Report: Food And Beverage Industry Hit Most By Breaches In 2010

Nearly one-third of breaches likely the work of a single organized crime group

Dark Reading logo in a gray background | Dark Reading

ARLINGTON, VA -- Black Hat DC -- Restaurants and other food and beverage establishments accounted for nearly 60 percent of all breaches last year, and most attacks in all industries were due to weaknesses in third-party software, according to a newly released report.

Trustwave's 2011 Global Security Report, which draws data from actual breach investigations and research conducted by Trustwave's SpiderLabs in 2010, also revealed that nearly one-third of all breaches last year appear to have been the work of a single organized crime operation. Some 32 percent of attacks in the report came out of the Russian Federation, and 24 percent from unknown origins.

There also was a major jump in attacks using malware: around 76 percent of these attacks involved data-harvesting malware, according to Nicholas Percoco, senior vice president and head of SpiderLabs: "They're going in more directly using malware to do more of the dirty work."

That number was up 23 percent from 2009, according to the report.

"Malware is how the problem starts, as the payload, and then for exfiltration. We see malware finding its way into some or all of the components of the attack," Percoco says.

But it's mostly the same techniques and malware, with tweaked code, he says.

In 2009, Trustwave found that hospitality was the No. 1 most hacked industry, whereas food and beverage was in 2008. Retail is now No. 2, with 18 percent of the attacks last year, and hospitality with 10 percent. Why the shuffle this year? "The [criminals] find something that works, and stamp it out as fast as they can," Percoco says. They may breach a particular coffee shop, for instance, and then find other similar shops with the same operating systems, and other characteristics. "They footprint the OS, for example, and write tools that scan for those specific systems" in other establishments, he says.

Meanwhile, 88 percent of breaches were due to the insecure code or poor security in managing third-party applications. And 66 percent of the breach investigations included data stolen in transit, rather than stored data.

A full copy of the report can be downloaded here.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Read more about:

2011

About the Author

Kelly Jackson Higgins, Editor-in-Chief, Dark Reading

Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties. Jackson Higgins was recently selected as one of the Top 10 Cybersecurity Journalists in the US, and named as one of Folio's 2019 Top Women in Media. She began her career as a sports writer in the Washington, DC metropolitan area, and earned her BA at William & Mary. Follow her on Twitter @kjhiggins.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights