Five Ways Attackers Get To Databases 2020 1
Five Ways Attackers Get To Databases 2020 1
Five Ways Attackers Get To Databases 2020 1
RANSOMWARE
Ransomware, which can be
delivered via phishing attacks are
increasingly targeting database
programs such as MySQL, MongoDB
and Hadoop. Ransomware was the
largest share of security incidents
Trustwave investigated in 2019,
which quadrupled over the previous
year to encompass 18% of the incidents.
(2020 Trustwave Global Security Report)
MISCONFIGURATIONS
Misconfigured databases have been a major
problem across all sectors and makes them
vulnerable to attacks. For example, criminals
target publicly facing cloud databases using the
default settings to compromise its databases
and then demand a ransom to release them.
(2020 Trustwave Global Security Report)
RISE IN
VULNERABILITIES
Vulnerabilities are increasing at an
unrelenting pace with dire consequences
for organizations. For example, in early
2020, Trustwave SpiderLabs
researchers discovered six vulnerabilities
in SAP Adaptive Server Enterprise (ASE),
the most critical of which had a CVSS
score of 9.1 (out of 10). Continuously
assessing databases for vulnerabilities
and continuously monitoring the assets
with unapplied patches can help reduce
the risk of a data breach.
PRIVILEGE ABUSE
Privilege abuse occurs when the privileges
associated with user accounts are operated
inappropriately or fraudulently. Privilege
escalation involves attackers taking advantage of
vulnerabilities in database management software
to convert low-level access privileges to
high-level access privileges. Privilege escalation
requires more effort and knowledge than simple
privilege abuse. In the breaches Trustwave
investigated in 2019, user credentials accounted
for 15% of the cloud data and 18% of the
corporate/internal network data compromised.
(2020 Trustwave Global Security Report)
MALICIOUS INSIDER
Insider threats come from people within
the organization. For example, Trustwave
worked with a client who was
experiencing identity theft issues at an
increasingly alarming rate. We helped
them set up database scanning and
monitoring policies using Trustwave
DbProtect, our database security and
risk management platform. Within a
week, Trustwave was able to identify the
shrewd thief who was using a known
backup time to hide their data siphoning.
LACK OF VISIBILITY
Most solutions in our security ecosystem leave us blind to
who is accessing data and how they are using it.
www.trustwave.com