – Misdelivery represented 55% of Financial sector errors. The Financial sector frequently faces credential and Ransomware attacks from External actors.
- Healthcare – Basic human error continues to beset this industry for the past several years. The most common Error is Misdelivery (36%), whether electronic or of paper documents.
- Public Administration – The biggest threat in this industry is the social engineer. Actors who craft a credible phishing email are absconding with credentials data at an alarming rate.
- Retail Trade – It continues to be a target for Financially motivated criminals looking to cash in on the combination of Payment cards and Personal information this sector is known for. Social tactics include Pretexting and Phishing, with the former commonly resulting in fraudulent money transfers.
The 83 contributors involved with the 2021 DBIR have provided the report with specific insights into regional cyber-trends highlighting key similarities and differences between them.
- Asia Pacific (APAC) – Many of breaches that took place in APAC were caused by Financially motivated attackers Phishing employees for creds, and then using those stolen creds to gain access to mail accounts and web application servers.
- Europe, Middle East and Africa (EMEA) – EMEA continues to be beset by Basic Web Application Attacks, System Intrusion, and Social Engineering.
- Northern America (NA) – NA is often the target of Financially motivated actors searching for money or easily monetisable data. Social Engineering, Hacking and Malware continue to be the favored tools utilised by actors in this region.
Alex Pinto, Lead Author of the DBIR, comments, “When you read the contents of the report, it is tempting to think that a vast array of threats demands a sweeping and revolutionary solution.”
“However, the reality is far more straightforward. The truth is that, whilst organisations should prepare to deal with exceptional circumstances, the foundation of their defences should be built on strong fundamentals – addressing and mitigating the threats most pertinent to them.”