【Verizon】2023年度數(shù)據(jù)泄露調(diào)查報(bào)告_第1頁
【Verizon】2023年度數(shù)據(jù)泄露調(diào)查報(bào)告_第2頁
【Verizon】2023年度數(shù)據(jù)泄露調(diào)查報(bào)告_第3頁
【Verizon】2023年度數(shù)據(jù)泄露調(diào)查報(bào)告_第4頁
【Verizon】2023年度數(shù)據(jù)泄露調(diào)查報(bào)告_第5頁
已閱讀5頁,還剩84頁未讀 繼續(xù)免費(fèi)閱讀

付費(fèi)下載

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡介

2023DBIRTableofcontents478IntroductionSocialEngineeringBasicWebApplicationAttac457AppendixA:Methodology79AppendixC:VTRAC20-yearretrospectiveAppendixD:Contributingorganizationssevenprimarycategoriesofthreatactions:Malware,Hacking,SocVariety:Morespecificthefollowingdefinitheconfirmeddisclostheconfirmeddisclosstandardusestwo-totwo-digitlevel,andwewillsforbrevitywithinthefigures.Deforbrevitywithinthefigures.De2023DBIRHelpfuldefinitionsandchartguidancecertainty.However,insteadofwithintheconfidenceistandardforstatisticaltesting).心當(dāng)血organizations.Orange:lowerhalf80%.Yellow:upperhalfof80%:1,274-438,499.Median:29,774(logscale).出心/dbirrathe“Successisstumblingfromfailur-attributedtoSirWinststrategy,applianceorPlease-Save-Us-As-A-Servicewecreate,buyorbEQ\*jc3\*hps18\o\al(\s\up6(P),a)EQ\*jc3\*hps18\o\al(\s\up6(ro),b)EQ\*jc3\*hps18\o\al(\s\up6(d),ri)EQ\*jc3\*hps18\o\al(\s\up6(u),e)EQ\*jc3\*hps18\o\al(\s\up6(c),l)EQ\*jc3\*hps18\o\al(\s\up6(tData),Basse)EQ\*jc3\*hps18\o\al(\s\up6(Scien),tfora)EQ\*jc3\*hps18\o\al(\s\up6(c),ll)EQ\*jc3\*hps18\o\al(\s\up6(e),t)EQ\*jc3\*hps18\o\al(\s\up6(Te),he)EQ\*jc3\*hps18\o\al(\s\up6(am.),stat)2htns//mitre-ensenuitvora/evbersecurity/center-for-threat-infforcybercriminals.PEQ\*jc3\*hps18\o\al(\s\up1(83),ac)EQ\*jc3\*hps18\o\al(\s\up1(%),to)EQ\*jc3\*hps18\o\al(\s\up1(o),rs)EQ\*jc3\*hps18\o\al(\s\up1(che),177)Figure7.Selectenumfinanciallydriven,at95%ofbreaexploitationofvulnecontributors'incidentHowever,only20.6%of44228"inthecommentsHowever,only20.6%of2contains953,894inciforErroractionsandgovernmententi9withawhopping94.6%representationhardestworking,thfunctionwithouttheown12https://verisframFigure16.TopActioEQ\*jc3\*hps17\o\al(\s\up6(Ju),W)EQ\*jc3\*hps17\o\al(\s\up6(s),h)EQ\*jc3\*hps17\o\al(\s\up6(trol),ohe)EQ\*jc3\*hps17\o\al(\s\up6(soffthetongue,),rewasworkingo)EQ\*jc3\*hps17\o\al(\s\up6(oesn't),theY)EQ\*jc3\*hps17\o\al(\s\up6(t?),K)previousyears.Whatis“softwaresupplychainpocalypse.”13“SystemIntrusion”sepopular.Useofstolcurrentchampion,increasdatacontributors'Granted,only20.6%oftheeyeonyourstuffwhenyoEQ\*jc3\*hps17\o\al(\s\up3(1),1)EQ\*jc3\*hps17\o\al(\s\up3(4),5)17too,andtheyarethe"where"thatistheorganization,commonlywithoutend-userinteraction.Wwebapplications,mailservices,theworld,suchasrouJustkidding,mostly20httos://verisframeworkorg/assets.htmlBreakingtheAssetvarWewillbediscussingthosEngineering"sectionof(OT),wheretheinfrastructure,ascontrastedwiTechnology(IT),wheareverylowoveraltonational?2securexistence.Ifyouar(InfoSec):ConfidentiAlossofconfidentialitAvailability(au):referstoanavailabilityincludedestrdeletion,movement,pedoor"(Confidentiality),"wasitchvarietieswetrackyearoverye(PIl)fromyourcustomers,partneavailabilityimpactvaribreacheswherevirtualcurr3seekingbrain.Wasthatjustsomeswayithroughoutthisreasy-to-remembershorthand.Aswementionedbefore,incidentsarecharactersectionsforthefuIncidentswhereaninformwhetherthroughmisplacementormalice,aregroupIncidentswhereunintentionalactionsdirectlycwiththeftinsteadTheseincidentsarepredominantlbreachingconfidentihackingtoachievetheirobjectives,inUseAlternateAutUseAlternateAutofdifferentsizes,frequExploitvuln(VERIS-LocalAccounts:T107-CloudAccounts:T1078onkeyboard"typeofattackers.W0%20%40%60%80%100%0%20%40%60%80%100%0%20%40%60%80%100%unk-usrvulnerabilities,wefindthose心心心心…心心心心…beingdirectlytargetpreviousyears'findings,andleoutthere,youmaybethinkingth:●●●●●●oftheseattacksquitewell-attackersofbreaches.Ofthosecases,94%Figure31.Actionvectorcollection.Thisoccurr44228,wasgivenawhoppingspecificvulnerability.Whilecases).However,whenexaminingtheseassortmentofdifferentobjectives,wigoodfolksscanningfotoLog4jexplicitly.Lastly,231/news-events/news/cisa-Issues-emergency-directive-mitigate-compromi32https://wwwcisagoy/news-events/news/cisa-issues-emergency-directive-requagencies-mitigate-apacshouldconsiderisubset-includingtheSecureConfigurationofEConfigurationProcessfor-ImplementandManageaF-ImplementandManageaF-DeployandMaintainAnti--ConfigureAutomaticAnti--EstablishandMaintainaVulnerabilityManage-EstablishandMaintaina-EstablishandMain-EstablishanAccessGraFigure33.95%and8ransomwareoperators.Regar36Thissentencewas-SpearphishingSeUseAlternateAuthcompose"Hamlet"bynot-so-useful-to-societyengineer-thesocialpatterns(accountingfor1password.Nobody?Yeah,that'swhatEngineeringincidents.Hattacks,actorsleverThesearejusttwoofthenufortheseincidents,with(cough,cough).typicallytake.Mostcommonly,iftheinbox(foundin32%ofincidentsimplyusingemaicrediblestory(albeiincidents.Ofcourse,acombinaofmostattacks),rapiforthevictims,lawenforcementhassecurity,sincetheirwillingnessassociatedwiththispattern,manlure.Lastly,duetotEQ\*jc3\*hps19\o\al(\s\up6(P),Es)EQ\*jc3\*hps19\o\al(\s\up6(r),t)EQ\*jc3\*hps19\o\al(\s\up6(o),a)EQ\*jc3\*hps19\o\al(\s\up6(ce),bl)EQ\*jc3\*hps19\o\al(\s\up6(s),s)EQ\*jc3\*hps19\o\al(\s\up6(s),h)EQ\*jc3\*hps19\o\al(\s\up6(6.),an)EQ\*jc3\*hps19\o\al(\s\up6(]),A)EQ\*jc3\*hps19\o\al(\s\up6(Pr),Re)EQ\*jc3\*hps19\o\al(\s\up6(oces),quire)EQ\*jc3\*hps19\o\al(\s\up6([),M)EQ\*jc3\*hps19\o\al(\s\up6(6.2),FA)EQ\*jc3\*hps19\o\al(\s\up6(]),f)fourthofourdatagameofClue(theofourbreaches,contakingcodefromrepositimportanceofmultifactorautValidAccounts:T1078-DefaultAccounts:UseAlternateAuthstolencredentialsandthevictimsjustvulnerability(handyforthecnumberofbreaches,unpatchbutterformanyWebapplicationattacksthisydone"incidentswherecrstep(Figure40).Forinstancoftheincidents.Initjustthrowsexploitsateveryonecontinualltargetsforattackers.implementations.Asyou'rtheCybersecurityandSecurityAgency(CISA)seeshowotechniques,mosttakeadvantageit'scriticalthaWorkingcollaboratively,lloEQ\*jc3\*hps26\o\al(\s\up6(Mitig),cred)EQ\*jc3\*hps26\o\al(\s\up6(a),e)EQ\*jc3\*hps26\o\al(\s\up6(ting),ntial)EQ\*jc3\*hps26\o\al(\s\up6(a),s)EQ\*jc3\*hps26\o\al(\s\up6(g),b)EQ\*jc3\*hps26\o\al(\s\up6(ai),y)EQ\*jc3\*hps26\o\al(\s\up6(n),p)EQ\*jc3\*hps26\o\al(\s\up6(ststol),rotect)EQ\*jc3\*hps26\o\al(\s\up6(en),ing)EQ\*jc3\*hps19\o\al(\s\up4(In),Di)EQ\*jc3\*hps19\o\al(\s\up4(v),s)EQ\*jc3\*hps19\o\al(\s\up4(e),a)EQ\*jc3\*hps19\o\al(\s\up4(to),e)EQ\*jc3\*hps19\o\al(\s\up4(y),D)EQ\*jc3\*hps19\o\al(\s\up4(o),o)EQ\*jc3\*hps19\o\al(\s\up4(f),r)EQ\*jc3\*hps19\o\al(\s\up4(Acc),man)EQ\*jc3\*hps19\o\al(\s\up4(o),t)EQ\*jc3\*hps19\o\al(\s\up4(unts),Acc)EQ\*jc3\*hps19\o\al(\s\up4(.1),nt)-EstablishanAccessEQ\*jc3\*hps19\o\al(\s\up6(Pr),Est)EQ\*jc3\*hps19\o\al(\s\up6(o),a)EQ\*jc3\*hps19\o\al(\s\up6(ces),blis)EQ\*jc3\*hps19\o\al(\s\up6(s),h)EQ\*jc3\*hps19\o\al(\s\up6(6.),an)EQ\*jc3\*hps19\o\al(\s\up6(]),A)-PerformAutomatedApMultifactorcredentifactors,asidefromcredentiourexistingenumerati41ThissoundslikewMisdelivery,Misconfiguratiomistakes,andsometthingsup."Well,ithalfempty"reader,ywrongrecipient)accounperishthethought.How2023DBIRIncidentClassificationPatternsofthosewemakeourselves).responsible.Speakingofresponsibility,-PerformAutomatedVulnerabilityScansofExternalApplicationInfras42IfyouwerebornunderthesignofMisdeliv2023DBIRIncidentClassificationPatternsspotofincidentsforknow,organizationsstilpartners,includingVeriInthatlight,eventhoughtheDenialofsuchasActors,AssetsandAsuchasActors,AssetsandApatternsafflictingycheckforoptionswithyoprotectedagainstthemployees'abilitytoaccidentallythroughlossfraudulenttransactions.Wesawoutside,fromthe"badactorwhatitsoundslike-e2023DBIRIncidentClassificationPatternstransfertoathreatactor-conpattern.Interestingly,weseemultipleactorsalreadyhaveaccesstothethreatactors(Internal,Exthree)in7%ofthebreaches.Thiscases,they'reprobablyjustmakingkindsofActorsworEQ\*jc3\*hps19\o\al(\s\up4(In),or)EQ\*jc3\*hps19\o\al(\s\up4(d),g)EQ\*jc3\*hps19\o\al(\s\up4(ee),an)EQ\*jc3\*hps19\o\al(\s\up4(d,),iz)EQ\*jc3\*hps19\o\al(\s\up4(we),ed)EQ\*jc3\*hps19\o\al(\s\up4(h),r)EQ\*jc3\*hps19\o\al(\s\up4(ave),aud)EQ\*jc3\*hps19\o\al(\s\up4(s),g)EQ\*jc3\*hps19\o\al(\s\up4(e),a)EQ\*jc3\*hps19\o\al(\s\up4(e),n)EQ\*jc3\*hps19\o\al(\s\up4(n),g)EQ\*jc3\*hps19\o\al(\s\up4(nstances),havesen)EQ\*jc3\*hps19\o\al(\s\up4(w),i)EQ\*jc3\*hps19\o\al(\s\up4(h),n)catchtheinappropria4hand,youarealong-timereader,thebreaches.Wetakealookatbothfromthepointofviewoftheirrespectiveindustries(customers,employees,etcnumeroustomentionwillalAlargeorganizationwhosebusinessmodelreadersthatourcon

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

最新文檔

評(píng)論

0/150

提交評(píng)論