Image

Image

"These are intentional targets of choice based on the organization’s perceived investment in security controls and the respective compromised data value. Additionally, these databases are likely to contain significant quantities of users and potentially associated personally identifiable information (PII)."Rasputin pulled off the attacks using a technique known as SQL injection. It's when a bad actor exploits a vulnerability that allows them to directly access a database through a web application or browser. Databases that are vulnerable to SQLi don't sanitize a user's input before they execute an instruction. Such a hole allows for an attacker to download, modify, and view a database's contents without the proper authorization. It's therefore no surprise this type of vulnerability has been responsible for some high-profile breaches like those that affected Yahoo and LinkedIn. For more information on how SQLi works, please view this three-part guide.
Image

"The evidence suggests economics play a role in causation for this troubling trend. The problem and solution are well understood, but solutions may require expensive projects to improve or replace vulnerable systems. These projects are often postponed until time and/or budget is available, until it’s too late to prevent SQLi victimization."To address this issue, the threat intelligence provider feels organizations should receive a financial incentive to plug SQLi holes in their systems.