June 23, 2016 By Michelle Alvarez 2 min read

According to recent IBM X-Force Interactive Security Incident data, 6 percent of the more than 1,100 companies with reported security incidents since 2011 were repeat offenders — that is, they experienced a security incident more than once in less than six years. Attack types associated with these security incidents included distributed denial-of-service (DDoS), brute-force and SQL injection attacks, as well as malware and phishing.

During this period, at least one organization experienced a total of eight incidents — seven separate reported successful DDoS attacks against its website and one incident involving the compromise of customer accounts as a result of a brute-force attack on weak or reused passwords.

Several of these repeat offenders are attractive to attackers because of their niche target audiences; they allow attackers to serve malicious content to a targeted browsing population. Operators of such websites may not be as focused on security as larger, more mainstream entities. Their weak security posture makes them a sitting duck for cybercriminals.

Repeat Offenders by the Numbers

According to X-Force data:

  • More than 460 million records were compromised as a result of the 176 incidents associated with the 70-plus repeat offenders.
  • Of the 14 repeat offenders with three or more incidents tied to their name, eight were financial institutions.
  • Of the incidents for which the attack type was known, nearly 53 percent involved DDoS. Malware was the second-most popular attack vector, making up over 14 percent of incidents.
  • About 23 percent of the 176 incidents were claimed by Qassam Cyber Fighters, who targeted U.S. banks in an ongoing hacktivist DDoS campaign over an almost two-year period. This resulted in service interruptions and downtime for customers.

Shame on My Security Posture?

Is your security posture to blame? Not necessarily.

DDoS attacks can be mounted against any organization despite a strong security posture. Internet service providers and their partners aren’t always able to defend against a major DDoS attack. Attackers keep finding new DDoS techniques, so repeat victimization is almost expected. However, removal of these incidents from the equation still paints a concerning picture.

  • According to X-Force data, the most compromised organizations (there are two) experienced a total of four security incidents, including SQL injection malware, watering-hole and brute-force attacks.
  • Forty repeat offenders totaled more than 100 incidents.
  • Of the incidents for which the attack type was known, nearly 28 percent involved malware.

Multiple Incidents, Different Attack Types

Of the companies where more than one attack types was known, about half did not experience the same attack type. In other words, a targeted company may have experienced a SQL injection attack one year and a DDoS attack with an element of extortion the following.

The main takeaway here? History doesn’t always repeat itself. Design a security strategy for the future that not only incorporates lessons learned from past breaches, but also reduces risk from multiple attack vectors and protects critical assets.

Read the complete IBM 2016 Cyber Security Intelligence Index

More from X-Force

Hive0051 goes all in with a triple threat

13 min read - As of April 2024, IBM X-Force is tracking new waves of Russian state-sponsored Hive0051 (aka UAC-0010, Gamaredon) activity featuring new iterations of Gamma malware first observed in November 2023. These discoveries follow late October 2023 findings, detailing Hive0051's use of a novel multi-channel method of rapidly rotating C2 infrastructure (DNS Fluxing) to deliver new Gamma malware variants, facilitating more than a thousand infections in a single day. An examination of a sample of the lures associated with the ongoing activity reveals…

Ongoing ITG05 operations leverage evolving malware arsenal in global campaigns

13 min read - As of March 2024, X-Force is tracking multiple ongoing ITG05 phishing campaigns featuring lure documents crafted to imitate authentic documents of government and non-governmental organizations (NGOs) in Europe, the South Caucasus, Central Asia, and North and South America. The uncovered lures include a mixture of internal and publicly available documents, as well as possible actor-generated documents associated with finance, critical infrastructure, executive engagements, cyber security, maritime security, healthcare, business, and defense industrial production. Beginning in November 2023, X-Force observed ITG05…

Why federal agencies need a mission-centered cyber response

4 min read - Cybersecurity continues to be a top focus for government agencies with new cybersecurity requirements. Threats in recent years have crossed from the digital world to the physical and even involved critical infrastructure, such as the cyberattack on SolarWinds and the Colonial Pipeline ransomware attack. According to the IBM Cost of a Data Breach 2023 Report, a breach in the public sector, which includes government agencies, is up to $2.6 million from $2.07 million in 2022. Government agencies need to move…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today