'Hacktivists' biggest data thieves in 2011: Verizon

Mar 22, 2012
A masked hacker, part of the Anonymous group, pictured in Lyon, France in January 2012. Activists with hacker skills were behind more than half the data stolen in cyber attacks last year, according to findings released on Thursday by Verizon Communications.

Activists with hacker skills were behind more than half the data stolen in cyber attacks last year, according to findings released on Thursday by Verizon Communications.

While criminal groups accounted for an overwhelmingly majority of cyber strikes on networks, "hacktivists" were the ones who rampantly looted data once inside computers, Verizon said in an annual Data Breach Investigations Report.

"This re-imagined and re-invigorated specter of 'hacktivism' rose to taunt organizations around the world," the US telecom titan said.

"Many, troubled by the shadowy nature of its origins and proclivity to embarrass victims, found this trend more frightening than other threats."

About 98 percent of computer network breaches at companies last year were the work of outsiders, with criminal groups out for profit were figured to be behind 83 percent of those attacks.

However, it was self-described activist organizations such as Anonymous and Lulz Security who stole 58 percent of the data while being involved in far fewer cyber attacks, according to Verizon.

"While good old-fashioned greed and avarice were still the prime movers, ideological dissent and schadenfreude took a more prominent role across the caseload," the report said.

The report cited data provided by the US Secret Service, the Dutch National High Tech Crime Unit, the Australian Federal Police, the Irish Reporting & Information Security Service and the Police Central e-Crime Unit of the London Metropolitan Police.

The Verizon findings were released on the same day that an IBM X-Force 2011 Trend and Risk report indicated that tightened security at companies is forcing cyber crooks to rethink tactics and shift to new fronts such as smartphones.

The X-Force report indicated hackers were increasingly resorting to automated password guessing programs, attacks on mobile gadgets, and "phishing" attacks that trick people into downloading viruses or revealing sensitive information.

"We've seen surprisingly good progress in the fight against computer crime through the IT industry's efforts to improve the quality of software," said X-Force threat intelligence and strategy manager Tom Cross.

"In response, criminals continue to evolve their techniques in an attempt to find new avenues into an organization."

Attack techniques include injected malicious code into legitimate websites or ruses that involve impersonating popular social networking services, X-Force warned.

In a bit of good news, the amount of spam email in 2011 was about half that in 2010, according to IBM.

Explore further: New streaming apps could boost citizen journalism

add to favorites email to friend print save as pdf

Related Stories

UK govt to announce new cyber security strategy

Nov 25, 2011

The government is set to announce new measures to tackle cyber crime on Friday as Britain's internet and electronic communications network comes under increased attack from hackers and foreign intelligence ...

Hackers attack Italian cyber police website

Jul 25, 2011

Hacker groups LulzSec and Anonymous announced on Monday that they had hacked into the website of Italy's cyber police and published classified information online in an attack dubbed "Operation Italy".

Hackers grabbed more than 285M records in 2008

Apr 15, 2009

(AP) -- Hackers made off with at least 285 million electronic records in 2008, more than in the four previous years combined, according to a new study that shows identity thieves are getting better at exploiting careless ...

Recommended for you

Meerkat vs. Periscope: Live-streaming app battle & buzz

Mar 27, 2015

Download Periscope, Twitter's just-launched live video-streaming app, and you'll find people broadcasting all sorts of mundane stuff: waiting for AT&T to fix their wiring, getting out of bed in Silicon V ...

Twitter chief vows to help Indonesia fight disasters

Mar 26, 2015

Twitter chief Dick Costolo said Thursday the microblogging site planned to work with Indonesian authorities to warn people about natural disasters that regularly hit the archipelago, from earthquakes to volcanic ...

User comments : 2

Adjust slider to filter visible comments by rank

Display comments: newest first

not rated yet Mar 22, 2012
These are the hackers that want you to you know all about it. Just imagine what the quiet, malicious criminal hackers are doing and getting away with.
not rated yet Mar 23, 2012
"data" is not all created equal. Hacktivists tend to get data with low importance that is guarded by weak (or no) security. Many of them should really be called "opportunists" instead of "hackers"

I'm not trying to say that the real thing isn't out there... just that the numbers in this article are a bit misleading

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.