DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations
11 Monitoring and Observability Tools for 2023
Learn more
  1. DZone
  2. Data Engineering
  3. Data
  4. Death, Taxes, and Data Breaches

Death, Taxes, and Data Breaches

Benjamin Franklin said that only two things are certain in life: death, and taxes. With the advent of the internet, a third certainty arises: data breaches.

Zaid Al Hamami user avatar by
Zaid Al Hamami
·
Jun. 10, 16 · Opinion
Like (4)
Save
Tweet
Share
3.80K Views

Join the DZone community and get the full member experience.

Join For Free

benjamin_franklin_quote.jpgBenjamin Franklin said that only two things are certain in life: death, and taxes. With the advent of the internet, a third certainty arises: data breaches.

This week, Tumblr. Last week, Reddit. The week before, LinkedIn. In fact, over 600M user accounts have been compromised, that we know about. Troy Hunt’s excellent haveibeenpwned site keeps tabs on these accounts. Check it out to get a sense of who, when, and how big.

What do hackers want with these accounts? They’re being used for account takeovers, which in turn is useful for fraud, identity theft, to further penetrate organizations infrastructures, or purely to be sold. Let me explain two scenarios in which these accounts are used:

  1. Mass attacks:
    Hackers decide to use a botnet that tries every single one of those 600M stolen credentials against an ecommerce site. Some users of that site use the same username (frequently the email address) and password that they use for Tumbler, Reddit, or LinkedIn. For those users, the hackers will “pop” those accounts. Depending on the nature of the site, this hit rate has been reported to be as high as 8%, but more commonly around the 1% range. Even at that lower estimate, for a site that has 10 million users, that’s around 100 thousand accounts that can be compromised. Every one of those accounts has a value (Uber accounts had a price around $4 each at one point ). One can start to see the financial incentives behind this scheme. This attack is easy to pull off, credentials are readily available, botnets that can run these types of attacks can be rented by the hour, and you are almost guaranteed to pop some accounts.
  2. Targeted attacks: 
    Hackers decide to attack a financial firm X. Instead of scanning the network, looking for outdated software or vulnerable endpoints, they decide it is easier to see if any of those 600M accounts contain @X.com email addresses. They find 800 that match. They’ll then start trying to use each of these 800 accounts against all known web sites in the X.com domain (www.X.com, customer.X.com, support.X.com, etc…). If one of them matches, then they’ve got one foot into an account in that organization. They’ll then work from there. Double whammy if the account belongs to an admin, or if it is a VPN server account, or a web-based email account.

As I stated in a previous blog post, this is now the biggest hacking method (Stolen Credentials) of the biggest hacking vector (Web Applications) according to the Verizon Data Breach investigations report.

We at IMMUNIO have been defending against these attacks for quite some time now, and we believe that our multi-pronged approach is the most effective in stopping these attacks as they happen, as well as identifying and protecting your users that have had their accounts compromised already.

While data breaches, and specifically these types of stolen credential attacks are certain, there is something you can do to mitigate them, with practically immediate results.

Data (computing)

Published at DZone with permission of Zaid Al Hamami. See the original article here.

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • How to Submit a Post to DZone
  • DZone's Article Submission Guidelines
  • Unlocking the Power of Elasticsearch: A Comprehensive Guide to Complex Search Use Cases
  • Create a REST API in C# Using ChatGPT

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: