Skip to main content
Protect YourselfSE

2017 Verizon DBIR Social Engineering Breakdown

2017 Verizon DBIR Social Engineering Breakdown

The much anticipated 2017 Verizon DBIR was recently released and has some interesting data for social engineering attacks in 2016.  Social-Engineer is proud to have been a contributor to this year’s report. Below are highlights from the report, and some tips at the end on how to stay safe.

picture2

Verizon studied 42,068 security incidents that resulted in 1,935 breaches. Overall, 43% of the documented breaches involved social engineering attacks!  That’s almost half, and these are the only representative of the reported/documented breaches.

picture3
Figure 1: Overall breaches using Social Attacks

Not surprisingly, 66% of malware came from malicious email attachments.  These could have been emails from phishing attacks or may have come from a trusted account that had been previously hacked.  Either way, the majority of the malware infections started from a rotten email.

picture4
Figure 2: Malware and phishing are close friends

The Education sector saw another rise in social engineering attacks.  Over half of the breaches involved the theft of Personally Identifiable Information (PII) of students and teachers, and just over 25% resulted in the loss of intellectual property.   Social engineering attacks (mostly phishing) were used in almost 44% of these breaches and were combined with another attack vector in many cases.

picture6
Figure 3: Social attacks against the Education sector

The Information sector (social media, telecommunications, software) saw phishing involved in most attacks.  Once clicked, the malicious emails often installed malware to collect credentials and carry out further hacking against the target.

picture7
Figure 4: Phishing took place in most attacks against the Information sector

The Manufacturing sector was hit particularly hard last year, with the majority of breaches managing to snag proprietary data from the target.  Similar to the Information sector, phishy emails were the gateway for malware to be installed in 73% of these incidents!

picture8
Figure 5: Phishing was involved in 73% of these breaches

Espionage attacks driven by state-affiliated actors preferred phishing as their main source of starting an attack.  Manufacturing again was at the top of the attacked industry list.

picture9
Figure 6: The spy who phished me

picture10
Figure 7: Industries targeted by state-affiliated actors

Looking at simulated phishing exercises, no industry was immune from clicking on malicious links.  Manufacturing seemed to be the most vulnerable, but other industries from Healthcare to Education were also susceptible.  This goes to show that continual training on spotting and reporting phishing emails is critical to your business.

picture11
Figure 8: Simulated phishing results across the industry

Staying Safe From Social Engineering Attacks

  • Remember to always manually navigate to known, good sites; don’t click on suspicious links in emails.
  • Think before clicking or responding to emails. Was the email expected?  Has this company/person ever emailed you at that address before?  Does the email seem scary or too good to be true?  These are all flags that can help you spot a phish.
  • Verify the identity of a caller asking for information. If you are unsure what to do, discontinue the call and check with the business or your company directly.
  • Make sure the privacy settings on your social media accounts are locked down. Information gathered from them can become the basis for a very convincing social engineering attack.
  • If you own a business, train your employees continually so they are always vigilant. Regular phishing and vishing training exercises will help greatly.
  • Spread these tips to non-technical friends and family, so they can stay safe online too.

Per Verizon: Our data is non-exclusively multinomial meaning a single feature, such as “Action”, can have multiple values (i.e., “social”, “malware” and “hacking”). This means that percentages do not necessarily add up to 100%. For example, if there are five botnet breaches, the sample size is five. However, since each botnet used phishing, installed keyloggers and used stolen credentials, there would be five social actions, five hacking actions, and five malware actions—adding up to 300%. This is normal, expected and handled correctly in our analysis and tooling.”

Sources:  https://enterprise.verizon.com/resources/reports/2017_dbir.pdf

Leave a Reply

Security Assessment Case Study
Learn more about the importance of a Social Engineering Risk Assessment.
Security Assessment Case Study
Learn more about the importance of a Social Engineering Risk Assessment.
What Makes Us Different
At Social-Engineer, we pride ourselves on what we do and how we do it. We are a security services provider, focusing on four primary attack vectors. This case study will go through how we can protect your company and what makes us different.
What Makes Us Different
At Social-Engineer, we pride ourselves on what we do and how we do it. We are a security services provider, focusing on four primary attack vectors. This case study will go through how we can protect your company and what makes us different.
Woman vs Machine
Technology is providing new, more innovative ways to enhance our world. Scientists are constantly developing smarter, faster and more intelligent machines, systems and robots. There is no doubt that each of these has evolved beyond their clockwork origins.
Woman vs Machine
Technology is providing new, more innovative ways to enhance our world. Scientists are constantly developing smarter, faster and more intelligent machines, systems and robots. There is no doubt that each of these has evolved beyond their clockwork origins.
Vishing and Phishing Must Be Ongoing to Be Effective
Most companies have a security awareness program in one form or another. If they don’t, it should be on the short list of programs to start as soon as possible. In our experience, many of these programs take the form of computer-based training.
Vishing and Phishing Must Be Ongoing to Be Effective
Most companies have a security awareness program in one form or another. If they don’t, it should be on the short list of programs to start as soon as possible. In our experience, many of these programs take the form of computer-based training.
A Case Study in Vishing
Vishing (voice-based phishing) has been a problem for quite a long time. There are many vendors in the marketplace that offer vishing services. However they tend to use robo-callers or call centers for large volume engagements. If they are using trained humans to make calls, it is likely in very low numbers.
A Case Study in Vishing
Vishing (voice-based phishing) has been a problem for quite a long time. There are many vendors in the marketplace that offer vishing services. However they tend to use robo-callers or call centers for large volume engagements. If they are using trained humans to make calls, it is likely in very low numbers.
Benefits of a Social-Engineering Risk Assessment Engagement
Your company is important. Indeed, the data you hold for your clients or employees is very valuable and attackers seek to capitalize on that data any way they can. This is where a Social Engineering Risk Assessment (SERA) engagement can help uncover possible vulnerability to attackers.
Benefits of a Social-Engineering Risk Assessment Engagement
Your company is important. Indeed, the data you hold for your clients or employees is very valuable and attackers seek to capitalize on that data any way they can. This is where a Social Engineering Risk Assessment (SERA) engagement can help uncover possible vulnerability to attackers.
The Business Value of the Social-Engineer Phishing Service
Cybercriminals are targeting the human element of organizations. Additionally, they are developing techniques to use an organization’s employees as the first point of entry. According to the 2021 Verizon DBIR report, of the 3,841 security breaches reported using social engineering, phishing was the key vector for over 80% of them.
The Business Value of the Social-Engineer Phishing Service
Cybercriminals are targeting the human element of organizations. Additionally, they are developing techniques to use an organization’s employees as the first point of entry. According to the 2021 Verizon DBIR report, of the 3,841 security breaches reported using social engineering, phishing was the key vector for over 80% of them.