Security News > 2023 > January > Supply chain attacks caused more data compromises than malware
Data compromises steadily increased in the second half of 2022.
Data breach notices suddenly lacked details, resulting in increased risk for individuals and businesses, as well as uncertainty about the number of data breaches and victims.
The number of data breaches resulting from supply chain attacks exceeded compromises linked to malware in 2022.
In 2022, supply chain attacks surpassed the number of malware-based attacks by 40%. According to the report, more than 10 million people were impacted by supply chain attacks targeting 1,743 entities.
"While we did not set a record for the number of data compromises in the U.S. last year, we came close," said Eva Velasquez, CEO of the Identity Theft Resource Center.
"These compromises impacted at least 422 million people. These numbers are only estimates because data breach notices are increasingly issued with less information. This has resulted in less reliable data that impairs consumers, businesses and government entities from making informed decisions about the risk of a data compromise and the actions to take if impacted by one. People are largely unable to protect themselves from the harmful effects of data compromises, fueling an epidemic - a"scamdemic" of identity fraud committed with compromised or stolen information," added Velasquez.
News URL
https://www.helpnetsecurity.com/2023/01/26/data-compromises-2022/
Related news
- From Deepfakes to Malware: AI's Expanding Role in Cyber Attacks (source)
- New BunnyLoader Malware Variant Surfaces with Modular Attack Features (source)
- Over 100 US and EU orgs targeted in StrelaStealer malware attacks (source)
- Hackers Hijack GitHub Accounts in Supply Chain Attack Affecting Top-gg and Others (source)
- The Biggest Takeaways from Recent Malware Attacks (source)
- XZ Utils Supply Chain Attack: A Threat Actor Spent Two Years to Implement a Linux Backdoor (source)
- Critical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks (source)
- Microsoft fixes two Windows zero-days exploited in malware attacks (source)
- TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks (source)
- CoralRaider attacks use CDN cache to push info-stealer malware (source)