CONTACT US
Third Party Risk Management - Consultancy, Assessment & Advisory

Verizon Data Breach Investigations Report 2019: What Are the Third-Party Risk Implications?

Prevalent Inc. Intelligence Analyst, Shawn Stefanick, provides analysis on Verizon’s Data Breach Investigations Report (DBIR) through the lens of how top third-party vulnerabilities are perpetuating breaches, and what preventative measures can be put in place.

The Verizon DBIR 2019 was released on May 8th, and with it comes the annual treasure trove of lessons, use cases, and best practices to better secure your organisation against threat actors of all types. As a third-party risk management leader, we looked at this year’s report through the lens of how the top third-party vulnerabilities are perpetuating breaches, and what measures can be put into place to prevent such breaches from happening. Knowing the threat landscape is important, but more important is awareness of your and your vendors’ attack surface.

Here’s what we gleaned from the Verizon DBIR 2019…

 

Web applications continue to be a top breach vector for hackers – with an increasing focus on eCommerce applications

Verizon DBIR 2019 Third Party Risk fig14
Start with figure 14 in the report, and you’ll notice that web apps continue to be the top attack vector for hackers.

Attackers go after low hanging fruit. In most cases, this will be the web application, as it’s the least mature technology and therefore has the largest attack surface. Also, third-party code is used frequently across all applications even further expanding the attack surface.

Our recommendation is to use a cyber monitoring solution to review the Internet-facing web application attack surface (e.g. through external vulnerability scanning, DNS configurations, etc.) and monitor the dark web for stolen credentials attached to those apps. Both are good security practices to reduce this very real attack surface.

Prevalent’s Continuous Monitoring service includes built-in application security capabilities that perform sub-resource integrity checking—a security feature that enables browsers to verify that any resource they fetch (from a CDN, for example) and deliver has not been modified.

That way, if a third-party script is compromised and malicious code is inserted, the browser will fail to load the script, since the cryptographic hash of the malicious script won’t match the known trusted hash in the integrity tag.

 

Use of stolen credentials is by far the No. 1 hacking action variety

Remember above where we mentioned web applications as the top vector? Those exposed assets – combined with the number one hacking action – stolen credentials (figure 13 in the report) – pose a significant risk to organisations across all sectors.

Verizon DBIR 2019 Third Party Risk fig13

To combat this attack vector, Prevalent delivers reporting on phishing events in addition to dark web monitoring, providing some awareness of how often your vendors are being targeted and what malicious domains are being stood up as part of these campaigns. For example, we have seen situations where attackers have stood up a domain that masquerades as a login portal that customers of the vendor all share. Having this type of intelligence helps InfoSec teams blacklist the activity. See below for a screenshot of the phishing events report.

Speaking of credentials, it’s widely known that password reuse is a significant security lapse in nearly every organisation. The problem is compounded when sysadmins reuse admin passwords across systems, or worse: use the same password for non-privileged and privileged accounts.

Checking your vendor’s password management policies should be part of your vendor due diligence process – collected as part of a deep-controls-based assessment – helping to bring visibility to potentially bad password management practices which could be exploited to gain credentials for a breach.

 

34% of breaches were perpetuated by insiders

Verizon DBIR 2019 fig4
The threat actor in breaches is internal 34% of the time—whether knowingly or unknowingly.

Regularly monitoring your vendors business risks – operational, legal/regulatory, brand, and financial risks – can help reveal potential issues that could impact your business down the line.

For example, layoffs increase the risk of an insider threat via a disgruntled former employee, or poor financial performance may reduce spending on cybersecurity and subsequently user security awareness and training may be hampered.

Prevalent utilises an industry-unique combination of technology, data analytics, and human analysts to deliver business risk assessments. Prevalent analysts collect, categorise, and score based on rules derived from a combination of methods including commercial due diligence, financial analysis, and cyber threat intelligence. With backgrounds in national security and cyber threat intelligence, Prevalent cyber analysts provide geopolitical context and fluency in seven languages.

 

Next steps

Insights from continuous monitoring can and should be used both internally and alongside results of internal controls-based assessments for a complete picture of your critical vendors that may have access to sensitive systems and data. In this blog we reviewed four such use cases: scanning for web application vulnerabilities and for stolen credentials on the dark web, assessing password policies, and monitoring for potential risks stemming from business events.

For more on how DVV Solutions and Prevalent can help you centralise your view of third-party risk management – delivering a unified outside-in and inside-out approach to improving security and meeting compliance requirements, contact us today for a demo.