Altmetrics
Downloads
294
Views
282
Comments
1
A peer-reviewed article of this preprint also exists.
This version is not peer-reviewed
Complex Systems and Network Science
Submitted:
30 June 2023
Posted:
03 July 2023
You are already at the latest version
Section | Term | Definition |
---|---|---|
1.2.1 | Exposure to data breaches | The potential risk is that an organization's data or information may be accessed, stolen, or compromised due to unauthorized access or cyberattacks. In the context provided, exposure to data breaches is determined by analyzing the valid email addresses in the organizational database and identifying any connections to known compromised data breaches [19]. |
1.2.2 | Known compromised data breaches. | Data breaches have been identified and documented in which unauthorized individuals have accessed, stolen, or compromised sensitive data. In this case, the focus is on breaches involving organizational email domains (.com, .org, .net, and .gov) [19]. |
1.2.3 | Compromised email addresses across all known data breaches | Compromised email addresses across all known data breaches: This term refers to the email addresses of unique individuals found in the datasets of known compromised data breaches. In this study, 1,530 unique individuals have compromised email addresses across all the known data breaches [19]. |
Section | Technique | Description |
---|---|---|
3.2.1.1 | Have I Been Pwned | Allows users to check whether their email address has been involved in known data breaches. Enter the email address, and the site will advise if it has been compromised. |
3.2.1.2 | BreachAlarm | Monitors the internet for stolen data that includes email addresses and sends an email alert if the email address is found in any compromised data. |
3.2.1.3 | Firefox Monitor | Allows users to check whether their email address has been involved in known data breaches. Users can sign up for alerts if their email address is found in a new data breach. Mozilla provides this service. |
3.2.1.4 | Identity Leak Checker | Allows users to check whether their email address has been involved in known data breaches. Users can also check for compromised usernames and passwords. The Hasso Plattner Institute provides this free service. |
3.2.1.5 | DeHashed | Allows individuals to search for compromised email addresses, usernames, and passwords. Users can sign up for alerts if their email address is found in a new data breach. |
Section | Analysis Technique | Description |
---|---|---|
2.4.1. | Correlation Analysis | Spearman's rank correlation was used to measure the strength and direction of the relationship between breaches. This analysis helped identify significant correlations between breach pairs, highlighting shared TTPs or overlapping threat actor groups [28,20]. |
2.4.2. | Clustering Analysis | K-means clustering was employed to group user IDs based on their similarity in terms of failed login attempts, geographical distribution, and account statuses. This approach helped identify variations in user ID distribution among clusters, indicating differing risks of compromise [18,30]. |
2.4.3. | Association Rule Mining | The Apriori algorithm was used to discover interesting relationships between breach pairs and TTPs. Metrics like support, confidence, lift, leverage, and Zhang's metric were employed to evaluate the strength of these relationships. This analysis uncovered patterns within security logs, such as the frequent co-occurrence of specific TTPs, which can be used to understand better tactics employed by malicious actors and develop counter strategies [8,31]. |
Industry | Percentage |
Finance & Insurance | 35% |
Healthcare | 22% |
Technology | 16% |
Retail | 12% |
Manufacturing | 10% |
Other Industries | 5% |
Pair | Correlation | P-value |
---|---|---|
LiveAuctioneers & Eye4Fraud | 1 | 0 |
LiveAuctioneers & Drizly | 1 | 0 |
Eye4Fraud & Drizly | 1 | 0 |
MeetMindful & Houzz | 0.989842782 | 0 |
LiveAuctioneers & EatStreet | 0.978510047 | 0 |
Eye4Fraud & EatStreet | 0.978510047 | 0 |
EatStreet & Drizly | 0.978510047 | 0 |
NetGalley & LeadHunter | 0.893865598 | 0 |
DataEnrichmentExposureFromPDLCustomer & Exactis | 0.805917369 | 0 |
Verificationsio & Exactis | 0.804184683 | 0 |
Rank | Antecedents | Consequents | Confidence | Lift | Leverage | Zhang's Metric |
---|---|---|---|---|---|---|
1 | {Exploit.In, Verifications.io} | {Data_Enrichment_Exposure_From_PDL_Customer, Anti_Public_Combo_List} | 0.857143 | 34.675325 | 0.013094 | 0.986682 |
2 | {Exploit.In, Data_Enrichment_Exposure_From_PDL_Customer, Verifications.io} | {Anti_Public_Combo_List} | 0.857143 | 31.785714 | 0.013059 | 0.984018 |
3 | {Exploit.In, Data_Enrichment_Exposure_From_PDL_Customer} | {Anti_Public_Combo_List, Verifications.io} | 0.857143 | 31.785714 | 0.013059 | 0.984018 |
4 | {Data_Enrichment_Exposure_From_PDL_Customer, Anti_Public_Combo_List} | {Exploit.In, Verifications.io} | 0.545455 | 34.675325 | 0.013094 | 0.995776 |
5 | {Anti_Public_Combo_List} | {Exploit.In, Data_Enrichment_Exposure_From_PDL_Customer, Verifications.io} | 0.5 | 31.785714 | 0.013059 | 0.995381 |
Parameter | Value |
---|---|
Antecedents | 'Exploit.In', |
'Verifications.io' | |
Consequents | 'Data_Enrichment_Exposure_From_PDL_Customer', |
'Anti_Public_Combo_List' | |
Confidence | 0.857143 |
Lift | 34.675325 |
Leverage | 0.013094 |
Zhang's Metric | 0.986682 |
Section | Key Findings | Description |
---|---|---|
3.5.1 | Pattern Recognition Results | Application of pattern recognition techniques (correlation analysis, clustering, association rule mining) revealed significant patterns and vulnerabilities targeted by threat actors, leading to better identification and categorization of threats. |
3.5.2 | Demographic Distribution Summary Results | Data breaches affected many industries and sectors, compromising billions of user records. Understanding common targets and vulnerabilities exploited by threat actor's aids in proactive measures for high-risk sectors or regions. |
3.5.3 | APT Groups and Data Breaches Results | Overview of known APT groups in the context of data breaches, including preferred targets, TTPs, and associations with specific breaches, helping organizations identify potential threats and understand various APT tactics. |
Section | Recommendations | Description |
---|---|---|
4.2.2.1 | Enhance threat intelligence | Better understand the threat landscape and prepare for potential attacks, focusing on the most active regions. |
4.2.2.2 | Prioritize vulnerability management | Address security weaknesses exploited in similar breach pairs. |
4.2.2.3 | Develop incident response playbooks | Develop playbooks and procedures based on the correlations, findings, and demographic data for faster detection and containment of breaches. |
4.2.2.4 | Increase user awareness | Raise awareness of the risks associated with data breaches and provide targeted training to reduce the likelihood of successful social engineering attacks, especially for regular users (members or active M365 accounts). |
4.2.2.5 | Share findings and collaborate | Collaborate with industry peers and information-sharing organizations to collectively improve defensive postures and contribute to a better understanding of the threat landscape. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 MDPI (Basel, Switzerland) unless otherwise stated