Hackers behind bulk of the 2,644 data breaches in 2012

  • Liam Tung (CSO Online)
  • — 12 February, 2013 11:42

For the second year running, hacking was the most frequent source of data breaches, according to a new report based on known incidents in 2012.

There were 2,644 data breaches last year or just over twice the number known to have occurred in 2011, according a new report by Open Security Foundation, which runs the international DataLoss database, and security consultancy Risk Based Security.

Hacking was behind 1802 (68.2 percent) of known breaches for the year, which resulted in 22 percent of the 267 million records that were exposed in 2012.

Conversely, insiders (malicious, accidental, and unknown) were responsible 19.5 percent of data loss incidents, but had a much bigger impact, and were responsible for 66.7 percent of the year’s exposed records.

Malicious insiders were behind 7.1 percent of all breaches, however they were also responsible for the largest breach of the year by exposed records. Over half of the exposed records in 2012 came from Shanghai Roadway, a Chinese unit of Dun & Bradstreet, which the business information giant shuttered after four employees were found to have sold 150 million Chinese customer records for roughly 23 cents each.

Despite the uptick in incidents and the massive Chinese breach, the number of confirmed exposed records in 2012 was a dramatic decrease on 412 million records exposed in 2011.

However, the report’s authors say the 2012 figure should be viewed as a “significant underestimate” because the number of records exposed was not reported in 20.6 percent of breaches.

A snapshot of data types is also interesting to note. Credit card numbers were exposed in 6.4 percent of the incidents, account information in 7.4 percent, medical data in 9.4 percent, date of birth in 11.2 percent, social security number (or equivalent) in 14.4 percent and address in 18.8 percent.

These were overshadowed by name, password, email and other “miscellaneous” data, such as userID that were exposed in over 44 percent of incidents.

Databreaches.net, a blog by the curator of OSF’s DataLossDB, notes that figures in the report differ from others due to different methodologies.

Perhaps the most notable comparison is Verizon’s annual data breach report, based on data from federal law enforcement agencies in Australia, the US and Europe. In 2011, for example, Verizon counted 174 million records exposed in 855 incidents whereas OSF recorded 412 million exposed records in 1,217 incidents.

Follow @CSO_Australia and sign up to the CSO Australia newsletter.

Tags: hackers, data breaches

Review: File Recovery Tools

READ THIS ARTICLE
MORE IN Wireless / Mobile Security
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Sophos SafeGuard Enterprise

Your central key for data protection

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.