As hackers go after business computer systems in search of data to steal, sell or hold for ransom, security teams are finding high- low-tech solutions to block the attacks.
The latest “Verizon 2020 Data Breach Investigations Report” analyzed more than 32,0000 security incidents, the company said, of which 3,950 were confirmed breaches—almost double the number of breaches analyzed in last year’s report. Report co-author Suzanne Widup, senior information security professional at Verizon, saw a wide range of methods used to access computers— noticed that as soon as security professionals learn how to block one kind of hack, criminals would try another.
Types of attacks
Hackers employ a range of methods to access data. For example, memory-scraping (also known as RAM-scraping) malware scans the memory of digital devices like point-of-sale systems to collect information. Hackers have had “a lot of success” in levering this kind of malware to secure credit card numbers from point-of-sale machines, Widup said.
For C2 (Comm Control) hacking, thieves build what is called a botnet, turning individual systems into their bots that then contact the comm control system—“sort of like the mothership,” Widup