Trustwave 2011 Global Security Report Reveals Shift in Cybercrime Tactics

Report Highlights New Custom Malware, Covert Social Networking Attacks and Automated Threats Against Mobile Devices


CHICAGO, IL--(Marketwire - January 19, 2011) - Today Trustwave unveiled its 2011 Global Security Report, which reveals the target of attacks has shifted from traditional infrastructure to mobile users and endpoint devices. Research from Trustwave's SpiderLabs -- the company's advanced security team responsible for application security, incident response, penetration testing and security research -- found that malicious tools became more customized, automated and persistent in 2010. This trend combined with the popularity of mobile devices and social media is providing the perfect recipe for cybercriminals looking to compromise business, customer and user private and sensitive information. The report offers analyses of data compromise investigations, offensive security exercises and defense strategies taken directly from Trustwave's expansive global client base.

Key Report Findings

  • Food and beverage regained its title as the most breached industry -- representing 57% of the investigations.
  • Third-party vendors continue to put companies at risk -- 88% of breaches resulting from insecure software code or lax security practices in the management of third-party technology.
  • Cybercriminals got fresh in 2010 -- because in-transit credit card data is usually more recently created (more fresh) than stored data, 66% of investigations found the theft of data in transit.
  • A single organized crime syndicate may be responsible for more than 30% of all 2010 data breaches.

Evolving Threats
Among the most interesting and surprising elements of the report is the rate and sophistication of attacks against mobile platforms and social networking sites. As the security of mobile networks has improved, mobile devices are increasingly the target of attacks, while social networking sites are quickly becoming cybercriminals' platform of choice to expand and propagate destructive botnets. Drive-by infections and mobile phishing attacks were among the most popular client-side attacks in 2010.

  • Geolocation data is helping cybercriminals launch more sophisticated and targeted attacks against social networks.
  • Mobile devices offer cybercriminals an open door to corporate authentication credentials, sensitive data and trade secrets.
  • Anti-virus software is losing the battle against malware -- the new breed of malware is virtually undetectable by current scanning software.

Top Strategic Security Initiatives for 2011
A key take-away from the report is that attacks are often successful in organizations that believed a comprehensive data security strategy was in place. For executives and managers who are tasked with ensuring their company does not suffer a security event, the report offers specific guidance for 2011.

  • Assess, Reduce and Monitor Client-Side Attack Surface: Monitor and inventory applications to measure adherence to standards and evaluate risk.
  • Embrace Social Networking, but Educate Staff: An established policy and education can help protect against attacks originating from social networking tools.
  • Develop a Mobile Security Program: Gaining control over configurations of mobile devices will help reduce risk.
  • Enforce Security Upon Third Party Relationships: Choose a platform and vendor with a solid security history, and require vendors to undergo third-party security testing.

Robert J. McCullen, chairman and CEO of Trustwave, "In 2011 and beyond, organizations that approach their initiatives firmly committed to including security as an integrated requirement, and not just as a checkbox, will be most resilient to attack, reduce their risk to compromise, and be able to best protect both sensitive data and reputation."

Nicholas J. Percoco, senior vice president and head of SpiderLabs, "Over the past year, we spent a great deal of time digging deeper to provide readers with the most comprehensive information security report available. This year, we not only include expanded analysis of our compromise investigations, but also take a new look at the expanding and evolving landscape of data security vulnerabilities."

A complete copy of the "2011 Global Security Report" is available at: https://www.trustwave.com/GSR.

Report Methodology
The foundation of Trustwave's Global Security Report 2011 is data from real-world investigations and research that SpiderLabs performed in 2010. Results are based on information gathered from over 200 data breach investigations, 2,300 penetration tests and other security-as-a-service (SaaS) activities conducted for our clients. Standardized tools were used to record data, as well as other relevant details for each case or test.

About Trustwave
Trustwave is the leading provider of on-demand and subscription-based information security and payment card industry compliance management solutions to businesses and government entities throughout the world. For organizations faced with today's challenging data security and compliance environment, Trustwave provides a unique approach with comprehensive solutions that include its flagship TrustKeeper® compliance management software and other proprietary security solutions. Trustwave has helped thousands of organizations -- ranging from Fortune 500 businesses and large financial institutions to small and medium-sized retailers -- manage compliance and secure their network infrastructure, data communications and critical information assets. Trustwave is headquartered in Chicago with offices throughout North America, South America, Europe, Africa, Asia and Australia. For more information, visit www.trustwave.com.

Contact Information:

CONTACT:
Lorraine Kauffman-Hall for Trustwave
+1 704-882-0443

Melissa Forsyth
Trustwave
+1 312-873-7244