Report: 7 in 10 Attempted Data Breaches in Education Are Financially Motivated

Nearly three-quarters, 70 percent, of cybersecurity incidents in education are motivated by the possibility of financial gain, according to Verizon's 2018 Data Breach Investigations Report (DBIR).

One in five attacks on educational institutions were motivated by espionage, often targeting sensitive research, and 11 percent of attacks are "just for fun," according to the report.

This year's report looked at more than 53,000 incidents and 2,300 data breaches from five countries. For the purposes of the report, an "incident" is defined as, "A security event that compromises the integrity, confidentiality or availability of an information asset," whereas a data breach is, "An incident that results in the confirmed disclosure — not just potential exposure — of data to an unauthorized party."

Human beings are a major security weakness across all industries, with companies being "nearly three times more likely to get breached by social attacks than via actual vulnerabilities," according to information released by Verizon.

Financial pretexting — attacks in which the attacker tricks someone into releasing information under false pretenses, such as telling the victim they are conducting a survey or pretending they are a customer who has lost their login information — has boomed, increasing fivefold over the last year. More than half of the financial pretexting attacks recorded by Verizon this year were targeted specifically at human resources staff.

Also across all industries, ransomware was the most prevalent form of malicious software, accounting for 39 percent of malware attacks.

Key findings of the report specific to the education industry include:

  • There were 292 incidents recorded, with 101 confirmed to have disclosed data;
  • Most attackers, 81 percent, were from outside the organization, with internal actors accounting for only 19 percent of attacks;
  • Of the data compromised in attacks on educational institutions, 72 percent was personal, 14 percent some kind of secrets and 11 percent medical;
  • Hacking is the most common action type for incidents in education, accounting for 72 percent of all incidents — largely because of the prevalence of denial-of-service attacks against educational institutions — and 44 percent of breaches; and
  • 14 percent of education breaches featured a causal error by an employee.

To read the full report, visit verizonenterprise.com.

About the Author

Joshua Bolkan is contributing editor for Campus Technology, THE Journal and STEAM Universe. He can be reached at [email protected].

Featured

  • student reading a book with a brain, a protective hand, a computer monitor showing education icons, gears, and leaves

    4 Steps to Responsible AI Implementation

    Researchers at the University of Kansas Center for Innovation, Design & Digital Learning (CIDDL) have published a new framework for the responsible implementation of artificial intelligence at all levels of education.

  • glowing digital brain interacts with an open book, with stacks of books beside it

    Federal Court Rules AI Training with Copyrighted Books Fair Use

    A federal judge ruled this week that artificial intelligence company Anthropic did not violate copyright law when it used copyrighted books to train its Claude chatbot without author consent, but ordered the company to face trial on allegations it used pirated versions of the books.

  • server racks, a human head with a microchip, data pipes, cloud storage, and analytical symbols

    OpenAI, Oracle Expand AI Infrastructure Partnership

    OpenAI and Oracle have announced they will develop an additional 4.5 gigawatts of data center capacity, expanding their artificial intelligence infrastructure partnership as part of the Stargate Project, a joint venture among OpenAI, Oracle, and Japan's SoftBank Group that aims to deploy 10 gigawatts of computing capacity over four years.

  • laptop displaying a phishing email icon inside a browser window on the screen

    Phishing Campaign Targets ED Grant Portal

    Threat researchers at cybersecurity company BforeAI have identified a phishing campaign spoofing the U.S. Department of Education's G5 grant management portal.