2019 Dbir Executive Brief
2019 Dbir Executive Brief
2019 Dbir Executive Brief
Investigations
Report
business ready
2
The Verizon Data Breach Investigations Report (DBIR) provides you with crucial perspectives
on threats that organizations like yours face. The 12th DBIR is built on real-world data from
41,686 security incidents and 2,013 data breaches provided by 73 data sources, both public and
private entities, spanning 86 countries worldwide.
2% involved Partners
0% 20% 40% 60% 80% 100% 0% 20% 40% 60% 80% 100%
Breaches Breaches
Figure4.
Figure 1. Who's behind the breaches? Figure 3. What tactics are utilized?
Key Takeaways
Take me to your leader Still held for ransom
C-level executives were twelve times more likely to Ransomware attacks are still going strong, and
be the target of social incidents and nine times more account for nearly 24 percent of incidents where
likely to be the target of social breaches than in years malware was used. Ransomware has become so
past. To further underline the growth of financial social commonplace that it is less frequently mentioned in
engineering attacks, both security incidents and data the specialized media unless there is a high-profile
breaches that compromised executives rose from target in the mix. However, it is still a serious threat
single digits to dozens in this report. to all industries. Meanwhile, some other threats that
are frequently hyped, such as cryptomining (2% of
Get out of my cloud malware), occur very infrequently in our data set.
As companies continue to transition to more cost-
efficient cloud-based solutions, their email and other Chip and Pin for the win?
valuable data migrate along with them. Criminals The number of physical terminal compromises in
simply shift their focus and adapt their tactics to payment card-related breaches is decreasing when
locate and steal the data they find to be of most value. compared to web application compromises. This may
Consequently, there’s been a corresponding increase be partly due to the implementation of chip and pin
in hacking cloud-based email servers via the use of payment technology starting to show progress.
stolen credentials. This is not an indication that cloud-
based services are less secure, however. It is simply HR strikes back
that phishing attacks, credential theft and configuration Interestingly, attacks on Human Resource personnel
errors are a natural by-product of the process. have decreased from last year. Our data set showed
6x fewer Human Resource personnel being impacted
What a tangled web we weave this year compared to last. This correlates with W-2
Payment card web application compromises are well tax form scams almost disappearing entirely from the
on their way to exceeding physical terminal DBIR data set.
compromises in payment card-related breaches. Data
from one of our contributors, the National Cyber- I click, therefore I am
Forensics and Training Alliance (NCFTA), substantiates Click-through rates on phishing simulations for data
this shift appears to have already occurred, and our partners fell from 24% to 3% during the past seven
larger data set is also trending that way. years. But 18% of people who clicked on test phishing
links did so on mobile devices. Research shows mobile
users are more susceptible to phishing, probably
because of their user interfaces and other factors.
This is also the case for email-based spear phishing
Financial
75% and social media attacks.
50%
Espionage
Breaches
25%
Other
0%
2011 2013 2015 2017
Figure 7. Threat actor motives in breaches over time
Which threats does your industry face? allocation. Many DBIR readers go directly to their
Every type of organization is at risk. But certain industry to understand the threats they and their
industries are more prone than others to specific peers face. But you can gain valuable perspective
kinds of attack. This is due to a multitude of factors, from the experiences of other sectors, as well.
such as their business model, the type of data
transmitted and retained, customer base, and even
the various technologies needed to secure their
Our 2019 DBIR features a deep dive into
environment. Knowing where an attack is most likely
industries, and covers the specific threats,
to occur offers the defender the opportunity to motivations and bad actors they face.
optimize their resources and helps to drive budget
Incidents Breaches
Manufacturing (31-33)
Manufacturing (31-33)
Accommodation (72)
Accommodation (72)
Professional (54)
Professional (54)
Healthcare (62)
Healthcare (62)
Information (51)
Information (51)
Education (61)
Education (61)
Retail (44-45)
Retail (44-45)
Finance (52)
Finance (52)
Public (92)
Public (92)
Crimeware 17 31 52 76 206 58 60 4,758 21 3 3 7 1 3 5 8 8 3
Web Applications 14 30 76 71 75 40 79 93 92 14 24 70 65 45 36 73 33 88
Everything Else 7 24 29 39 23 23 59 61 14 3 20 12 27 17 8 26 37 8
Pattern
Point of Sale 40 2 10 38 2 9
Hacking 45 279 699 100 796 233 524 1,279 162 42 42 95 78 75 58 100 205 102
1 19 100 110 14 36 13 16 1 9 45 85 7 14 10 40 14
Action
Misuse 13,021
Physical 5 6 32 47 5 4 8 20 16 2 1 18 17 2 2 3 9 6
Server 68 324 722 225 874 259 559 1,244 184 55 60 117 165 133 64 111 131 118
Network 2 1 3 1 1 4 3 1 1 1 1 1 2 1 1
Media 1 10 16 98 2 2 20 777 8 1 6 13 79 2 2 14 31 7
Kiosk/Term 24 1 1 1 9 17 1 1 4
The breach totals in our data set have decreased from last Denial of Service and use of stolen credentials on banking
year, primarily due to a lack of POS vendor incidents that have applications remain common. Compromised email accounts
led to numerous organizations being compromised with become evident once those attacked are filtered. ATM
stolen partner credentials. Skimming continues to decline.
Web applications are targeted with availability attacks as well as Cyber-Espionage is rampant in the Public sector, with State-
leveraged for access to cloud-based organizational email accounts. affiliated actors accounting for 79 percent of all breaches
involving external actors. Privilege Misuse and Error by insiders
account for 30 percent of breaches.
Manufacturing Retail
Manufacturing has been experiencing an increase in financially Card present breaches involving POS compromises or gas-pump
motivated breaches in the past couple of years, but espionage is skimmers continue to decline. Attacks against e-commerce
still a strong motivator. Most breaches involve phishing and the payment applications are satisfying the financial motives of the
use of stolen credentials. threat actors targeting this industry.
98% of security incidents and 88% of data breaches Be wary of inside jobs.
continue to occur within one of nine patterns. Track insider behavior by monitoring and logging access
to sensitive data. Make it clear to staff just how good you
are at recognizing fraudulent transactions.
Scrub packets.
The stakes are high, with organizations’ data, Distributed denial of service (DDoS) protection is an
customer base, proprietary business information and essential control for many industries. Guard against
trade secrets vulnerable to attacks. Data breaches nonmalicious interruptions with continuous monitoring
and capacity planning for traffic spikes.
continue to threaten organizational reputations and
finances. But security professionals have the power Stay socially aware.
to meet these challenges. Social attacks are effective ways to capture credentials.
Monitor email for links and executables. Give your teams
ways to report potential phishing or pretexting.
Get all the details, including industry-specific attack
patterns, in the 2019 DBIR.
© 2019 Verizon. All rights reserved. The Verizon name and logo and all other names, logos and slogans identifying Verizon’s products and services are trademarks and
service marks or registered trademarks and service marks of Verizon Trademark Services LLC or its affiliates in the United States and/or other countries. All other trademarks
and service marks are the property of their respective owners. 05/19