HACKER Q&A
📣 dev_0

Why are there so many data breaches?


No one cares about Security except the security team?


  👤 dyingkneepad Accepted Answer ✓
I work for a company where the IT and Security teams make our lives so miserable that Shadow IT is very strong, so as a consequence IT and Security has absolutely no control over everything that's going on. There's absolutely no way they can control everything that's running internally, there's gotta be hundreds of rogue machines internally.

If IT was actually good and tried to give us good solutions that would enable us to have standard and secure systems AND still be able to work at the same time, most people would happily comply. But that's not the case. IT support employees sometimes can barely even speak English...


👤 softwaredoug
Having worked under many security policies, they fall into three categories

1. Basically a startup with no security whatsoever

2. Security prevents you from doing your job, so people have no choice but to actively work around it

3. Security integrates seamlessly with developers workflow

1 and 2 were the most common. 3 was rarest. If you want good security, you also have to care enough about UX so people don't work around the security.

The answer is that bad security gets in the way of peoples jobs, and people have no choice but to work around it. Good security is effortless and cares about the UX. Frankly, that's hard, so many companies don't do it very well.


👤 mikewarot
There are two basic technologies that could get things under control:

Capability based security[1] is the best choice, but isn't widely available outside of very specialized environments. *Like java/javascript - Capability Based Security is NOT the same as "capabilities" on your smartphone for "Allow Location Services" in your phone, etc.

Unidirectional Networks[2] are a product you can buy right now. Quite simple and un-hackable, they only allow data to flow in the direction desired. There are often a pair of servers set up on either side to act as a proxy compatible with normal network services such as tcp/ip, ftp, www, file stores, etc.

With these two tools, you can build systems that only allow desired data flows required for the desired behavior and inhibit external injection of control.

[1] https://en.wikipedia.org/wiki/Capability-based_security

[2] https://en.wikipedia.org/wiki/Unidirectional_network


👤 pasabagi
I think the driver is economic: companies are not forced to compensate users for the loss of their private data. Breaches are annoying but essentially harmless for most companies.

As such, it doesn't make sense to invest that much in security. Security protects your users, but the privacy and safety of users has zero impact on most companies' bottom line.

The situation will continue until compensation of victims (i.e. users) is mandatory by law.


👤 markus_zhang
I think there are groups actively breach for profit or national security. Think NSA and commercial espionage.

So essentially no one is safe once you are big enough to fall into the bullseye. Even for individuals and smaller business there are times that cyber criminals seek to extract value. For example to "promote" antivirus or cloud shield products.

I'm very curious if anyone has been in the dark side and are willing to share their knowledgr. I figured there must be a chain of criminals such as 1) people who care more about tech so they find exploits and build malware, and 2) people who wants profit so they purchase the products from group 1 and run operations, 3) people who are good at social engineering can probably shine too


👤 badrabbit
Clustering effect of certain events, in other words "when it rains it pours".

I also have theory about end of season trends. End of summer,fall, end of holiday season,etc... is whem threat actors wrap up a campaign and move to another target or take a break. You hear about breaches now but keep in mid dwell time is typically in weeks and it takes a week or two minimum before the company is confident enough to make public disclosure. So start of campaign for anything I see now is early august (including pre-compromise activity) which is the end of summer in the US (at least end of summer break for kids, august-november is the pre-holiday season IMO).


👤 bravetraveler
I can think of quite a few reasons.

Most simply, I think we're paying for our recent leaning-in on tech. The field and the people participating need time to mature.

More specifically, supply chain/distribution. I'm not sure I'm using the term correctly, but 'cargo culting' has picked up with the simplification of 'getting your code out there'

This has had the side-effect of getting code belonging to others out there as well -- with only some of it being intentional

The human element always counts too. We have more people doing the work now than ever. Social engineering is usually the start


👤 JoeCortopassi

  "If you think the Twitter hack was bad, wait until you realize that back in March every company had to suddenly support remote access to their networks/tools virtually overnight"
July 16th, 2020: https://twitter.com/JoeCortopassi/status/1283964945303048193

👤 inphovore
It it the nature of the game.

Are you a security “expert”? It is just like a lay person to have no idea the true complexity of security.

Where ever there is an interface (any contact point what-so-ever) there is an opportunity for exploit, be it technology or people or things!

Data breach is only the subset where data is copied out, though this principle applies throughout, and always has in every kind of system!


👤 cable2600
Lack of quality control in programming, weak passwords, not updating the server software quick enough, holes in the firewall.

👤 Us008837
Because some companies suck at data security.generally prioritize advertising and revenue.