Professional, Technical
and Scientific Services
​​   

  •  

    Phishing and credential theft associated with cloud-based mail accounts
    have risen as the prominent attack types.​​ 

     

    Frequency​​ 

    670 incidents, 157 with confirmed data disclosure​​ 


    Top 3 Partners​​ 

    Web Applications, Everything Else, and Miscellaneous Errors represent
    81% of breaches within Professional Services​​ 


    Threat Factor​​ 

    External (77%), Internal (21%), Partner (5%), Multiple parties
    (3%) (breaches)​​ 


    Actor Motives​​ 

    Financial (88%), Espionage (14%), Convenience (2%) (breaches)​​ 


    Data Compromised​​ 

    Credentials (50%), Internal (50%), Personal (46%) (breaches)​​ 




    Wide range of services, narrower range of threats​​ 

    Professional Services is a broad category even by NA­ICS standards, and the members of its ranks include law offices, advertising agencies, and engineering and design firms to name only a few. Starting with a focus on the data lost in the 157 Professional Services breaches, Figure 56 gives us an idea of the types of data most commonly involved in these cases.​​ 

     

  • Figure 56
  • We see an overall increase in Personal data and Credentials breached. A lot of this comes from breaches now compromising multiple data types at the same time. Often, credentials are the key that opens the door for other actions. Figure 57 shows that most of the time, it’s on the way to compromise Internal and/or Personal data. This is indicative of gaining access to a user’s inbox via webmail login using stolen credentials.​​ 

  • Figure 56
  • Sometimes you just have to ask​​ 

    Credentials compromising email...sounds a lot like Business Email Compromise doesn't it? Figure 58 provides ample evidence that BECs are an issue for Professional Services. Financial staff were the most likely to be compromised in incidents involving fraudulent transactions, but it should be noted that executives were compromised in 20 percent of the incidents and are 6x more likely to be the asset compromised in Professional Services breaches than the median indus­try. You have to hand it to the attackers. At some point one must have thought “why don’t we skip all the hard hacking and just, you know, ask for the money?”​​ 

  • figure 58
  • Paths of the unrighteous​​ 

    To wrap up, Figure 59 illustrates the single step Misuse and Error breaches, but also shows us the Social and Hacking breaches that take slightly longer to develop. All of it provides excellent immediate teaching moments for any organization.​​ 

  • Figure 59
  • Aspectos que debes tener en cuenta​​ 

    One is the loneliest number​​ 

    We don’t like saying it any more than you like hearing it, but static credentials are the keys. Password managers and two-factor authentica­tion are the spool pins in the lock. Don’t forget to audit where all your doors are. It doesn’t help to put XO-9’s on most of your entrances if you’ve got one in the back rocking a screen door.​​  

    Social butterflies​​ 

    You know a great way to capture credentials? A social attack. At least we know where it’s coming from. Monitor email for links and executables (including macro-enabled Office docs). Give your team a way to report potential phishing or pretexting.​​  

    To err is human​​ 

    Set your staff up for success. Monitor what processes access personal data and add in redundant controls so that a single mistake doesn’t result in a breach.​​