Cybercriminals target data in transit


Cybercriminals target data in transit

Warwick Ashford

Cybercriminals are shifting away from basic "smash and grab" attacks targeting stored data to more complex methods of data harvesting in transit, security research reveals.

This is because security around stored data is increasing, and in-transit data is usually more up to date, according to the 2011 Global Security Report from Trustwave.

As various application security standards and regulatory requirements such as the Payment Card Industry Data Security Standard (PCI DSS) continue to take hold, archived data is becoming less available to criminals, the report said.

Expiration dates on debit and credit cards also limit the period that payment card data is valid, so archived data is not as appealing as harvesting data in transit.

"The increased complexity of obtaining real-time data is outweighed by the increased confidence that the data captured will be usable, the report said.

According to research from Trustwave's SpiderLabs, the company's advanced security team, in 66% of investigations, attackers opted to harvest data in-transit, while stored data was only targeted 26.5% of the time.

In 7.5% of cases, attackers used multiple methods to harvest locally stored data, as well as capturing data in transit.

The researchers found that criminals are continuing to use custom or off-the-shelf malware to harvest data from target systems.

Data-harvesting malware occurred in 76% of investigations, which represents a 23% increase from 2009, according to the researchers.

There is a positive correlation between in-transit attacks and the use of malware because to capture data in transit, attackers must use malware, the report said.

That does not mean malware is limited to in-transit attacks as many of the malware samples were capable of accessing data stored on disk, the report said.

John Yeo, director of SpiderLabs EMEA, said it is imperative there is a responsible focus on security at both the organisation and individual level.

Criminals seek the path of least resistance and will take any opportunity to get hold of valuable information, he said.

"We've seen that new or poorly managed systems are low-hanging fruit when the security implications have not been fully considered," said Yeo.

Email Alerts

Register now to receive IT-related news, guides and more, delivered to your inbox.
By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

COMMENTS powered by Disqus  //  Commenting policy