SlideShare a Scribd company logo
1 of 1
MAJOR 3rd-PARTY
DATA BREACHES
OF 2018
3rd-party (aka supply-chain)
cyber attacks were one of the
main reasons for major data
breaches in 2018. Here is a recap
of 3rd-party data breaches that
hit the news in 2018
Almost 60% of the
companies
experienced a data
breach caused by
3rd party
According to the 2018
Data Risk in the Third
Party Ecosystem Study
from Ponemon Institute
Experienced a data breach
Caused by a
3rd party in the
last 12 months
23%
Caused by a
3rd party
Caused by a
Nth party
59% 42%
11
9
7
0
8
15
.
Cloud-based
storage, service, or
hosting provider
Online Payment,
credit card processing
or point-of-sale
system
JavaScript
Library
Top 3 use of a third party
We reviewed 54 major data breaches caused by a third party
and disclosed in 2018. Here are the top 3 uses by a third party.
A cyber attack on cash register
system operated by a third party
provided unauthorized access to
165,000 Foosackly customers’
paymentcard information.
Hackers exploited a vulnerability
in a payment system to pay
parking fees operated by
Click2Gov and used by more
than a dozen cities in the US
and Canada and managed to
steal credit card information for
more than 10,000 people.
Cloud-based storage,
service, or hosting
provider
Many companies use cloud services to store -
sometimes sensitive- data and perform cloud-based
applications. They also leverage hosting providers to
manage their websites. Though cloud and hosting providers
are usually secure, sometimes misconfiguration of servers
or cyber attacks expose sensitive data.
A misconfiguration of AWS S3 Bucket exposed 31,000
servers of GoDaddy, which contained sensitive data.
A cyber attack on Agilisium (cloud data storage
contractor) exposed system credentials and root
passwords of Universal Music Group.
Hacking IT Lighthouse (an application-hosting service
provider) exposed 16,000 health information records of
Redwood Eye Center patients.
Online Payment,
credit card processing
or point-of-sale system
Money is one of the top
motivations of cyber
criminals. So it is no
wonder why they target
payment systems.
A health institution, Baylor Scott & White Medical Health in
Texas, experienced a data breach caused by a third party
responsible for operating a credit card processing system
resulted in the breach of approximately 47,000 payment
records.
Javascript Libraries
External Javascript, the code that resides in your
website to track your visitors or gather analytics
about them, are hidden third-party cyber risks that
may cause severe data breaches.
Magecart campaign, a series of card skimmer
attacks, hit many large companies by injecting
malicious code to Javascripts.
Magecart's first target was a Javascript operated
by Inbenta but run over TicketMaster's website.
40,000 users' information were exposed.
Another major attack as a part of the same
campaign was against British Airways, where
credit card information of 380,000 customers
were breached.
A javascript managed by StatCounter to perform
web analytics was hacked. This javascript
was used by multiple sites, but attackers focused
on gate.io, a cryptocurrency exchange, which
ended up some bitcoin theft.
Online tools
Companies rely on online
tools, such as chat bots or
survey tools, to help run
their main business.
However, this reliance may
may come with
3-rd party cyber attacks.
A vulnerability of an online chat application was
exploited by hackers. Companies that use the
application such as BestBuy, Sears, Kmart, Delta,
and others experienced massive data breaches
with hundreds of thousands of customer records
(per company) were exposed.
Online employment services also caused data
breaches in 2018. A cyber attack on
an employment tool provided by JobScience, Inc.
leaked Social Security numbers of thousands of
applicants seeking for a job at El Centro Regional
Medical Center in California and Huntsville
Hospital in Alabama. There was another attack on
PageUp's online recruitment services
affected Whitbread.
An online survey tool managed by TypeForm and
used by Monzo, Adidas, TicketMaster, Harvey
Norman, Fortnum & Mason, and more exposed
millions of credentials.
Small- or mid-tier suppliers
Cyber risk of a supplier that you get some goods or a
vendor with that you do business should be monitored
closely. At the end of the day their cyber risk multiplies
yours.
A cyber attack to Invermar, a seafood supplier, cost the
grocery chain Wegmans over $900,000.
The fitness vendor of University of Louisville, namely
Health Fitness Corp., caused data breach of personal
information of hundreds of employees and retirees.
Hacking a mobile app
externally developed for Air
Canada exposed the data
profile of many
customers, which included
personal and travel
information.
Transcription Services
The data shared with
marketing firms to
better understand the
customers increase
cyber risk.
Mobile App
Services
Some companies
outsource mobile
application services.
Any vulnerability on a
mobile app can result
in the data breach of
customer data.
Marketing
Billing or Accounting Services
An attack on One Planet York mobile app
developed by Appware for The City of York Council
(UK) compromised almost 6,000 individual’s
personal information and credentials.
Health institutions use transcription services managed by
third parties. Attacks on those services may cause a data
breach of patients, a situation which results in huge
penalties under certain regulations such as HIPAA.
Orlando Orthopaedic Center suffered such a data
breach caused by a transcription-service provider and
19,000 patient records were exposed.
An attack on Nuance Communication that provides
transcription service to UC San Diego Health caused
a data breach for hundreds of patients.
Mention, a company that offers brands, such as Airbnb,
Microsoft, and Adobe, a media monitoring application,
was hacked through a 3rd-party vendor used in its
marketing stack. Potential data exposure included
personal and account profile info (plan value, # of alerts
and mentions).
The cyber attack on Hova Health, a telemedicine
company, left 2 million patient data, which probably
belongs to a Mexican government health agency,
exposed online.
Accounting and billing operations can be complex and
time consuming. Thus, using an external service makes
sense as long as you understand the cyber risk it brings.
Billing services provided by AccuDoc Solutions Inc. to
Atrium Health was the target of a cyber attack and 2,65
million patient records were breached.
A data breach caused by a third party used for
the management of the direct deposit of wages by
Nordstorm exposed personal and banking information.
Over a billion records breached in 2018
In 2018, over a billion records exposed cumulatively
according to NordVPN.
Facebook announced that more than 50 million
users were compromised. This exposure also puts
all platforms using Facebook-login feature under
3rd-party cyber risk.
Personal information of around 500 million guests
of Marriott Hotels is under risk of exposure. The
data breach started at Starwood Hotels before
Marriott acquired them. This incident shows the
importance of due diligence during M&A
operations.
We regularly monitor third-party data breaches and provide
a list at our website.
Visit www.normshield.com to learn more about how to monitor
3rd-party cyber risk.

More Related Content

What's hot

Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryEMC
 
Ivanti Threat Thursday September 2020
Ivanti Threat Thursday September 2020Ivanti Threat Thursday September 2020
Ivanti Threat Thursday September 2020Ivanti
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyFirst Atlantic Commerce
 
Schedule of Services - high res - v1.0
Schedule of Services - high res - v1.0Schedule of Services - high res - v1.0
Schedule of Services - high res - v1.0Lauren Tobin
 
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​Gigya
 
Security Compliance Models- Checklist v. Framework
Security Compliance Models- Checklist v. FrameworkSecurity Compliance Models- Checklist v. Framework
Security Compliance Models- Checklist v. FrameworkDivya Kothari
 
Bp Corp Pres Short
Bp Corp Pres ShortBp Corp Pres Short
Bp Corp Pres Shortkevinjoy
 
ThreatMetrix Fraud Network Presentation
ThreatMetrix Fraud Network PresentationThreatMetrix Fraud Network Presentation
ThreatMetrix Fraud Network PresentationThreatMetrix
 
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...Ken Lam
 
2014: The Year of the Data Breach
2014: The Year of the Data Breach2014: The Year of the Data Breach
2014: The Year of the Data BreachObserveIT
 

What's hot (12)

Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
 
Ivanti Threat Thursday September 2020
Ivanti Threat Thursday September 2020Ivanti Threat Thursday September 2020
Ivanti Threat Thursday September 2020
 
Cybercrime issue
Cybercrime issueCybercrime issue
Cybercrime issue
 
Red Flag Rules
Red Flag RulesRed Flag Rules
Red Flag Rules
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
 
Schedule of Services - high res - v1.0
Schedule of Services - high res - v1.0Schedule of Services - high res - v1.0
Schedule of Services - high res - v1.0
 
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
 
Security Compliance Models- Checklist v. Framework
Security Compliance Models- Checklist v. FrameworkSecurity Compliance Models- Checklist v. Framework
Security Compliance Models- Checklist v. Framework
 
Bp Corp Pres Short
Bp Corp Pres ShortBp Corp Pres Short
Bp Corp Pres Short
 
ThreatMetrix Fraud Network Presentation
ThreatMetrix Fraud Network PresentationThreatMetrix Fraud Network Presentation
ThreatMetrix Fraud Network Presentation
 
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
 
2014: The Year of the Data Breach
2014: The Year of the Data Breach2014: The Year of the Data Breach
2014: The Year of the Data Breach
 

Similar to Major 3rd-Party Data Breaches of 2018: Cloud, Payment, JS Libraries HitTITLE

Takeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security IncidentsTakeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security IncidentsCBIZ, Inc.
 
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)Kate Dalakova
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docxTECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docxerlindaw
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022ndcmanagement
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingIJSRED
 
Cybersecurity Risks of 3rd Party Cloud-Apps in 2022 Whitepaper by Protected H...
Cybersecurity Risks of 3rd Party Cloud-Apps in 2022 Whitepaper by Protected H...Cybersecurity Risks of 3rd Party Cloud-Apps in 2022 Whitepaper by Protected H...
Cybersecurity Risks of 3rd Party Cloud-Apps in 2022 Whitepaper by Protected H...Protected Harbor
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response PlanningPECB
 
Cybertorts
CybertortsCybertorts
Cybertortspanabaha
 
Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Alexander Decker
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxdeanmtaylor1545
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxbradburgess22840
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxerlindaw
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxericbrooks84875
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalMorgan Jones
 

Similar to Major 3rd-Party Data Breaches of 2018: Cloud, Payment, JS Libraries HitTITLE (20)

Takeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security IncidentsTakeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security Incidents
 
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docxTECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
 
Cybersecurity Risks of 3rd Party Cloud-Apps in 2022 Whitepaper by Protected H...
Cybersecurity Risks of 3rd Party Cloud-Apps in 2022 Whitepaper by Protected H...Cybersecurity Risks of 3rd Party Cloud-Apps in 2022 Whitepaper by Protected H...
Cybersecurity Risks of 3rd Party Cloud-Apps in 2022 Whitepaper by Protected H...
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
 
Cybertorts
CybertortsCybertorts
Cybertorts
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)
 
Threatsploit Adversary Report January 2019
Threatsploit Adversary Report January  2019Threatsploit Adversary Report January  2019
Threatsploit Adversary Report January 2019
 
Fraud and Risk in Big Data
Fraud and Risk in Big DataFraud and Risk in Big Data
Fraud and Risk in Big Data
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
Sel03129 usen
Sel03129 usenSel03129 usen
Sel03129 usen
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survival
 

More from NormShield

HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOU
HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOUHOW TO MEASURE WHAT HACKERS KNOW ABOUT YOU
HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOUNormShield
 
Normshield 2018 Airlines Phishing Report
Normshield 2018 Airlines Phishing ReportNormshield 2018 Airlines Phishing Report
Normshield 2018 Airlines Phishing ReportNormShield
 
Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?NormShield
 
NormShield Cyber Risk Rating October 18
NormShield Cyber Risk Rating October 18NormShield Cyber Risk Rating October 18
NormShield Cyber Risk Rating October 18NormShield
 
NormShield Supply Chain Risk Management Infographic
NormShield Supply Chain Risk Management InfographicNormShield Supply Chain Risk Management Infographic
NormShield Supply Chain Risk Management InfographicNormShield
 
Third-Party Risk in Regulations
Third-Party Risk in RegulationsThird-Party Risk in Regulations
Third-Party Risk in RegulationsNormShield
 
Review on 3rd-party Cyber Risk Assessment and Scoring Tools
Review on 3rd-party Cyber Risk Assessment and Scoring ToolsReview on 3rd-party Cyber Risk Assessment and Scoring Tools
Review on 3rd-party Cyber Risk Assessment and Scoring ToolsNormShield
 
3rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 20183rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 2018NormShield
 
NormShield Crypto Currency Report 2018
NormShield Crypto Currency Report 2018NormShield Crypto Currency Report 2018
NormShield Crypto Currency Report 2018NormShield
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield
 

More from NormShield (10)

HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOU
HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOUHOW TO MEASURE WHAT HACKERS KNOW ABOUT YOU
HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOU
 
Normshield 2018 Airlines Phishing Report
Normshield 2018 Airlines Phishing ReportNormshield 2018 Airlines Phishing Report
Normshield 2018 Airlines Phishing Report
 
Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?
 
NormShield Cyber Risk Rating October 18
NormShield Cyber Risk Rating October 18NormShield Cyber Risk Rating October 18
NormShield Cyber Risk Rating October 18
 
NormShield Supply Chain Risk Management Infographic
NormShield Supply Chain Risk Management InfographicNormShield Supply Chain Risk Management Infographic
NormShield Supply Chain Risk Management Infographic
 
Third-Party Risk in Regulations
Third-Party Risk in RegulationsThird-Party Risk in Regulations
Third-Party Risk in Regulations
 
Review on 3rd-party Cyber Risk Assessment and Scoring Tools
Review on 3rd-party Cyber Risk Assessment and Scoring ToolsReview on 3rd-party Cyber Risk Assessment and Scoring Tools
Review on 3rd-party Cyber Risk Assessment and Scoring Tools
 
3rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 20183rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 2018
 
NormShield Crypto Currency Report 2018
NormShield Crypto Currency Report 2018NormShield Crypto Currency Report 2018
NormShield Crypto Currency Report 2018
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk Brief
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Major 3rd-Party Data Breaches of 2018: Cloud, Payment, JS Libraries HitTITLE

  • 1. MAJOR 3rd-PARTY DATA BREACHES OF 2018 3rd-party (aka supply-chain) cyber attacks were one of the main reasons for major data breaches in 2018. Here is a recap of 3rd-party data breaches that hit the news in 2018 Almost 60% of the companies experienced a data breach caused by 3rd party According to the 2018 Data Risk in the Third Party Ecosystem Study from Ponemon Institute Experienced a data breach Caused by a 3rd party in the last 12 months 23% Caused by a 3rd party Caused by a Nth party 59% 42% 11 9 7 0 8 15 . Cloud-based storage, service, or hosting provider Online Payment, credit card processing or point-of-sale system JavaScript Library Top 3 use of a third party We reviewed 54 major data breaches caused by a third party and disclosed in 2018. Here are the top 3 uses by a third party. A cyber attack on cash register system operated by a third party provided unauthorized access to 165,000 Foosackly customers’ paymentcard information. Hackers exploited a vulnerability in a payment system to pay parking fees operated by Click2Gov and used by more than a dozen cities in the US and Canada and managed to steal credit card information for more than 10,000 people. Cloud-based storage, service, or hosting provider Many companies use cloud services to store - sometimes sensitive- data and perform cloud-based applications. They also leverage hosting providers to manage their websites. Though cloud and hosting providers are usually secure, sometimes misconfiguration of servers or cyber attacks expose sensitive data. A misconfiguration of AWS S3 Bucket exposed 31,000 servers of GoDaddy, which contained sensitive data. A cyber attack on Agilisium (cloud data storage contractor) exposed system credentials and root passwords of Universal Music Group. Hacking IT Lighthouse (an application-hosting service provider) exposed 16,000 health information records of Redwood Eye Center patients. Online Payment, credit card processing or point-of-sale system Money is one of the top motivations of cyber criminals. So it is no wonder why they target payment systems. A health institution, Baylor Scott & White Medical Health in Texas, experienced a data breach caused by a third party responsible for operating a credit card processing system resulted in the breach of approximately 47,000 payment records. Javascript Libraries External Javascript, the code that resides in your website to track your visitors or gather analytics about them, are hidden third-party cyber risks that may cause severe data breaches. Magecart campaign, a series of card skimmer attacks, hit many large companies by injecting malicious code to Javascripts. Magecart's first target was a Javascript operated by Inbenta but run over TicketMaster's website. 40,000 users' information were exposed. Another major attack as a part of the same campaign was against British Airways, where credit card information of 380,000 customers were breached. A javascript managed by StatCounter to perform web analytics was hacked. This javascript was used by multiple sites, but attackers focused on gate.io, a cryptocurrency exchange, which ended up some bitcoin theft. Online tools Companies rely on online tools, such as chat bots or survey tools, to help run their main business. However, this reliance may may come with 3-rd party cyber attacks. A vulnerability of an online chat application was exploited by hackers. Companies that use the application such as BestBuy, Sears, Kmart, Delta, and others experienced massive data breaches with hundreds of thousands of customer records (per company) were exposed. Online employment services also caused data breaches in 2018. A cyber attack on an employment tool provided by JobScience, Inc. leaked Social Security numbers of thousands of applicants seeking for a job at El Centro Regional Medical Center in California and Huntsville Hospital in Alabama. There was another attack on PageUp's online recruitment services affected Whitbread. An online survey tool managed by TypeForm and used by Monzo, Adidas, TicketMaster, Harvey Norman, Fortnum & Mason, and more exposed millions of credentials. Small- or mid-tier suppliers Cyber risk of a supplier that you get some goods or a vendor with that you do business should be monitored closely. At the end of the day their cyber risk multiplies yours. A cyber attack to Invermar, a seafood supplier, cost the grocery chain Wegmans over $900,000. The fitness vendor of University of Louisville, namely Health Fitness Corp., caused data breach of personal information of hundreds of employees and retirees. Hacking a mobile app externally developed for Air Canada exposed the data profile of many customers, which included personal and travel information. Transcription Services The data shared with marketing firms to better understand the customers increase cyber risk. Mobile App Services Some companies outsource mobile application services. Any vulnerability on a mobile app can result in the data breach of customer data. Marketing Billing or Accounting Services An attack on One Planet York mobile app developed by Appware for The City of York Council (UK) compromised almost 6,000 individual’s personal information and credentials. Health institutions use transcription services managed by third parties. Attacks on those services may cause a data breach of patients, a situation which results in huge penalties under certain regulations such as HIPAA. Orlando Orthopaedic Center suffered such a data breach caused by a transcription-service provider and 19,000 patient records were exposed. An attack on Nuance Communication that provides transcription service to UC San Diego Health caused a data breach for hundreds of patients. Mention, a company that offers brands, such as Airbnb, Microsoft, and Adobe, a media monitoring application, was hacked through a 3rd-party vendor used in its marketing stack. Potential data exposure included personal and account profile info (plan value, # of alerts and mentions). The cyber attack on Hova Health, a telemedicine company, left 2 million patient data, which probably belongs to a Mexican government health agency, exposed online. Accounting and billing operations can be complex and time consuming. Thus, using an external service makes sense as long as you understand the cyber risk it brings. Billing services provided by AccuDoc Solutions Inc. to Atrium Health was the target of a cyber attack and 2,65 million patient records were breached. A data breach caused by a third party used for the management of the direct deposit of wages by Nordstorm exposed personal and banking information. Over a billion records breached in 2018 In 2018, over a billion records exposed cumulatively according to NordVPN. Facebook announced that more than 50 million users were compromised. This exposure also puts all platforms using Facebook-login feature under 3rd-party cyber risk. Personal information of around 500 million guests of Marriott Hotels is under risk of exposure. The data breach started at Starwood Hotels before Marriott acquired them. This incident shows the importance of due diligence during M&A operations. We regularly monitor third-party data breaches and provide a list at our website. Visit www.normshield.com to learn more about how to monitor 3rd-party cyber risk.