Verizon 2024-Dbir-Retail-Snapshot
Verizon 2024-Dbir-Retail-Snapshot
Investigations Report
Manufacturing
Retail SnapshotSnapshot
Phishing
Exploit
vulnerabilities
Credentials
Welcome 5
Summary of findings 6
The DBIR aims to provide security About the 2024 DBIR The standard uses two- to six-digit
professionals with an in-depth analysis codes to classify businesses and
of data-driven, real-world instances of
incident dataset organizations. Our analysis is typically
cybercrime and how cyberattacks play Each year, the DBIR timeline for in- done at the two-digit level, and we
out across organizations of different scope incidents is from November 1 will specify NAICS codes along with
sizes as well as from different verticals of one calendar year through October an industry label. For example, a
and disparate geographic locations. 31 of the next calendar year. Thus, chart with a label of Retail (NAICS
We hope that by doing so, we can the incidents described in this year’s 44–45) is not indicative of 44–45
provide you with insight into what report took place between November as a value. “44–45” is the code for
particular threats your organization is 1, 2022, and October 31, 2023. The the Retail Trade sector. Detailed
most likely to face and thereby help 2023 caseload is the primary analytical information on the codes and the
prepare you to handle them in the best focus of the 2024 report, but the classification system is available here:
possible manner. entire range of data is referenced
throughout, notably in trending graphs. https://www.census.gov/
As in past years, we will examine what The time between the latter date and naics/?58967?yearbck=2012
our data has to tell us about threat the date of publication for the report
actors and the tools they employ is spent in acquiring the data from
against enterprises. This year, we our global contributors, anonymizing
analyzed 30,458 real-world security and aggregating that data, analyzing
30,458
incidents, of which 10,626 were the dataset, and finally creating the
confirmed data breaches (a record graphics and writing the report.
high!), with victims spanning
94 countries.
Industry labels security incidents
This data represents actual, real-world investigated
breaches and incidents investigated by This snapshot highlights important
the Verizon Threat Research Advisory takeaways for the Retail Trade
Center (VTRAC) or provided to us by (NAICS 44–45) sector, which includes
one of our global contributors without establishments primarily engaged in
retailing merchandise generally without
10,626
whose generous help this document
could not be produced. We hope you transformation and rendering services
can use this report and the information incidental to the sale of merchandise.
it contains to increase your awareness
In the DBIR, we align with the North confirmed breaches
of the most common tactics used
American Industry Classification
against organizations at large and your
System (NAICS) standard to categorize
specific industry. It offers strategies
the victim organizations in our corpus.
to help protect your company and its
assets. Read the full report for a more
detailed view of the threats you may
face today at verizon.com/dbir.
System Intrusion Ransomware attacks continue to drive the growth of this pattern as they now
account for 23% of all breaches and 70% of the incidents within System Intrusion.
These are complex attacks
that leverage malware and/or • Ransomware (or some type of Extortion) appears in 92% of industries as one of
hacking to achieve their objectives,
the top threats.
including deploying ransomware.
• Analyzing the FBI Internet Crime Complaint Center dataset this year, we found
that the median adjusted loss (after law enforcement worked to try to recover
funds) for those who did pay was around $46,000.
• Traditional Ransomware’s prevalence declined slightly to 23%. However, roughly
one-third (32%) of all breaches involved some type of Extortion technique,
including Ransomware. The meteoric growth of Extortion attacks made this
combined threat stand out in our dataset.
Social Engineering More than 40% of incidents involved Pretexting, and 31% involved Phishing. Other
tried-and-true tactics include attacks coming in via email, text and websites.
This attack involves the psychological
compromise of a person that alters • Phishing and Pretexting via email continue to be the leading cause of incidents in
their behavior into taking an action or this sector, accounting for 73% of breaches.
breaching confidentiality.
• The median time for users to fall for phishing emails is less than 60 seconds.
• More than 20% of users identified and reported phishing per engagement,
including 11% of the users who did click the email.
• Over the past two years, roughly one-fourth (between 24% and 25%) of financially
motivated incidents involved Pretexting, the majority of which resulted in a
Business Email Compromise (BEC). In both years, the median transaction amount
of a BEC was around $50,000.1
1. According to the FBI’s Internet Crime Complaint Center ransomware complaint data
Miscellaneous Errors More than 50% of errors were the result of Misdelivery, continuing last year’s trend,
while other errors, such as Disposal, are declining.
Incidents where unintentional actions
directly compromised a security • Misconfiguration is the next most common error and was seen in approximately
attribute of an information asset fall 10% of breaches.
into this pattern. This does not include
lost devices, which are grouped with • Classification errors, Publishing errors and Gaffes (verbal slips) are all relatively
theft instead. tightly packed in order of mention. Disposal errors continue to decline ever so
slightly (as has been the general trend for the last several years) and accounted
for just over 1% of the cases in this pattern.
• End-users now account for 87% of errors, emphasizing the need for universal
error-catching controls across industries.
Denial of Service Denial of Service is responsible for more than 50% of incidents analyzed this year.
These attacks are intended to
• Our ongoing analysis of content delivery network (CDN)-monitored, web
compromise the availability of networks
application-focused Denial of Service attacks shows that even though the median
and systems. This includes both
attack size has reduced slightly from 2.2 gigabits per second (Gbps) to 1.6 Gbps,
network and application layer attacks.
the 97.5th percentile of those attacks increased to 170 Gbps from the previous
high of 124 Gbps.
• Subject matter experts (SMEs) continue to report the growth of low-
volume, persistent attacks on high-interaction services such as Domain
Name System (DNS).
Privilege Misuse In our prior report, we saw collusion—multiple actors working in concert to achieve
the goal of the breach—at 7%, which, while nowhere near the highs we saw back in
These incidents are predominantly
2019, was still a surprise. This year, things seem to have gone back to normal, and
driven by unapproved or malicious
we are seeing collusion dropping to less than 1% of breaches.
use of legitimate privileges.
• Employees are largely taking Personal data—this is likely about taking
customers’ information.
• Internal actors are again largely working on their own in this pattern. The Financial
motivation remains in ascension, while Espionage is a distant second. Personal
data is still the main targeted data type.
• We saw Internal data show a bit of a spike this year as well, which would include
sensitive plans and intellectual property that would attract the Espionage-
motivated employee.
• Finally, Banking data is remaining mostly steady over time as a targeted data type.
44–45
NAICS
Frequency 725 incidents, The Retail sector is where we often useful Credentials are to your average
369 with confirmed find “Magecart” threat actors. They are threat actor, but we were stunned to
data disclosure particularly skilled at inserting malicious see Payment card data, so useful for
code into the e-commerce sites of immediate fraud, drop so precipitously
Top patterns System Intrusion, retail entities to siphon off (usually) (Figure 7). As we have indicated
Social Engineering Payment card information. We saw before, we get the “what” of the
and Basic Web roughly the same percentage of these changes in the data, but we do not
Application Attacks kinds of attacks this year as we did always get the “why.” Is this a result
represent 92% of last year (Figure 6). However, the type of increased controls around the
breaches of data being compromised showed a monetization of payment card data,
surprising change. making it harder for the criminals to
Threat actors External (96%), use the data they have stolen? Or is
Internal (4%) With Credentials standing at 38% it just that credentials are so much
(breaches) (very close to last year’s 35%) we easier to steal? Either way, we will be
didn’t expect to see Payment card interested to see if this is just a blip on
Actor motives Financial (99%), data drop to 25% (from 37%). Now, the radar or an actual trend starting.
Espionage (1%) we understand how attractive and
(breaches)
Summary
While this industry is usually the
place where we see Payment card
data stolen, the focus of the threat
actors has shifted to Credentials.
Pretexting is also increasing, while
Phishing has dropped. Denial of
Service attacks remain a problem
for Retail organizations, causing
disruption to their ability to serve
their customers and make sales.