Biggest Known Data Breach By Russian Cyber Criminals Highlights The Need For Continuous Endpoint Monitoring – Chuck Leaver

Charles Leaver Ziften CEO


It is believed that the most significant recognized cyber attack in the history of data breaches has been found by an American cyber security company. It is believed by the company that a team of cyber criminals from Russia that they have actually been examining for numerous months is responsible for stealing passwords in the billions and other delicate individual data. It is declared that the Russian team stole 4.5 billion credentials, although a lot were duplicated, and the end result was 1.2 billion unique data profiles being stolen. The group stole the info from 420,000 sites of various sizes, from big brand websites to smaller mom and pop shops.

The New York Times mentioned that the cyber wrongdoers consisted of about 12 people. Beginning with small scale spamming methods in 2011 they gained the majority of the data by purchasing stolen databases.

In an interview with PCMag, the founder of the company that found the breach, Alex Holden, said “the gang started by just purchasing the databases that were available online.” The group used to purchase at fire sales and were described as “bottom feeders”. As time progressed they started the purchase of higher quality databases. It’s kind of like graduating from taking bicycles to taking costly cars.”

A Graduation From Spamming To Utilizing Botnets

The cyber criminal group began to alter their behavior. Botnets were used by the team to collect the stolen data on a much larger scale. Through using the botnets the group were able to automate the procedure of determining websites that were susceptible and this enabled them to work 24/7. Anytime that an infected user would visit a website, the bot would check to see if the vulnerability would undergo an SQL injection automatically. Utilizing these injections, which is a frequently utilized hacking tool, the database of the website would be forced to display its contents through the entering of a basic query. The botnets would flag those websites that were susceptible and the hackers returned later on to extract the information from the site. The use of the bot was the ultimate downfall of the group as they were spotted by the security business using it.

It is thought by the security company that the billions of pieces of information that were stolen were not stolen at the same time, and that the majority of the records were probably purchased from other cyber criminals. According to the Times, few of the records that were taken have actually been sold online, instead the hacking team have decided to utilize the information for the sending of spam messages on social networks for other groups so that they can earn money. Other cyber security experts are asserting that the magnitude of this breach is part of a trend of cyber bad guys stockpiling big quantities of personal profiles gradually and saving them for usage later, according to the Wall Street Journal.

Security expert at the research study company Gartner, Avivah Litan, said “businesses that rely on user names and passwords have to establish a sense of urgency about changing this.” “Up until they do, wrongdoers will simply keep stockpiling individuals’s credentials.”

Cyber attacks and breaches on this scale highlight the requirement for companies to protect themselves with the most recent cyber security defenses. Systems that utilize endpoint threat detection and response will help organizations to produce a clearer picture of the dangers facing their networks and receive information that is actionable on how best to defend against attacks. Today, when huge data breaches are going to occur increasingly more, making use of continuous endpoint visibility is critical for the security of a company. If the network of the company is continuously monitored, risks can be identified in real time, and this will minimize the damage that a data breach can inflict on the reputation and bottom line of an organization.



No Responses Yet to “Biggest Known Data Breach By Russian Cyber Criminals Highlights The Need For Continuous Endpoint Monitoring – Chuck Leaver”

Leave a Reply