Beauty and the Breach: Leaked Credentials in Context

Our analysts recently researched credential compromise, finding more than 5 million leaked credentials online for the world’s biggest 1,000 organizations. Of course, not all breached data is of equal value and, in order to better understand the desirability of the data and the severity of the breach, it’s important to consider six factors.

  1. Recoverable passwords – data dumps with recoverable passwords, such as the LinkedIn breach of 2012, are more useful than those without
  2. Data sensitivity – highly sensitive or damaging data may be used by a threat actor in blackmail or extortion attempts, such as the Ashley Madison breach of 2015, or, in the case of health records, for identity theft
  3. Freshness – as a data set get older its usefulness declines as those contained within the data set either abandon accounts or change passwords
  4. Transferability – some data set are just more relevant to an individual than others, especially datasets containing reusable information for other accounts (such as addresses, secret questions and credit card details)
  5. Size – how accurately does the data represent the target user group? 50%? 70%? Critically, how accurately does the data represent the target user group in relation to the desired outcome of the threat actor?
  6. Public or private source – themore ‘secretive’ the data, the more useful it would be for a threat actor. Also, if a dataset has been made public, the affected organization is highly likely to revoke exposed passwords

The six factors outlined above can be used both to assess the severity of a breach as well as to make a comparison between breaches.

Our research takes over 30,000 instances of claimed leaked credentials to understand how the world’s 1,000 biggest organizations are impacted. For this post, we have taken seven historical breaches of varying size and content to see how they measured up against these factors of desirability and against each other. Although the Office of Personnel Management (OPM) breach is not publically available, it has been included for comparative purposes.

Historical breaches measured against factors of desirability

*Digital Shadows do not have access to this dataset

Table 1: Historical breaches measured against factors of desirability

Based on the above matrix the following conclusions can made about what makes a dataset attractive:

  1. The six point scale is useful in its own right, but it gives greater insight when it is used to compare other data breaches. The comparative exercise also validates the overall methodology
  2. The most attractive dataset included within the above matrix is the one that is not public (OPM). While one factor does not make a trend, this strongly suggests that closed source data sets have a far greater impact than more openly available data sets
  3. Not all the fields are equally weighted – it would appear that size does not seem to matter as much in comparison to other factors such as sensitivity, transferability, and whether or not the data is public
  4. Passwords are not the be all and end all – simply being present within a highly sensitive breach such as Ashley Madison can be far more damaging
  5. Breaches scoring highly on Sensitivity, Freshness and Transferability ranked the highest. The sensitivity of dataset can be used to facilitate extortion, while its freshness and transferability would be invaluable for an actor attempting to gain access to other accounts, or to extensively profile an individual for reconnaissance purposes. The different ways in which threat actors can use historic breached data will be explored in greater detail in our next blog.

Shown below is a full explanation of the reasoning behind the grading within the matrix, readers are invited to apply the matrix themselves.

Severity Scoring: Very High=5, High=4, Medium=3, Low=2, Very Low=1, Non-public=5, Public=0, N/A=3 Severity matrix for factors of desirability

Table 2: Severity matrix for factors of desirability

 

Previous Post
The Industrialized Uses of Breached Data
The Industrialized Uses of Breached Data

In our first blog, we outlined a number of specific factors that can be used to determine a dataset’s desir...

Next Post
New report: 97 percent of the top 1,000 companies suffer from credential compromise
New report: 97 percent of the top 1,000 companies suffer from credential compromise

Data breaches and credential compromise are not new. After all, 2014 was known as the “year of the data bre...

×

Subscribe to get the latest news and threat intelligence in your inbox.

First Name
Last Name
Company
Country
State- optional
Job Title
Thank you!
Error - something went wrong!