0% found this document useful (0 votes)
58 views

Darkbeam Data

Uploaded by

natha.dwarapala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views

Darkbeam Data

Uploaded by

natha.dwarapala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Case Study

Data Breach

Darkbeam

© Copyright IBM Corp. 2023


A data breach is a cybersecurity offense where data that is
deemed confidential or sensitive is taken, stolen, or edited
by an unauthorized individual or group.

2. Provide a statistic about this type of the attack, or about


attacks to this company’s industry. One statistic about this
type of attack is, according to the nonprofit consumer
organization known as Privacy Rights Clearinghouse,
approximately 227 million records that held personal
Attack Category: information were caught up in data breaches in the United
Data Breach States between January of 2005 and May of 2008.

Wikipedia ‘Data Breach’


Idstrong.com Author: Steven
Darkbeam is a top-performing cyber vulnerability and
threat management provider. They are the most recent
company to suffer over 3 billion records stolen during a
data breach.

Company
Description and
Breach Summary
Event 1
1 A Darkbeam researcher made a collection of data that could be
accessed publicly in 2020.

Event 2
2 It is believed that the details were stolen by attackers from known and
unknown data breaches in this current event.

Event 3
3 It is reported that, within this breach, over 3.8 billion records could
have contained login pairs.
Timeline
Event 4
4 On September 18th, an unprotected access point was found and corrected by Darkbeam after
being contacted by Bob Diachenko, the CEO of SecurtiyDiscovery, who discovered the leak.

Event 5
5 Many of the users, whose records were lost, were victimized in data
breaches previously.

Event 6
6 Any who have reason to think their information was revealed because
of this breach must take the necessary steps to protect themselves.
Vulnerabilities
The overall vulnerability was due to human error. Something was overlooked could have
prevented this incident.

Vulnerability 1 Vulnerability 2 Vulnerability 3 Vulnerability 4


A researcher had When information was In addition, identity This also leads into
neglected to protect stolen, many were left theft also became an other industries being
confidential vulnerable to phishing issue. affected, Verizon was
information upon scams. a prime example.
completion of their
project.
Costs Prevention

• 3.8 billion records leaked • Leak was identified and


corrected
• Verizon also affected due to
brute force or stolen credentials • Changing usernames, emails
used and passwords
Costs and • Enable two factor authentication
Prevention for all devices and accounts

You might also like