https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2023 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Technology Advisor 101 (TA 101)
  • Events
    • Back
    • 2023 Call for Speakers
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2023 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Technology Advisor 101 (TA 101)
  • Events
    • Back
    • 2023 Call for Speakers
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Agents
  • Cloud Service Providers
  • Channel Partners Events
 Channel Futures

SDN/SD-WAN


Hacker

12 Scary Data-Breach Scenarios from Verizon

  • Written by Channel
  • March 8, 2017
We've summarized 12 of Verizon's data-breach scenarios for you in our latest gallery — with advice to help fight them.
  • 12 Scary Data-Breach Scenarios from Verizon

    Laid-off employees, IoT botnets and ransomware. These are just few of the forces that can infiltrate a company’s cybersecurity.

    Last month, Verizon rolled out its Data Breach Digest, a 100-page piece of literature that’s chock full of security stories. Verizon compiled the various types of data-breach threats into four main categories: the human element, conduit devices, configuration exploitation and malicious software. The Digest gives anecdotes and mitigation strategies for each of the 16 scenarios that fall within those four categories.

    The Data Breach Digest is considered a companion to the Verizon Data Breach Investigations Report (DBIR), which contains statistics about cybersecurity incidents.

    We’ve summarized 12 of the data breach scenarios for you in our latest gallery — with advice to help fight them.

    Follow associate editor @JamesAndersonCP on Twitter.

  • Scary Data Breaches: Financial Pretexting

    Scary Data Breaches: Financial Pretexting

    Category: The Human Element

    Nickname: The Golden Fleece

    Key Verticals Victim: Financial, Information, Retail

    Method: The perpetrator uses social mediums like phishing emails, phone calls and even in-person meetings that play on human emotions (fear, compassion, curiosity, etc.) in order to acquire money.

    Example: A phishing email prompted a company to send a wire transfer. The perpetrator registered an email domain that was almost identical to that of the company’s chief information officer, whose job it was to approve transfers. The company’s network would have caught the fake email domain, but the accountant involved with the transaction had been working from a home network.

    Mitigation: Require two-step authentication for email access. Designate external emails. Require VPN access for telecommuters.

  • Scary Data Breaches: Hacktivist Attack

    Scary Data Breaches: Hacktivist Attack

    Category: The Human Element

    Nickname: The Epluribus Enum

    Key Verticals Victim: Financial, Public, Information

    Method: The hacktivist generally operates without a financial motive and with the intention of embarrassing the victim and furthering a cause. The exact method may vary from backdoor to DDoS attacks.

    Example: Hacktivists took aim at a company that had recently undergone a restructuring. They targeted the personal information of two executives and attempted DDoS attacks on the organization. Hackers eventually redirected one of the company’s websites to an accusatory message on another server. The company’s security apparatus defended most of the DDoS attacks and the attack eventually faded from media attention. Security workers created anonymous accounts on dark web forums to discover the sharing of executives’ personal information.

    Mitigation: Stay away from hackers’ radars, develop detection mechanisms and response capabilities, and protect social media accounts.

  • Scary Data Breaches: Partner Misuse

    Scary Data Breaches: Partner Misuse

    Category: The Human Element

    Nickname: The Indignant Mole

    Key Vertical Victim: Accommodation, Financial, Retail, Health Care

    Method: An insider mishandles data or abuses privileges out of a grudge.

    Example: SMB customers of a regional water supplier suffered compromised accounts and the subsequent transferring of refunds into incorrect bank accounts. Security workers traced the problem back to a third-party call center in India and later to a single user in the call center.

    Mitigation: Keep an eye on sensitive data and changes in employee behavior, and network activity.

  • Scary Data Breaches: Disgruntled Employee

    Scary Data Breaches: Disgruntled Employee

    Category: The Human Element

    Nickname: The Absolute Zero

    Key Vertical Victims: Public, Financial, Health Care

    Method: An employee disables controls or abuses data from inside a company.

    Example: A worker with administrative access knew he would be fired and decided to log onto the company’s application server. He collected data for future job interviews and disrupted workflow for his former team.

    Mitigation: Hold restructuring information closely and increase monitoring for affected employees.

  • Scary Data Breaches: C2 Takeover

    Scary Data Breaches: C2 Takeover

    Category: Conduit Devices

    Nickname: The Broken Arrow

    Key Vertical Victims: Information, Financial, Public, Administrative, Manufacturing

    Method: Attackers use Command and Control (C2) infrastructure to manipulate comprised or unmonitored systems.

    Example: Threat actors conducted reconnaissance on domains they judged as compromised, with the intention of turning servers into C2 platforms.

    Mitigation: Be aware of threat-actor tactics and monitor file-system changes on production servers.

  • Scary Data Breaches: Mobile Assault

    Scary Data Breaches: Mobile Assault

    Category: Conduit Devices

    Nickname: The Secret Squirrel        

    Key Vertical Victims: Professional, Administrative, Information, Manufacturing, Financial

    Method: Employees suffer this threat at the hands of state-affiliated or organized crime perpetrators while traveling abroad. Extracting data, swapping out hardware and rogue access points are all methods.

    Example: A chief security officer noticed odd activity on his cellphone. He had left his phone in his hotel room while travelling and used a wireless access point at a coffee shop. Someone had physically downloaded an exploit kit onto his laptop and likely used a code-injection attack on one of the smartphone’s third-party applications.

    Mitigation: Give specific travel devices to employees, train them to handle their devices and data when abroad, and don’t give them administrative access to install apps on them.

  • Scary Data Breaches: IoT Calamity

    Scary Data Breaches: IoT Calamity

    Category: Conduit Devices

    Nickname: The Panda Monium

    Key Vertical Victims: Entertainment, Professional, Educational, Administrative, Information, Manufacturing

    Method: State-affiliated or activist hackers take advantage of compromised or otherwise unprepared IoT devices.

    Example: A botnet brute-forced its way into IoT devices and initiated about 5,000 DNS lookups that significantly slowed a university’s network connectivity.

    Mitigation: Change default passwords for IoT devices, put IoT devices in IT asset inventory.

  • Scary Data Breaches: USB Infection

    Scary Data Breaches: USB Infection

    Category: Conduit Devices

    Nickname: The Hot Tamale

    Key Vertical Victims: Accommodation, Financial, Manufacturing

    Method: Threat actors physically access work systems using USB devices or other portable media to introduce malware.

    Example: Following a janitorial company’s announcement of a large pay cut, an individual offered janitors money if they brought a USB flash drive into work and plugged it into different systems. Security officials caught the perpetrator and reversed the problem before the threat actor could extract privileged information.

    Mitigation: Employ host-based USB device access, disable auto-run functionality and enhance host-based alerts.

  • Scary Data Breaches: DDoS Attack

    Scary Data Breaches: DDoS Attack

    Category: Configuration Exploitation

    Nickname: The 12000 Monkeyz

    Key Vertical Victims: Entertainment, Professional, Educational, Administrative, Information, Manufacturing, Retail

    Method: A computer floods a network connection with traffic and disrupts network operations.

    Example: The threat actor targeted a software-as-a-service company in order to disrupt a holiday week and prevent it from handling an influx of users. The attackers used four forms of DDoS to disrupt the network.

    Mitigation: Automate prefix routing to the DDoS mitigation provider so that it can deal with the incoming traffic.

  • Scary Data Breaches: Cloud Storming

    Scary Data Breaches: Cloud Storming

    Category: Configuration Exploitation

    Nickname: The Acumulus Datum                                 

    Key Vertical Victims: Utilities, Public, Manufacturing, Transportation

    Method: State-affiliated or organized crime parties take advantage of outsourced cybersecurity flaws taking care of data in the cloud.

    Example: Threat actors impacted an e-commerce site so that customers entering credit card info would get a failure notice before being redirected to see a completed transaction. The hacker had created a fake payment page that captured credit-card information. The affected company had to work with its third-party web developer and its Indian cloud services provider in order to address the problem.

    Mitigation: Ensure that third-party service providers have the architecture for audits and investigations.

  • Scary Data Breaches: Crypto Malware

    Scary Data Breaches: Crypto Malware

    Category: Malicious Software

    Nickname: The Fetid Cheez

    Key Vertical Victims: Varying

    Method: Crypto malware encrypts the data of users in order to hold it ransom so that they must pay to access it.

    Example: Hackers put a company’s business-critical applications offline and left ransom notes. This stemmed from a network administrator opening an email attachment that unleashed ransomware. The company failed to recover all of the files and ultimately decided to not pay the criminals.

    Mitigation: Validate backup processes, block particular email attachments and patch third-party applications.

  • Scary Data Breaches: Sophisticated Malware

    Scary Data Breaches: Sophisticated Malware

    Category: Malicious Software

    Nickname: The Pit Viper

    Key Vertical Victims: Public, Manufacturing, Transportation, Information

    Method: Evolved malware activities include backdoor, C2, Rootkit and exploit vulnerability.

    Example: Sophisticated malware varies widely, but typically are difficult to detect and disrupt business-critical functions.

    Mitigation: Use centralized log sources to track suspicious activity, keep anti-virus software updated.

  • 12 Scary Data-Breach Scenarios from Verizon

    Please click here for more Channel Partners galleries.
Tags: Agents Cloud Galleries IoT Mobility & Wireless SDN/SD-WAN Security

Most Recent


  • Making Waves
    7 Channel People Making Waves This Week at 8x8, Intel, Google Cloud, RingCentral, More
    Google, which says it's cutting 12,000 workers, has not indicated how the layoffs impact Google Cloud.
  • Man's silhouette behind a transparent cell graphic and the letters RMM
    Hackers Use Legitimate RMM Software to Steal from Federal Employees
    Attacks on RMMs have caused "insurmountable" losses for SMBs.
  • INtelisys AMP'd Newport Beach 2023
    Intelisys AMP'd Images: Partners Explore B2B Purchasing Trends, CX, Security Solutions
    Customers "literally don't know" how their own buying journey works, and that's an opportunity for partners.
  • Crime scene
    Intel Earnings ‘A Crime Scene,’ ‘Astonishingly Bad,’ ‘Historic Collapse’
    Financial analysts and market experts are in shock after Intel delivered its worst results in 20 years.

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • Cloud security
    VMware Debuts Cloud Web Security on SASE Platform
  • zero trust security
    Leveraging Partner Expertise to Build a Zero-Trust Strategy
  • Twenty, 20
    The CF List: 20 Endpoint Detection and Response (EDR) Providers You Should Know
  • Security shield on digital background
    VMware Security Connect Focused on Redefining Security, Increasing Threats

Upcoming Events

View all

Channel Partners Conference & Expo

May 1, 2023 - May 4, 2023

Channel Partners Europe

June 13, 2023 - June 14, 2023

Channel Futures Leadership Summit

October 30, 2023 - November 2, 2023

Galleries

View all

7 Channel People Making Waves This Week at 8×8, Intel, Google Cloud, RingCentral, More

January 27, 2023

Intelisys AMP’d Images: Partners Explore B2B Purchasing Trends, CX, Security Solutions

January 27, 2023

Intel Earnings ‘A Crime Scene,’ ‘Astonishingly Bad,’ ‘Historic Collapse’

January 27, 2023

Industry Perspectives

View all

Make the Most of the Gift of Time in 2023

January 25, 2023

Strong Partnerships Ease Challenging UPS Upgrade

January 24, 2023

The Advantages of Managed Networking and Security During Economic Uncertainty

January 5, 2023

Webinars

View all

Next-Generation MSP Platform: The Building Blocks for Your Business

February 15, 2023

Security Secrets of the MSP 501: How to Be a Cyber Leader in 2023

December 15, 2022
  • 1

Cybersecurity Certifications: Their Evolving Role in the Fight Against Increasing Attacks

December 13, 2022

White Papers

View all

Overcoming Your Endpoint Security Limitations with a Skeleton Crew

October 25, 2022

Embracing the Zero Trust Mindset For Endpoints

October 24, 2022

Endpoints are the Destination

October 24, 2022

Channel Futures TV

View all

Coffee with Craig and James Episode 117: Cato Networks, Video Killed the Podcast Stars

Retired Astronaut Capt. Scott Kelly Previews His CP Expo Keynote

December 21, 2022

Fusion Connect Eyes Future with Intrado UC, Managed Network Customers

September 23, 2022

RingCentral Focused on Hybrid Work, Microsoft Teams, Other Integrations

September 23, 2022

Twitter

ChannelFutures

Cybersecurity advisory warns of hackers' malicious use of #RMM. @CISACyber dlvr.it/ShYRwg https://t.co/zsBvQWqOYY

January 27, 2023
ChannelFutures

Reaction to #Intel earnings coming in fast and furious. Find out what investors are saying, and how CEO Pat Gelsing… twitter.com/i/web/status/1…

January 27, 2023
ChannelFutures

Our latest #GatelyReport looks at #cybersecurity M&A, investment with @progresspartner, @cyber_advisory, @FBI Hive… twitter.com/i/web/status/1…

January 27, 2023
ChannelFutures

.@channelsmart says plan and boost client #retention efforts to reduce #churn. dlvr.it/ShXvhj https://t.co/4jyHPCjTBn

January 27, 2023
ChannelFutures

The CEO of @Mitel discusses the likely outcomes of buying @Atos Unify. Note: @RingCentral will play a role post acq… twitter.com/i/web/status/1…

January 26, 2023
ChannelFutures

.@msftsecurity surpasses $20 billion in annual revenue, analysts say it's a formidable #cybersecurity market conten… twitter.com/i/web/status/1…

January 26, 2023
ChannelFutures

The adoption of cloud-based services ☁️ has spiked in the last few years and is among the top growth segments. See… twitter.com/i/web/status/1…

January 26, 2023
ChannelFutures

[email protected], @NICECXone, @lumencpp, @CiscoPartners joined @IntelisysCorp and partners for a day of marketing worksho… twitter.com/i/web/status/1…

January 26, 2023

MSP 501

The industry's largest and most comprehensive partner awards program.

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Galleries

Educational slide shows and images from live events.

Media Kit And Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Events
  • Telecoms.com
  • MSP 501
  • Black Hat
  • IoT World Today
  • Omdia

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X