Cyber Kill Chain Analysis of Five Major US Data Breaches: Lessons Learnt and Prevention Plan

Cyber Kill Chain Analysis of Five Major US Data Breaches: Lessons Learnt and Prevention Plan

Glorin Sebastian
Copyright: © 2022 |Pages: 15
DOI: 10.4018/IJCWT.315651
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Data breaches are a major concern for both US and global corporations. With more companies allowing their employees to be working remote, providing them a secure work environment has been a priority for employers. The Interpol 2020 report on cyber breaches mentions that the number of cyber-attacks has multiplied in the last year. The IBM Data Breach Report of 2021 notes that data breach costs rose from USD 3.86 million to USD 4.24 million, while the average cost was USD 1.07 Mil higher in breaches where remote work was a factor in causing the breach. Given this environment of increased cyber breaches, it is important to learn from previous major data breaches to understand the root cause which led to the compromise of information security and the steps which could have effectively prevented the same. This paper evaluates five major data breaches in US history using Lockheed's Cyber Kill Chain Analysis, since the details of these breaches have never been documented for research and also proposes an eight-step cyber-attack prevention plan.
Article Preview
Top

1. Introduction

The risk of Data breach is becoming one of the major concerns of the US and global corporations, especially with the remote work environment. With more companies allowing the employees to work from home, ensuring data privacy is much tougher given the employees could be working from public spaces such as coffee shops using public Wi-Fi networks that often do not follow the prescribed encryption standards and other security controls, thereby posing a greater threat for data breaches. A report by Interpol Interpol (refer Figure 1 for details) in 2020 reported an alarming rate of cyberattacks especially during the Covid-19 pandemic. Key findings highlighted by the Interpol assessment of the cybercrime landscape noted the three main types of cyber-attacks that has been on the rise, during the last few years are Malicious domain, malware and phishing frauds. (Interpol, 2020).

Figure 1.

Main Cyber-attacks as per Interpol report

IJCWT.315651.f01
  • 1.Online Scams and Phishing - Threat actors use phishing emails for online scams to entice victims into providing their personal data or downloading malicious content.

    • 2.

      Disruptive Malware (Ransomware and DDoS) - Cybercriminals are increasingly using disruptive malware against critical infrastructure mainly for financial benefit. The deployment of data harvesting malware such as Remote Access Trojan, information stealers, spyware, and banking Trojans by cybercriminals is on the rise. These Malware can be used as both Ransomware and DDoS (distributed denial of service) attacks.

    • 3.

      Malicious domains: Attackers are also trying to mislead online users to malicious domains which usually host data harvesting malware or are designed to extract personal information from the end-users.

The IBM Data breach report notes that (IBM, 2021):

  • -

    Data breach costs rose from USD 3.86 million to USD 4.24 million

  • -

    The average cost was USD 1.07 Mil higher in breaches where remote work was a factor in causing the breach

  • -

    The most common initial attack vector, compromised credentials, was responsible for 20% of breaches at an average cost of USD 4.37 million.

This paper compares five of the major breaches in US history Equifax, Desert Sands, Target, Yahoo, and City of Atlanta & Not Petya Case Study Reports using the Cyber Kill Chain analysis approach of Lockheed Martin (2022). Based on this analysis the paper discusses the common lessons learned and also proposes a cyber-attack mitigation plan/checklist based on the learnings from these attacks as well as industry best practices

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing