Internet Identity (IID) has released their eCrime Trends Report: First Quarter 2011.
The report is a summary of statistics and news items from this year’s first quarter and serves as a useful reminder of how regularly breaches occur and how easy it is to forget about the last big breach.
Every month seems to have another record for the largest breach, Epsilon was usurped by Sony, who will be next? This is why quarterly reviews are so important.
The highlights of the IID report are below:
IT security firms in the cybercrime crosshairs
- Breach of HBGary Federal reveals vulnerability of the extended enterprise
- Internal emails exposed information about partners and clients
- RSA Security breach
Notorious Rustock botnet goes offline
- Microsoft and law enforcement cooperate in unprecedented action to shut down and confiscate criminal servers
- Significant reduction in spam noted worldwide
- National banks saw increase of 11% over Q4 2010
- Banks outside the U.S. increased most dramatically
- Recent database breaches could lead to increased spear phishing in the coming quarter
- Compared to Q4 2010, Phish targeting larger, national banks increased 11%. Much of the growth was seen in non-US based banks, which took three of the top five spots among banks
- Phishing in Q1 2011 grew 12% over Q1 2010.
Parts of the Internet went dark in Q1 for a variety of reasons
- Egyptian ISPs ordered to shut down following Internet-led protests
- Mooo.com seizure by DHS temporarily suspended 80,000 subdomains
- Rabobank blackholed its own DNS records in an attempt to combat DDoS attack
“As we’ve seen with recent attacks against Sony’s PlayStation Network and Epsilon, cyber criminals now have inside information about tens of millions of customers to use in highly targeted phishing campaigns,” said IID President and CTO Rod Rasmussen.
“The worry is that with all of this specific data, cyber criminals have all they need to convince people to share their highly valuable personal information. Organizations must ensure they are taking every measure to stop these attacks, including blocking access to phishing sites and command and control domains for malware that exfiltrates data. This should be done with e-mail filtering, firewalls and secure domain name system resolvers.”
Read the full report here.