Cyber Security Companies Exposed On The Dark Web

As organisations turn to remote working access solutions to empower workers during the COVID-19 crisis, trouble seems to be bubbling across numerous illegal marketplaces and the Dark Web. Cyber-criminals are actively shopping for credentials hoping to access valuable information without raising any alarms. 

Many cyber security businesses have exposed and vulnerable sensitive data online, including personal data and passwords, according to a new study from Application Security firm ImmuniWeb

The study found that 97% of the leading cybersecurity companies have had their data exposed on the Dark Web in 2020, with over 160,000 high or critical incidents that may jeopardise their clients.

ImmuniWeb selected 398 of the world’s top security vendors and then scoured surface, dark and deep web sites including hacking forums and marketplaces, WhatsApp groups, public code repositories, social networks and paste websites. They claim to have discovered verified sensitive data over 631,000 times, with 17% of these “incidents” estimated to have critical risk. This means they included logins with plaintext passwords, or data leaks such as PII (information that directly identifies an individual by name, address, or an identifying number)and financial records that are recent and/or unique.

In total, the research revealed PII and corporate data accounted for half (50%) of all incidents, with credentials taking 30% and backups and dumps 15%.

  • Also concerning is the fact that 29% of the discovered passwords were “weak”, i.e. they featured less than eight characters, with no uppercase, no numbers and no special characters. 
  • In 41% of companies studied, employees were found to have reused passwords on different breached systems, further exposing their organisation to breach risks.
  • The report also revealed that over 5100 stolen credentials came from breaches of adult content sites, meaning employees had registered on such sites with their work emails.
  • Some of the Report’s attacks and exposures dates back as far as 2012, and the majority of incidents were classed as low (25%) or medium (49%) risk. 

Low risk refers to “mentions of an organisation, its IT assets or employees in data leaks, samples or dumps without accompanying sensitive or confidential information,” while medium risk could include encrypted passwords or leaks of “moderately” sensitive data such as source code or internal docs.

In a different survey, the Ponemon Institute found that 59% of companies had a data breach due to compromised third parties including cybersecurity vendors. Recent research, published in July 2020 by Digital Shadows, estimates that there are over 15 billion stolen records from over 100,000 data breaches currently available for sale.

Today, cybercriminals endeavor to maximise their profits and minimise their risks of being apprehended by targeting trusted third parties instead of going after the ultimate victims.

The data and surveys show that for cyber-criminals, the primary targets are US companies, which comprise more than one-third of all attacks, followed by Italy and the UK (5.2% each), Brazil (4.4%) and Germany (3.1%). In most cases, access to these networks is sold to other Dark Web criminals. They either develop an attack on business systems themselves or hire a team of more skilled hackers to escalate network privileges and infect critical hosts in the victim’s infrastructure with malware. Ransomware operators were among the first to use this scheme. 

The sheer complexity of the dark web means it’s unlikely hacktivist groups will be regulated any time soon. In the meantime, it’s clear that criminal groups are arming themselves with freely-available technologies that are making their job even easier, and their victims’ job all that more difficult.

Immuniweb:       PA Consulting:    Security Boulevard:    Infosecurity Magazine

For cost effective advice and recommendations on your organisation’s cyber security and training needs please contact Cyber Security Intelligence 

You Might Also Read: 

New Dark Web Search Engine Can Strengthen Business Security:

 

« Ransomware Is On the Rise: How to Prevent Attacks
How To Transmit Sensitive Information Over The Internet »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Information Security Forum (ISF)

Information Security Forum (ISF)

The ISF is a leading authority on information security and risk management.

ADF Solutions

ADF Solutions

ADF Solutions is a leading provider of digital forensic and media storage exploitation tools.

Cyber Seguridad (Cyberseg)

Cyber Seguridad (Cyberseg)

Cyberseg provides specialized Cybersecurity services, including managed services (SOC / CERTs) and solutions for the protection of critical infrastructures.

Certis

Certis

Certis is a leading advanced integrated security organisation that develops and delivers multi-disciplinary security and integrated services.

Ergon Informatik

Ergon Informatik

Ergon Informatik AG is Switzerland's leading provider of customised software solutions and software products including fraud detection and the Airlock web security suite.

Worldline

Worldline

Worldline IIoT solutions allow industrial companies to start their digital transformation journey with industrial level cyber security standards (IEC 62443 ready).

ZecOps

ZecOps

ZecOps is a cybersecurity automation company offering solutions for servers, endpoints, mobile devices, and custom devices.

Ensighten

Ensighten

Ensighten is a leader in Website Security & Privacy Compliance. Protect your website from malicious attacks, monitor & detect vulnerabilities, protect consumer data.

Bionic

Bionic

Bionic is an agentless way to get control over your increasingly complex applications so you can manage, operate, and secure them faster and more efficiently.

Suresecure

Suresecure

Suresecure are a specialised consulting company providing Strategic IT security consulting, Managed Security Services, and Incident Response Management.

Theta432

Theta432

THETA432 is a cybersecurity firm that provides 24/7/365 managed prevention, detection, response, Hybrid SOC, cyber defense monitoring services with dynamically defined defense (3D™).

Acrisure

Acrisure

Acrisure is powered by the best of human and high-tech and offers insurance, reinsurance, real estate, cyber and more solutions to millions of clients around the world.

Involta

Involta

Involta orchestrates IT transformation journeys using well-defined and rigorous processes to deliver hybrid cloud solutions, consulting and data center services tailored to our clients’ needs.

AirDroid Business

AirDroid Business

AirDroid Business is an efficient mobile device management solution for Android devices, helping businesses to remotely control and access devices in large quantities using a centralized approach.

Fortreum

Fortreum

Fortreum aim to simplify cybersecurity in the marketplace to accelerate your business outcomes.

Cyber and Fraud Centre – Scotland

Cyber and Fraud Centre – Scotland

The Cyber and Fraud Centre – Scotland exists to ensure Scottish organisations are as resilient as they can be against cyber and fraud crime.