Security Breach – 3 Sept 2020

Security Breach – 3 Sept 2020

Growing Dark Web data dumps are fuelling new Cyber crime.Dark Web data dumping has dramatic increase in quantity and quality now available which is a key contributor to the cybercrime in 2020.

These types of data dumps have been a source of fodder for cybercriminals. However, a dramatic increase in the quantity and quality of data that is available inexpensively or for free on the Dark Web is a key contributor to an explosion of cybercrime in 2020 (like ransomware or credential stuffing attacks) that can devastate your business. 

It’s estimated that 65% of the data on the Dark Web now can damage businesses, and more is being added every day through the release of information obtained in previous cyberattacks and the addition of information that’s been gathered about companies and populations.

One of the most common ways that new information fuels cyberattacks is through a data dump.

Dark Web data dumps are huge quantities of information added to the pool that cybercriminals can draw from to power cyberattacks like ransomware, credential stuffing, and phishing.

Everything from reams of email addresses to sensitive employee and security information to driver’s license records from around the world is making its way into the slurry of Dark Web data dumps.

That’s why it pays to have constant, reliable Dark Web monitoring and analysis through a solution like Dark Web ID to watch for your company’s protected employee credentials to hit the Dark Web.

You can also add additional protections for privileged administrator and executive credentials.

Dark Web ID uses human and machine intelligence to keep an eye on every shady corner of the Dark Web 24/7/365.

If your protected passwords or credentials are spotted entering a Dark Web marketplace, you’re alerted to the potential danger quickly, giving you time to take action against attacks.

With the constant stream of information flowing into Dark Web data markets growing every day, it makes sense to make sure that you’re watching for trouble so that you can stop cyberattacks before they start.

Recent Breaches

New Zealand – New Zealand Stock Exchange (NZX)

Exploit: DDoS/Hacking Attack

Risk to Small Business: Extreme: It has been a wild week for businesses, investor, and stock traders in New Zealand ad a series of cybersecurity incidents in rapid succession caused trading to stop and start several times.

The market faced disruptions for four days last week when it was hit repeatedly by distributed denial of service (DDoS) attacks, affecting both cash trading and other transactions while taking down its internet capabilities. Officials claim that the attacks are coming from an “offshore” source, and may be connected to recent hacking troubles in Australia.

As of 30 August, the problem was still reoccurring and being addressed by NZX, the Financial Markets Authority (FMA), Spark, and a U.S.-based cybersecurity firm Akamai Technologies.

Risk to Exploited Individuals: No personal information or consumer financial data has been reported compromised in this incident.

Customers Impacted:  Unknown

Canada – Brookfield Residential

Exploit: Ransomware

Risk to Small Business: Severe:  DarkSide ransomware is the culprit in an attack on North American home builder and community developer Brookfield Residential. The company acknowledged that a limited subset of files had been impacted containing employee records and that the files had been restored from backup and incident reported to the appropriate authorities. Initial confusion about the scope of the incident was quickly cleared up: the ransomware gang initially claimed to have hacked Brookfield Asset Management, of which Brookfield Residential is a division, but later confirmed that it was just the builder affected.

Risk to Exploited Individuals: Moderate:  The company has only indicated that a limited amount of employee records were impacted and has not specified the nature of that data.

Customers Impacted:  Unknown

Ensure you’re protecting your data and systems from common sources of credential compromise and data loss by implementing a solid cybersecurity plan.

Talk to a TCT team member today and we can show you how.

Robert Brown

Follow us on LinkedIn:

Related Articles:
Healthcare breaches climb as attackers branch out
The World Has Changed. So Has the Dark Web.

Log a Job: