In the 21st century data is everything. We log and report everything from voting habits of a certain region to purchasing preferences for market segments. It helps governments, businesses and institutions analyze and strategize better. Take this piece of information for an instance.

“For every two degrees the temperature goes up, check-ins at ice cream shops go up by 2%”

This random piece of information means almost nothing to most of the general public, but for an ice-cream company, it may provide some hint on how to stay ahead of the competition. Now imagine that this information is backed by complete data on regular consumers along with their purchase preferences and contact details. Wouldn’t that be just too great?

That is exactly the kind of information that the data breaches target? Today, digitalism based on cloud and data is everything. It’s everywhere too. Data is being logged about our choices, ideology, age, hobbies, income, and much more. To enterprises and governments, such detailed data on an entire market segment, region or country.

According to Trend Micro, Brazilian underground market sells business application account credential for anywhere from $155 to $193 while credit card credentials are sold for $35 to $135. We can just imagine how much this market is worth globally.

Open Source Application Security

Last year, we’ve already witnessed big houses like Sony, Amazon, Alibaba, and JP Morgan Chase falling to data breach attempts. And earlier in 2015, it happened with British Airways, Anthem, and others, indicating that attackers are in no mood to slow down.

Probably every organization understands the value of data, given that they take important business decisions based on that and even invest a lot of both time and money. Unfortunately, they are not doing enough to protect it on the other hand.

On a traditional approach, it is believed that money is more important than data. After all, what can be worse than losing hard cash through online breaches, right? Well not exactly if you look at how data breaches impact finance. According to early estimates, Sony will be losing close to $35 million in just investigation of the breach that revealed internal emails, unreleased movies, contracts, and details of about 45,000 celebrities.

In a similar picture, Target has lost $252 million due to data breach that involved 70 million individual address-phone records, and 40 million debit and credit card records.

Open Source Application Security

Top Data Breach Threats

While large enterprises can fuel in a lot of money into post breach postmortems the small and medium sized organizations do not have that option. At the same time, big data and cloud will be our way of the future, so it’s rather smart to start looking into risk factors and then patching them before it is too late.

At Indusface, we have worked out the potential threats that can lead to data breaches, along with ways to deal with these loopholes.

1)      OWASP Top 10

Information research firm Gartner says that 75% of the hacking attempts happen at the application layer. The Open Web Application Security Project, popularly known as the OWASP, has listed top 10 application vulnerabilities that can be exploited by attackers. Amongst these 10, SQL injection or input injection is the most prevalent way for hackers to get to the databases. Under such an attack, they insert malicious codes or input fields to trick web applications into providing unauthorized access. It is believed that most of the data breaches are a result of this type of attack.

Similarly other OWASP application vulnerabilities including Cross Site Scripting (XSS) and Cross Site request Forgery (XSRF) and can also be exploited to reach the database. Dynamic application security testing for web applications is the best way to start looking for risks that mimics real-life attacks with the help of a security analyst to discover risks.

The detected application vulnerabilities can then be mitigated through managed web application firewall. It shield application without any changes to the code and makes sure that attackers cannot exploit vulnerabilities.

2)      Privilege Abuse

Database and server privileges can be exploited by users internally. Often organizations fail to limit such access to only trusted employees and end up losing sensitive data without knowledge. Consider a healthcare company’s database user who is limited to viewing patient info, what if he takes screenshots or saves the file in personal storage? This data can later be distributed or sold.

Privilege control mechanism control according to job profiles should be monitored periodically. Define and maintain policy for roles too.

3)      Malware

Attackers widely use intrusive and hostile programs to steal sensitive information through computers, network, web and mobile applications. These executable code scripts remain untraced for long periods and send data to the owner in batches without any notification to the system administrator.

Regular malware hunting is critical for enterprise and government websites to prevent the transmission of sensitive data. System and web application scanning can help detect malware through the OSI layers.

4)      Weak Database Management

Database records huge chunks of information and it’s often impossible to keep track of what’s where on the server. As a matter of fact, most organizations do not really pay a lot of attention in the direction and that’s exactly where they fail. Many times during testing phase of applications too, unknown new databases are created randomly that security team might not be able to locate.

5)      Weak or No Encryption

Whether it is backup database or data communication over the internet, encryption with unique keys is the best way to ensure that it’s not sniffed around. However, till today, most companies have not switched to best encryption practices and with vulnerabilities like POODLE and FREAK, it gets easier to hack. And for unencrypted data, it’s a nightmare.

Organizations should adopt advanced encryption techniques. Updated SSL certificates with strong encryption are recommended and so is web application scanning to mark the loopholes.

Founder & Chief Marketing Officer, Indusface

Venky has played multiple roles within Indusface for the past 6 years. Prior to this, as the CTO @indusface, Venky built the product/service offering and technology team from scratch, and grew it from ideation to getting initial customers with a proven/validated business model poised for scale. Before joining Indusface, Venky had 10+ years of experience in security industry and had held various mgmt/leadership roles in Product Development, Professional Services and Sales @Entrust.