IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

Study Reveals Most Network Attacks Used Stolen IDs, Passwords

DOJ data shows cost to individual organizations up to $10 million per occurrence

Phoenix Technologies Ltd. has announced the findings of a landmark study on Department of Justice network crime prosecutions that reveals most attacks used stolen IDs and passwords, resulting in far greater damages to affected organizations than previously thought: up to $10 million per occurrence and on average more than $1.5 million per occurrence. The report, "Network Attacks: Analysis of Department of Justice Prosecutions 1999-2006," concludes that 84 percent of attacks could have been prevented if, in addition to checking the user ID and password, the organization had verified the identity of the computer connecting to their networks and accounts.

Previous studies on the financial damage of computer crimes used surveys of affected organizations, leading to often-questionable data and conclusions about such crimes. This new study conducted by research and advisory firm Trusted Strategies analyzed data validated by the legal process of all cases prosecuted and publicly disclosed by the Department of Justice between March 1999 and February 2006.

Among the additional key findings of the study:
  • Average financial loss was more than $3 million per case
  • Although the global damages of viruses can be high, the average cost to an individual company from any single virus attack analyzed in this study was surprisingly low, at $2,382
  • The crimes hit most sectors of the U.S. economy, including government, technology, online retail, financial services, communications, education, manufacturing and healthcare
  • Attackers logging onto privileged user or administrator accounts where a small number of authorized computers were sanctioned to perform work caused the most damages
In 88 percent of the cases, the attacker logged onto one or more privileged user accounts. Criminals who accessed privileged accounts obtained IDs and passwords through many means, including network sniffing, use of password cracking programs, collusion with insiders and employees sharing their IDs and passwords with co-workers who later left the organization and used that knowledge to gain access.

The report concludes, "Network attacks could have been prevented in 84 percent of all cases if the organization had implemented device identification and authentication in addition to user ID and password protections. In other words, only requiring user IDs and passwords for network access to high-value information assets should no longer be considered adequate network security."

Sign up for GovTech Today

Delivered daily to your inbox to stay on top of the latest state & local government technology trends.