Many companies aren't prepared for darknet data leaks

How to prevent cyberattacks
(Image credit: Unsplash)

Many businesses are woefully unprepared for having their sensitive data leak on the dark web, a new report from cybersecurity researchers Kaspersky has claimed.

As per Kaspersky’s report, which analyzed a host of leaks and connected with the affected organizations last year, the company discovered sensitive data, belonging to 258 companies worldwide, leaking all over the web. The data was being sold to the highest bidder and often included access to company systems and endpoints, access to compromised accounts, and similar.

Kaspersky tried to contact these organizations and warn them about the risks, including penalties, financial losses, and a loss of trust, particularly among European businesses that are subjected to strict GDPR regulations.

Appropriate reactions

That is where the researchers discovered how unprepared the firms are - 42% did not have a dedicated point of contact (POC) for cyber incidents. With such events, it is paramount that businesses react fast, and without a dedicated POC, they’re losing precious time. Furthermore, more than a quarter (28%) showed indifference to the fact that their data was being shared with malicious third parties online, while 2% denied being breached and having data stolen in the first place.

But it’s not all doom and gloom - some organizations did well, Kaspersky further claimed. Almost a quarter (22%) acted “appropriately”, the researchers said, acknowledging the information and addressing the risks. Another 6% knew of the incidents even before Kaspersky.

Data theft is one of the most popular forms of cybercrime these days. Ransomware operators almost always steal the data before encrypting the systems, and then demand payment in exchange for the decryption key and for not leaking the data on the dark web. In more recent times, some threat actors even abandoned encrypting systems altogether, focusing entirely on stealing data. 

Researchers are saying it’s cheaper, as it doesn’t require software maintenance, while being equally lucrative.

Via: Infosecurity Magazine

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A hacker typing on a MacBook laptop with code on the screen.
If your business data appears on the dark web, get ready to face a cyberattack
A digital themed isometric showing a neon padlock in the foreground, and a technological diagram of a processor logic board in the background.
Third-party data breaches have become a major security concern
Concept art representing cybersecurity principles
How to combat exfiltration-based extortion attacks
Dark Web monitoring
How users benefit from Dark Web monitoring
security
The true cost of a security breach
cybersecurity
How dark data could be your company's downfall
Latest in Pro
cybersecurity
What's the right type of web hosting for me?
Security padlock and circuit board to protect data
Trust in digital services around the world sees a massive drop as security worries continue
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
construction
Building in the digital age: why construction’s future depends on scaling jobsite intelligence
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)