2017 Year End Data Breach QuickView Report
2017 Year End Data Breach QuickView Report
1 | Data Breach Intelligence Copyright © 2018 Risk Based Security, Inc. All rights reserved.
Table of Contents
2 | Data Breach Intelligence Copyright © 2018 Risk Based Security, Inc. All rights reserved.
2017 Year End Compared to the Previous Four Years
3 | Data Breach Intelligence Copyright © 2018 Risk Based Security, Inc. All rights reserved.
2017 Year End Breaches by Type, by Record
Hacking 2,905
Web 68.8%
Hacking 29.8%
Unintentional exposure of
sensitive date via the Internet
reached staggering heights in
Stolen Computer 0.7%
2017, with 5.4 Billion records
exposed due to inadvertent
Undisclosed 0.6% publication, misconfigured
services and leaky portals.
Stolen Laptop 0.0%
4 | Data Breach Intelligence Copyright © 2018 Risk Based Security, Inc. All rights reserved.
2017 Year End Breaches by Threat Vector, By Record
Number of Incidents
by Threat Vector
Outside 4280
The interplay between how
Inside-Accidental 403
the majority of breaches are
Inside-Unknown 191 happening (hacking) and how
the majority of sensitive data
Unknown 169 is exposed (web) is evident
Inside-Malicious 164
when looking at breach
events triggered by outsiders
- 1,000 2,000 3,000 4,000 5,000
versus insiders. Once again,
the vast majority of breaches
Threat Vector Records Exposed originate outside of the
Inside-Accidental 3,079,361,872 organization but insider
Outside 2,738,517,484
Inside-Unknown 2,020,878,036
actions expose data at a rate
Unknown 59,590,961 of nearly 2 to 1 compared to
Inside-Malicious 1,646,259 outsider activity.
Total 7,899,994,612
5 | Data Breach Intelligence Copyright © 2018 Risk Based Security, Inc. All rights reserved.
2017 Year End 10 Largest Breaches With Data Types and Severity Scores1
Percentage of Breaches Exposing Top Four Data Types - 2017 vs. Prior Years
Data Type 2017 2016 2015
Email Address 49.0% 42.4% 44.8%
Password 44.6% 37.9% 48.5%
Name 29.5% 35.3% 30.0%
Physical
20.1% 20.4% 13.7%
Address
As 2017 came to a close, access credentials in the form of email address and password
combinations remained a prime target for data theft. This has been a consistent theme since 2012.
It is tempting to attribute the trend to malicious actors seeking a simple pathway into networks.
After all, it is easier – and stealthier - to gain access using legitimate keys to the front door rather
than breaking in through a side window. However, only 2.6% of breaches reported in 2017 were
traced back to the use of stolen credentials.
7 | Data Breach Intelligence Copyright © 2018 Risk Based Security, Inc. All rights reserved.
2017 Year End Analysis of Records Compromised Per Breach
Number of Percent of
Exposed Records Breaches Total
Unknown/Undisclosed 1742 33.5%
1 to 100 1639 31.5% Despite more breaches – and
101 to 1,000 904 17.4% more large breaches – taking
1,001 to 10,000 528 10.1% place in 2017, nearly 60% of
10,001 to 100,000 225 4.3%
100,001 to 500,000 60 1.2% incidents exposed between 1 and
500,001 to 999,999 20 0.4% 10,000 records.
1 M to 10 M 55 1.1%
> 10 M 34 0.7%
2017 Year End Average Number 0f Records Exposed For Top 5 Breach Types
Average Percent of
Number of Number of Records
Breach Category Records per Total Records
Breaches Exposed
Breach Exposed
Hacking 2905 2,353,543,662* 810,170 29.79%
Skimming 571 7,040 12 0.00%
Phishing 314 807,093 2,570 0.01%
Virus/Malware 301 3,094,052 10,279 0.04%
Web 258 5,427,649,803 21,037,402 68.70%
*Data updates resulted in a lower record count compared to prior quarter report.
8 | Data Breach Intelligence Copyright © 2018 Risk Based Security, Inc. All rights reserved.
Distribution of Business Groups Within Top 3 Economic Sectors
Percentage of Breaches
Economic Sector Business Group Within Economic Sector
Software / Web Services 79.3%
Information* (51) Mass Media 12.4%
Telecommunications 8.3%
Hospitals 34.4%
HealthCare (62) Practitioners’ Offices 32.4%
Non-Hospital Facilities 27.2%
Finance 80.6%
Finance & Insurance* (52)
Insurance 19.4%
*Note, the Information and Finance & Insurance sectors are made of three and two Business Groups respectively. As such, the entire
sector is represented.
Breach reporting obligations in the United States have long contributed to the
information available for breach analysis. On May 25, 2018, the EU will begin
enforcing the General Data Protection Regulation (GDPR), including the requirement
for mandatory breach notification to both individuals and regulatory authorities. This
change should lead to greater discloser of events throughout the EU.
9 | Data Breach Intelligence Copyright © 2018 Risk Based Security, Inc. All rights reserved.
2017 Year End Breaches by Country
Three large breaches, including exposure of data belonging to Email Car, NetEase and DU Caller, drove
the high record count for China. These three breaches also contributed significantly to the total number
of records exposed in 2107.
10 | Data Breach Intelligence Copyright © 2018 Risk Based Security, Inc. All rights reserved.
2017 Year End Distribution of Breaches By State
Incidents by US State -
Top 10
CA 241
FL 172
TX 170
NY 144
PA 100
OH 83 With the exception of
IL 77 Maryland, the number
VA 72
MA 61 of breaches per state
NJ 57 closely aligns with the
ten most populous
states.
Exposed Percentage of
US Total Exposed Number of Exposed
Records Records Exposed in
State Records Breaches Records/Breach
Ranking USA
1 WA 1,375,372,393 39 35,265,959 59.36%
2 CA 295,290,220 241 1,225,271 12.74%
3 NJ 33,812,931 57 593,209 1.46%
4 NY 11,261,602 144 78,206 0.49%
5 GA 10,725,010 53 202,358 0.46%
6 MD 6,721,954 55 122,217 0.29%
7 AR 6,611,511 12 550,959 0.29%
8 TX 5,477,243 170 32,219 0.24%
9 CT 3,080,345 33 93,344 0.13%
10 MI 2,541,609 39 65,169 0.11%
11 | Data Breach Intelligence Copyright © 2018 Risk Based Security, Inc. All rights reserved.
2017 Year End Breaches Impacting Third Party Organizations
7% 6%
11%
Medical
26%
Government
Business
Unknown
Education
50%
• Steward Organizations – defined as the party responsible for protecting the data at the
time of the breach – classified in the business sector account for 50% of the breaches
with a direct impact on other organizations.
• 28.9% of the breaches impacted more than one third party organization and 7.6%
impacted more than three organizations.
12 | Data Breach Intelligence Copyright © 2018 Risk Based Security, Inc. All rights reserved.
2017 Year End Breach Severity Scores By Date Reported
Breach severity scores are based on a number of factors including number and type of records
lost, how the breach occurred, and the presence of follow on actions such as lawsuits or
regulatory investigations. An increase in the number of breaches scoring 3 or below in Q3 and
Q4 is a bright spot in an otherwise troubling year. Breaches exposing fewer records coupled
with less critical data types compromised combined to produce more breaches with lower
severity scores.
.
2017 Year End Top 10 Breaches By Severity Score
DU Group dba (Web) 2,000,000,000 user phone numbers, names and addresses
10 Q2
DU Caller inappropriately made accessible in an uncensored public directory
13 | Data Breach Intelligence Copyright © 2018 Risk Based Security, Inc. All rights reserved.
Score Reported Organization Top 10 Summary
NetEase, Inc. (Hacking) 1,221,893,767 email addresses and passwords stolen by hackers
10 Q1
dba 163.com and sold on the Dark Web by DoubleFlag
14 | Data Breach Intelligence Copyright © 2018 Risk Based Security, Inc. All rights reserved.
Reported Records Industry- Breach
Summary Organization
Date Exposed Sector Location
15 | Data Breach Intelligence Copyright © 2018 Risk Based Security, Inc. All rights reserved.
Reported Records Industry- Breach
Summary Organization
Date Exposed Sector Location
Organization’s
Number 16 Hack exposes USA voter United
154 Million Name has not Unknown
6/23/2016 information. States
been reported
Hack exposed customer names,
IDs, encrypted passwords and
Number 17 debit/ credit card numbers with Adobe Business - United
152 Million
10/3/2013 expiration dates, source code Systems, Inc. Technology States
and other customer order
information.
Shanghai
Number 18 Firm may have illegally bought Roadway D&B
150 Million Business - Data China
3/17/2012 and sold customers' information. Marketing
Services Co.
Hackers take advantages of
Struts Shock vulnerability to
Number 19 compromise names, dates of 145.5 United
Equifax Business – Data
9/7/2017 birth, Social Security numbers, Million States
addresses, and other personal
information.
Hack exposes names, encrypted
Number 20 passwords, email addresses, Business - United
145 Million eBay, Inc.
5/21/2014 registered addresses, phone Retail States
numbers and dates of birth.
16 | Data Breach Intelligence Copyright © 2018 Risk Based Security, Inc. All rights reserved.
Methodology & Terms
Risk Based Security’s research methods include automated processes coupled with traditional human research and
analysis. Our proprietary applications crawl the Internet 24x7 to capture and aggregate potential data breaches for
our researchers to analyze. In addition, the research team manually verifies news feeds, blogs, and other sources
looking for new data breaches as well as new information on previously disclosed incidents. The database also
includes information obtained through Freedom of Information Act (FOIA) requests, seeking breach notification
documentation from various state and federal agencies in the United States. The research team extends our
heartfelt thanks to the individuals and agencies that assist with fulfilling our requests for information.
Name Description
Disposal Computer Discovery of computers not disposed of properly
Disposal Document Discovery of documents not disposed of properly
Disposal Drive Discovery of disk drives not disposed of properly
Disposal Mobile Discovery of mobile devices not disposed of properly
Disposal Tape Discovery of backup tapes not disposed of properly
Email Email communication exposed to unintended third party
Fax Fax communication exposed to unintended third party
Fraud SE Fraud or scam (usually insider-related), social engineering
Hack Computer-based intrusion
Lost Computer Lost computer (unspecified type in media reports)
Lost Document Discovery of documents not disposed of properly, not stolen
Lost Drive Lost data drive (unspecified if IDE, SCSI, thumb drive, etc.)
Lost Laptop Lost laptop (generally specified as a laptop in media reports)
Lost Media Media (e.g. disks) reported to have been lost by a third party
Lost Mobile Lost mobile phone or device such as tablets, etc.
Lost Tape Lost backup tapes
Missing Document Missing document, unknown or disputed whether lost or stolen
Missing Drive Missing drive, unknown or disputed whether lost or stolen
Missing Laptop Missing laptop, unknown or disputed whether lost or stolen
Missing Media Missing media, unknown or disputed whether lost or stolen
Other Miscellaneous breach type arising primarily from data mishandling
Phishing Masquerading as a trusted entity in an electronic communication to obtain data
Seizure Forcible taking of property by a government law enforcement official
Skimming Using electronic devices (such as a skimmer) to swipe victims’ credit/debit card numbers
Snail Mail Personal information in "snail mail" exposed to unintended third party
Snooping Exceeding intended privileges and accessing data for unauthorized purposes
Stolen Computer Stolen desktop (or unspecified computer type in media reports)
Stolen Document Documents either reported or known to have been stolen by a third party
Stolen Drive Stolen data drive, unspecified if IDE, SCSI, thumb drive, etc.
Stolen Laptop Stolen Laptop (generally specified as a laptop in media reports)
Stolen Media Media generally reported or known to have been stolen by a third party
17 | Data Breach Intelligence Copyright © 2018 Risk Based Security, Inc. All rights reserved.
Name Description
Stolen Mobile Stolen mobile phone or device such as tablets, etc.
Stolen Tape Stolen backup tapes
Unknown Unknown or unreported breach type
Virus (Malware) Exposure to personal information via virus or Trojan (possibly classified as hack)
Web Web-based intrusion, data exposed to the public via search engines, public pages
NO WARRANTY.
Risk Based Security, Inc. makes this report available on an “As-is” basis and offers no warranty as to its accuracy,
completeness or that it includes all the latest data breaches. The information contained in this report is general in
nature and should not be used to address specific security issues. Opinions and conclusions presented reflect
judgment at the time of publication and are subject to change without notice. Any use of the information contained
in this report is solely at the risk of the user. Risk Based Security, Inc. assumes no responsibility for errors, omissions,
or damages resulting from the use of or reliance on the information herein. If you have specific security concerns
please contact Risk Based Security, Inc. for more detailed data loss analysis and security consulting services.
18 | Data Breach Intelligence Copyright © 2018 Risk Based Security, Inc. All rights reserved.
About Risk Based Security
Risk Based Security (RBS) provides detailed information and analysis on Data Breaches, Vendor Risk Scores and
Vulnerability Intelligence. Our products, Cyber Risk Analytics (CRA) and VulnDB, provide organizations with
access to the most comprehensive threat intelligence knowledge bases available, including advanced search
capabilities, access to raw data via API, and email alerting to assist organizations in taking the right actions in a
timely manner. In addition, our YourCISO offering provides organizations with on-demand access to high
quality security and information risk management resources in one, easy to use web portal.
Cyber Risk Analytics (CRA) provides actionable security ratings and threat intelligence on a wide variety of
organizations. This enables organizations to reduce exposure to the threats most likely to impact them and
their vendor base. In addition, our PreBreach vendor risk rating, the result of a deep-view into the metrics
driving cyber exposures, are used to better understand the digital hygiene of an organization and the likelihood
of a future data breach. The integration of PreBreach ratings into security processes, vendor management
programs, cyber insurance processes and risk management tools allows organizations to avoid costly risk
assessments, while enabling businesses to understand its risk posture, act quickly and appropriately to
proactively protect its most critical information assets.
Risk Placement Services, Inc. (RPS), one of the nation’s largest intermediaries, offers valuable solutions in
wholesale brokerage, binding authority, programs and standard lines. Headquartered in Rolling Meadows,
Illinois, RPS has more than 80 branch office and satellite locations, creating a coast-to-coast network of offices
with retailer needs in mind. RPS places well over $3.1 billion in premium annually, demonstrating the
company’s strength and market presence. RPS leverages local knowledge, regional expertise and national
relationships to deliver winning proposals to each retail broker partner and provide knowledge-based coverage
solutions for each situation.
The RPS Executive Lines division specializes in protecting individuals and their companies against a wide range
of executive risks and other professional liabilities. Market-leading specialists in public, private, and nonprofit
Directors & Officers (D&O), Errors & Omissions (E&O), Fiduciary, Crime, and Kidnap & Ransom insurance
products, RPS Executive Lines provides total management insurance solutions via 100 different insurance
markets. Additionally, they help clients pinpoint hidden exposures to loss and fortify them against
vulnerabilities, ultimately improving their risk profile.
19 | Data Breach Intelligence Copyright © 2018 Risk Based Security, Inc. All rights reserved.