IBM Security: Healthcare Cyber Attacks Prevalent, but Less Records Breached in ’16

March 29, 2017
A new report from IBM Security found that healthcare—not too long ago the most attacked industry by cyber criminals—fell out of the top five of most breached industries.

A new report from IBM Security found that healthcare—not too long ago the most attacked industry by cyber criminals—fell out of the top five of most breached industries.

The results from the 2017 IBM X-Force Threat Intelligence Index found the number of records across all industries compromised grew a historic 566 percent in 2016 from 600 million to more than 4 billion. These leaked records include data cybercriminals have traditionally targeted like credit cards, passwords and personal health information, but IBM X-Force also noted a shift in cybercriminal strategies. In 2016, a number of significant breaches related to unstructured data such as email archives, business documents, intellectual property and source code were also compromised.

In 2015, healthcare was the most attacked industry with financial services falling to third, however, attackers in 2016 refocused back on financial services. While financial services was targeted the most by cyber attacks last year, data from the X-Force report showed it was only third in compromised records. The lower success rate versus the high volume of attacks in financial services indicates that continued investment in sustained security practices likely helped protect financial institutions.

What’s more, the healthcare industry continued to be suffering by a high number of incidents, although attackers focused on smaller targets resulting in a lower number of leaked records. In 2016, only 12 million records were compromised in healthcare—keeping it out of the top five most-breached industries. For perspective, nearly 100 million healthcare records were compromised in 2015 resulting in an 88 percent drop in 2016.

The IBM X-Force Threat Intelligence Index is comprised of observations from more than 8,000 monitored security clients in 100 countries and data derived from non-customer assets such as spam sensors and honeynets in 2016. IBM X-Force runs network traps around the world and monitors more than eight million spam and phishing attacks daily while analyzing more than 37 billion web pages and images.

As such, it should be noted that the X-Force report observes its clients, not necessarily all U.S.-based healthcare organizations, from which most cybersecurity statistics are drawn from. Indeed, a year-in-review Breach Barometer report from Protenus painted a starker picture—2016 averaged at least one health data breach per day, affecting more than 27 million patient records, Protenus found.

Information and communication services companies (3.4 billion records leaked and 85 breaches/incidents) and government (398 million records leaked and 39 breaches/incidents) experienced the highest number of incidents and records breached in 2016.

“Cybercriminals continued to innovate in 2016 as we saw techniques like ransomware move from a nuisance to an epidemic,” Caleb Barlow, vice president of threat intelligence, IBM Security, said in a statement. “While the volume of records compromised last year reached historic highs, we see this shift to unstructured data as a seminal moment. The value of structured data to cybercriminals is beginning to wane as the supply outstrips the demand. Unstructured data is big-game hunting for hackers and we expect to see them monetize it this year in new ways.”

In a separate study last year, IBM Security found 70 percent of businesses impacted by ransomware paid over $10,000 to regain access to business data and systems. In the first three months of 2016, the FBI estimated cybercriminals were paid a reported $209 million via ransomware. This would put criminals on pace to make nearly $1 billion from their use of the malware just last year.

The promise of profits and businesses increasing willingness to pay empowered cybercriminals to double down on ransomware in 2016. The primary delivery method for ransomware is via malicious attachments in spam emails. This fueled a 400 percent increase in spam year over year with roughly 44 percent of spam containing malicious attachments. Ransomware made up 85 percent of those malicious attachments in 2016.

Overall, the average IBM monitored security client organization experienced more than 54 million security events in 2016—only three percent more events than 2015. This was marked by a 12 percent decrease year-over-year in attacks. As security systems are further tuned and new innovations like cognitive systems grow, the number of incidents overall dropped 48 percent in 2016.

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...