Data breach approximately costs €125 per leaked data record

According to researchers at the American Ponemon Institute, cyber attacks are the leading cause of data leaks, followed by technical defects, configuration errors in the cloud and human error.

The “Cost of a Data Breach Report 2020” study conducted by IBM among 3,200 people from 524 organizations shows that the average cost per leaked or stolen data record has increased.

According to the study, the average cost per lost or stolen data record was $ 146 (approx. $ 123). With malicious attacks the costs are even slightly higher, around $ 175 per leaked data record, according to Darkreading.

The study covered 17 different sectors. The costs of data breaches are the highest in the healthcare sector. In the healthcare sector, a major data breach can easily cost about 7 million dollars (6 million euros). The high costs are caused by, among other things, customers who no longer have confidence, system downtime, lost sales, legal costs and fines.

On average, it takes 329 days before the leakage of data is detected by organizations.

Want to read more about this: https://www.darkreading.com/vulnerabilities—threats/advanced-threats/average-cost-of-a-data-breach-in-2020-$386m/a/d-id/1338660

Former Uber CISO charged for concealing hack

Former Uber CISO charged for concealing hack

Yesterday Uber’s former security chief Joe Sullivan was charged with attempting to conceal a hack from federal investigators. This hack exposed the email addresses and phone numbers of 57 million drivers and passengers.

As a result the former CISO could face up to eight years in prison for not promptly disclosing to the employee and consumer victims in that hack, which indicates bad corporate behaviour.

Read more about this at: https://www.nytimes.com/2020/08/20/technology/joe-sullivan-uber-charged-hack.html

Polish privacy authority imposes first GDPR fine

The Polish data protection authority has for the first time imposed a fine on a company for violating the General Data Protection Regulation (GDPRG). The company, whose name is not mentioned, processed personal data obtained from public sources. It would be about 6 million records. The persons in question were not aware of this and were not informed by the company. “As a result, the data administrator has deprived them of the opportunity to exercise their rights,” said Urzad Ochrony Danych Osobowych, the Polish privacy regulator. He imposed a fine of 220,000 euros on the company.

Read more about this topic at: https://www.ceelegalblog.com/2019/03/pln-1-million-fine-for-gdpr-violation/?

Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers

Tech giant ASUS is believed to have pushed malware to hundreds of thousands of customers through its trusted automatic software update tool after attackers compromised the company’s server and used it to push the malware to machines. Half a million Windows machines received a malicious backdoor through the ASUS update server, although the attackers appear to have been targeting only about 600 of those systems.

Read more about this topic at: https://motherboard.vice.com/en_us/article/pan9wn/hackers-hijacked-asus-software-updates-to-install-backdoors-on-thousands-of-computers

Aluminium maker defends itself against ransomware with manual plan

Hydro with 35,000 employees with smelting plants, factories and offices in 40 countries – globally experienced a ransomware attack since Monday was forced to switch some systems to manual operation. The ransomware used might have been the relatively new and difficult-to-detect strain, dubbed LockerGoga, which criminals use to quickly encrypt computer files, before demanding payment to unlock them.

Read more about this topic at: https://www.wired.co.uk/article/norsk-hydro-cyber-attack

Dataleak: Fila UK formjacked with malicious code in payment process

Group-IB said it discovered and reported to FILA UK malware known as GMO that was active on the fashion brand’s website for the past four months – and may have sniffed the payment card information of thousands of customers placing online orders through the tainted pages.“Cybercriminals might have injected a malicious code by either exploiting a vulnerability of Magento CMS, used by FILA.co.uk, or simply by compromising the credentials of the website administrator using special spyware or cracking password with brute force methods.

Threat actors were able to compromise 4,800+ websites every month during 2018 according to a Symantec Report, using injected JavaScript code to steal payment information such as debit and credit cards from customers of eCommerce sites. The most high-profile formjacking attacks were against British Airways and Ticketmaster, but according to Symantec cyber criminals who used this technique also got a huge chunk of their illicit earnings from smaller online retailers who accept payments from their customers via online portals.

Read more about this topic at: https://vmvirtualmachine.com/hackers-cop-a-fila-thousands-of-uk-card-deets-after-slinking-onto-clothing-brands-servers-%E2%80%A2-the-register/

Dataleak: Elsevier Left Users’ Passwords Exposed Online

Publisher Elsevier has leaked the unencrypted passwords and e-mail addresses of users via an unsecured server. The data was accessible to everyone on the internet. How long the data was online and how many users were affected is still unclear.

Security investigator Mossab Hussein discovered Elsevier’s server. It contained unencrypted passwords of users and their e-mail addresses. Among other things, it would be about students and teachers from universities and educational institutions, according to Hussein on the basis of the .edu e-mail addresses found.

The researcher shared his discovery with Vice Magazine, which informed Elsevier. The publisher has launched an investigation into the data breach. “It looks like a server was incorrectly set up because of a human error,” said a spokesperson.

The server is now secured. The publisher says it will inform the Dutch Data Protection Authority, as well as all affected users. It will also reset the passwords of all affected accounts.

Read more about this topic at: https://motherboard.vice.com/en_us/article/vbw8b9/elsevier-user-passwords-exposed-online

Data breaches in 2018: An overview

Risk Based Security came out with their annual data breach report. Some highlights:

– Compared to 2017, the number of reported breaches was down 3.2% and the number of exposed records was down approximately 35.9% from 7.9 billion.
– The Business sector accounted for 65.8% of the records exposed followed by Unclassified at 31.8% and Government at 2.2%. The Medical and Education sectors combined accounted for 9.9 million records exposed, or less than 0.02% of the total records exposed in the year.
– Web regained the top spot for the breach type exposing the most records, accounting for 3% of compromised records, while
– Hacking remained the top breach type for number of incidents, accounting for 57.1% of reported breaches. 5% of breached organizations were unwilling or unable to disclose the number of records exposed.
– 6,515 breaches were reported through December 31, 2018, exposing approximately 5 billion records.
– the average number of days between discovery and disclosure has gone up from 48.6 in 2017 to 49.6 days in 2018.

Read more about this topic at: http://www.govtech.com/blogs/lohrmann-on-cybersecurity/data-breaches-what-do-the-numbers-mean.html

EE dataleak caused stalking via sim-swapping?

An EE customer has said she was stalked by an ex-partner who worked at the firm, after he accessed her personal data without permission. She was switched to a new handset and her address and bank details were accessed. She involved the police and claims the firm EE and police did not take the dataleak seriously. She claims her sim was swapped by her ex-partner with her personal data getting into his hands. She claims to have spent a lot of private time at the police station and missed days at work, while her ex having access to sort code, her account number, photocopy of her driver’s licence. “It did put her at risk and she feels all customers should know how poorly something like this will be handled if there is a data breach on their account

Read more about this topic at: https://www.bbc.com/news/technology-46896329