Real-world investigations for real insight.
Read about the biggest security threats you face.
For 11 years, Verizon has analyzed hundreds of thousands
of real-world incidents and data breaches. Here are some
of our most interesting cases to help security professionals
better understand what they’re up against.
Scenario 1:
Cloud storming - the Slivered Lining
Scenario 2:
Credential theft - the Monster Cache
Scenario 2:
Credential theft - the Monster Cache
Login credentials are a prime target for cybercriminals and can fetch a high price on the Dark Net - are yours fully protected?
Learn how criminals are targeting your organization, how to respond if accounts are compromised, and how to prevent future attacks.
Scenario 3:
Insider threat - the Card Shark
Scenario 3:
Insider threat - the Card Shark
Is your network as secure as you think? You may be protected from outside threats, but have you considered the internal ones?
In this investigation, see how access from the inside led one cybercriminal to misuse payment card data for their own financial gain.
Scenario 4:
Crypto-jacking Malware - the Peeled Onion
Crypto-jacking Malware - the Peeled Onion
Sometimes attackers care less about your proprietary information and more about your processing power - using it to mine cryptocurrency.
This incident demonstrated how a strong firewall can be undone by missed security patches, and a client’s system exploited by miners.
Scenario 5:
Cyberespionage - the ‘Katz-Skratch’ Fever
Scenario 5:
Cyberespionage - the ‘Katz-Skratch’ Fever
“Mimikatz” is a credential theft tool favored by particular nation-states to scrape memory of processes responsible for authentication.
See how investigators found the problem in this scenario, and how further training can help protect you from similar attacks.
Scenario 6:
eCommerce breach - the Flutterby Effect
Scenario 6:
eCommerce breach - the Flutterby Effect
Frozen, or broken, online payment pages are more than just an annoyance to customers, they could be a sign of a breach.
In this case, a checkout page sent payment card data to an external domain - thanks to five lines of code that shouldn’t have been there.
Scenario 7:
ICS attack - the Eclectic Slide
Scenario 7:
ICS attack - the Eclectic Slide
Your industrial control systems are a prime target for criminals - are you able to protect them if your network is compromised?
Something as innocent as a word document sent via email was enough to compromise the network and disrupt operations in this scenario.
Scenario 8:
Identity theft - the Achilles Steal
Scenario 9:
PoS intrustion - the Faux PoS
Scenario 9:
PoS intrustion - the Faux PoS
Most businesses rely on third parties, especially for payments. But have you performed adequate checks on their security compliance?
If a vendor is compromised, you could be too. That’s exactly what happened in this investigation thanks to an unsecure PoS system.
Scenario 10:
Supply-chain reaction - the Whole Enchilada
Scenario 10:
Supply-chain reaction - the Whole Enchilada
Attacks can start in the supply chain, before you own a system. But if scans reveal nothing abnormal, how can you find the problem?
In this case, investigators had to dive all the way into the firmware to discover where the culprit was hiding-and how it got there.
Scenario 11:
Social engineering - the Spiked Punch
Scenario 11:
Social engineering - the Spiked Punch
When it comes to finances, it’s important that your employees remain vigilant at all times - are yours performing adequate checks?
Trying to pay invoices on time meant one employee failed to perform adequate security checks and handed over the cash in this scenario.
Scenario 12:
Twended attack - the Bedeviled Egg
Scenario 13:
Web app attack - the Tuple-Row Honey
Scenario 14:
Wi-Fi compromise - the Evil Twin
Scenario 14:
Wi-Fi compromise - the Evil Twin
Don’t wait to be a victim of a cyberattack before you re-evaluate your defenses - penetration tests now could save you in the future.
Penetration tests exposed many weaknesses in this company’s wireless network - luckily it wasn’t real criminals trying to get in.
Scenario 15:
Third-party palooza - the Minus Touch
Scenario 15:
Third-party palooza - the Minus Touch
If you use a co-location data center, you need to know who does what in the event of a data breach - and how this impacts investigations.
This incident shows how a third party can complicate an investigation and cause precious delays to incident response times.
Scenario 16:
False alarm - the Exposed Flank
Scenario 16:
False alarm - the Exposed Flank
If your users were locked out of their accounts, you’d assume the worst. But what if your cyberattack isn’t an attack at all?
In this case, what looked like a distributed denial of service attack locking users out, was actually overzealous penetration testing.
Scenario 17:
Telephonic pretexting - the Double Fake
Scenario 17:
Telephonic pretexting - the Double Fake
If you got a call from a senior executive asking for help logging in, you’d help them. But what if they’re not who they say they are?
In this scenario, the IT help desk was duped into handing out confidential information by a criminal claiming to be a senior executive.
Scenario 18:
Digital hijacking - the Crossed Wires
50 characters per line, two lies max, 100 max characters 100 max characters 50 characters per line, two lies max, 100 max characters in total for this place. NHG, 18/17.1
50 characters per line, two lies max, 100 max characters 100 max characters 50 characters per line, two lies max, 100 max characters in total for this place. NHG, 18/17.1
50 characters per line, two lies max, 100 max characters 100 max characters 50 characters per line, two lies max, 100 max characters in total for this place. NHG, 18/17.1