Cyber Security Companies Exposed On The Dark Web

As organisations turn to remote working access solutions to empower workers during the COVID-19 crisis, trouble seems to be bubbling across numerous illegal marketplaces and the Dark Web. Cyber-criminals are actively shopping for credentials hoping to access valuable information without raising any alarms. 

Many cyber security businesses have exposed and vulnerable sensitive data online, including personal data and passwords, according to a new study from Application Security firm ImmuniWeb

The study found that 97% of the leading cybersecurity companies have had their data exposed on the Dark Web in 2020, with over 160,000 high or critical incidents that may jeopardise their clients.

ImmuniWeb selected 398 of the world’s top security vendors and then scoured surface, dark and deep web sites including hacking forums and marketplaces, WhatsApp groups, public code repositories, social networks and paste websites. They claim to have discovered verified sensitive data over 631,000 times, with 17% of these “incidents” estimated to have critical risk. This means they included logins with plaintext passwords, or data leaks such as PII (information that directly identifies an individual by name, address, or an identifying number)and financial records that are recent and/or unique.

In total, the research revealed PII and corporate data accounted for half (50%) of all incidents, with credentials taking 30% and backups and dumps 15%.

  • Also concerning is the fact that 29% of the discovered passwords were “weak”, i.e. they featured less than eight characters, with no uppercase, no numbers and no special characters. 
  • In 41% of companies studied, employees were found to have reused passwords on different breached systems, further exposing their organisation to breach risks.
  • The report also revealed that over 5100 stolen credentials came from breaches of adult content sites, meaning employees had registered on such sites with their work emails.
  • Some of the Report’s attacks and exposures dates back as far as 2012, and the majority of incidents were classed as low (25%) or medium (49%) risk. 

Low risk refers to “mentions of an organisation, its IT assets or employees in data leaks, samples or dumps without accompanying sensitive or confidential information,” while medium risk could include encrypted passwords or leaks of “moderately” sensitive data such as source code or internal docs.

In a different survey, the Ponemon Institute found that 59% of companies had a data breach due to compromised third parties including cybersecurity vendors. Recent research, published in July 2020 by Digital Shadows, estimates that there are over 15 billion stolen records from over 100,000 data breaches currently available for sale.

Today, cybercriminals endeavor to maximise their profits and minimise their risks of being apprehended by targeting trusted third parties instead of going after the ultimate victims.

The data and surveys show that for cyber-criminals, the primary targets are US companies, which comprise more than one-third of all attacks, followed by Italy and the UK (5.2% each), Brazil (4.4%) and Germany (3.1%). In most cases, access to these networks is sold to other Dark Web criminals. They either develop an attack on business systems themselves or hire a team of more skilled hackers to escalate network privileges and infect critical hosts in the victim’s infrastructure with malware. Ransomware operators were among the first to use this scheme. 

The sheer complexity of the dark web means it’s unlikely hacktivist groups will be regulated any time soon. In the meantime, it’s clear that criminal groups are arming themselves with freely-available technologies that are making their job even easier, and their victims’ job all that more difficult.

Immuniweb:       PA Consulting:    Security Boulevard:    Infosecurity Magazine

For cost effective advice and recommendations on your organisation’s cyber security and training needs please contact Cyber Security Intelligence 

You Might Also Read: 

New Dark Web Search Engine Can Strengthen Business Security:

 

« Ransomware Is On the Rise: How to Prevent Attacks
How To Transmit Sensitive Information Over The Internet »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Telos

Telos

Telos offers cybersecurity solutions and services that empower and protect the world’s most security-conscious enterprises.

L J Kushner & Associates

L J Kushner & Associates

L.J. Kushner is a leading Information Security recruiting firm.

OPSWAT

OPSWAT

OPSWAT is a software company that provides solutions to secure and manage IT infrastructure.

CyberSift

CyberSift

CyberSift is a cyber security provider. We develop threat detection software which needs no infrastructure changes as it integrates with almost any security tool.

Silensec

Silensec

Silensec is a management consulting, technology services and training company specialized in information security.

FFRI Security

FFRI Security

FFRI is committed to research and development of preventing the most advanced cyber-attacks and breaches.

Dracoon

Dracoon

DRACOON is market leader in the German-speaking region for secure enterprise file sharing.

Meriplex

Meriplex

Meriplex is a Managed Services provider specializing in Intelligent Networks, Cybersecurity and Cloud Communications.

Nexor

Nexor

Nexor are a UK-based cyber security company with 30 years' experience in secure information exchange.

LibraSoft

LibraSoft

Librasoft creates solutions to protect information from external and internal threats.

Axio Global

Axio Global

Axio is a leading cyber risk management SaaS company. Our Axio360 platform gives companies visibility to their cyber risk, and enables them to prioritize investments to protect their business.

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command is responsible for Navy information network operations, offensive and defensive cyberspace operations, space operations and signals intelligence.

Kyndryl

Kyndryl

Kyndryl has a comprehensive portfolio that leverages hybrid cloud solutions, business resiliency, and network services to help optimize your IT workloads and transformations.

VISTA InfoSec

VISTA InfoSec

VISTA InfoSec is a global Information Security Consulting firm with offices based in US, UK, Singapore and India.

Eqlipse Technologies

Eqlipse Technologies

Eqlipse Technologies provides products and high-end engineering solutions to customers in the Department of Defense and Intelligence Community.

SOCRadar

SOCRadar

SOCRadar is an Extended Threat Intelligence (XTI) SaaS platform that combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI).