97% of the data leaked on the dark web comes from cybersecurity agencies

 Recently, the artificial intelligence application security company ImmuniWeb released a study on the sources of data leaked on the dark web this year, and found that 97% of the data leaked on the dark web came from cyber security agencies. On average, every cyber security company leaked more than 4,000. Stolen credentials and other sensitive data.

  The research results are as follows:

  1. 97% of the data leaked on the dark web comes from cyber security agencies;

  2. A total of 631,512 confirmed security incidents were discovered this year, and more than 25% (approximately 160,529) are high or severe security risks, which contain highly sensitive information, such as plaintext credentials or PII, including financial or similar data. Therefore, on average, 1586 copies of stolen credentials and other sensitive data appear on the dark web for each cybersecurity company. In ImmuniWeb's research, more than 1 million unconfirmed leaks (1,027,395) were also found, of which only 159,462 were considered low-risk;

  3.29% of stolen passwords are weak passwords. Research shows that 29% of stolen passwords are weak, with less than 8 characters, or no uppercase letters, numbers or other special characters, which are common vulnerable passwords. Approximately 40 employees of 162 companies reuse the same password without security password protection.

  4. Professional e-mails are used on pornographic websites and adult dating sites, and third-party violations account for a large proportion. ImmuniWeb's research found that 5,121 certificates came from hacked pornographic websites or adult dating sites.

  5.63% of cybersecurity companies’ websites do not comply with PCI DSS requirements, which means they use vulnerable or outdated software (including JS libraries and frameworks) or do not have a web application firewall (WAF) in blocking mode.

  6.48% of the web security companies’ websites do not comply with GDPR requirements and lack obvious privacy policies. When cookies contain PII or traceable identifiers, they lack a cookie disclaimer.

  7. There are 91 companies that have exploitable website security vulnerabilities, of which 26% are still unpatched.

  This research was conducted using ImmuniWeb's free online domain security test, which combines proprietary OSINT technology and machine learning to classify the dark web. 398 leading cyber security companies accepted the test. On June 4, 2020, ImmuniWeb, an artificial intelligence application security company, released a new free dark web monitoring tool to monitor and measure the extent of organizations’ leaks on the Dark Web.

  The U.S. cybersecurity companies are at the highest risk, followed by the United Kingdom and Canada, followed by Ireland, Japan, Germany, Israel, the Czech Republic, Russia and Slovakia.

  Among the 398 cybersecurity companies tested, only companies in Switzerland, Portugal, and Italy did not suffer any high-risk or major risk events, while companies in Belgium, Portugal, and France had related incidents, but the number of verified incidents But the least.

  Ilia Kolochenko, CEO and founder of ImmuniWeb, commented on this research:

  Today, cybercriminals strive to maximize profits by targeting trusted third parties instead of directly attacking individuals. However, this is also divided into circumstances. For example, large financial institutions usually have powerful security protection technologies and legal guarantees that can detect and investigate most attackers in a timely manner. However, law firms and IT companies often lack the internal expertise and budget needed to respond to rapidly growing targeted attacks and APTs.

  For any network security and planning today, the overall visibility and inventory of data, IT and digital assets are essential. Modern technologies such as machine learning and AI can greatly simplify and accelerate a large number of heavy tasks from anomalies to attacks.

From:On DarkNet – Dark Web News and Analysis
Copyright of the article belongs to the author, please do not reproduce without permission.

<<Pre Post
Next Post>>