Skip to content

Racing with MITRE to forge ESET Inspect for SOC and MDR use

 

ESET’s journey through 2024’s TTP-heavy Enterprise ATT &CK evaluation demonstrates both progress and scope for continued enhancement of our detection-and-response solution, as well as an interesting contrast with commercial tests.

Six years into MITRE Enterprise evaluations, with their consistent focus on attack emulations leveraging a vast collection of tactics, techniques and procedures (TTPs), vendors are now finding evolved detection and protection scenarios added to the mix. MITRE’s team of experts has clearly been working agilely, prompting vendors to adapt to the new test environment. Simultaneously, vendors looking to position themselves for the “win” and improve sales prospects increasingly face a paradox with MITRE: It’s still not a competitive test. Rather, the takeaways provide most value to security analysts involved in the day-to-day work of operating endpoint detection and response platforms.

This year’s evaluation has introduced some substantial changes. Notably, MITRE dropped telemetry from the detection categories, raising the threshold for a recorded event to be considered a detection. To counteract vendors’ gaming products to “win” or “detect everything,” a proportion of substeps now test for false positives rather than detections, while other substeps are not evaluated at all. In a final nod to address “points” accumulated via “detecting everything,” MITRE measures the number of detections in the dashboard, again cutting into “point gain” via bloated numbers of detections.

ESET also brought changes to the table, most significantly by fielding ESET Incident Creator, a module in ESET Inspect for incident-focused handling of threats. Incident Creator proved its use case in the detection portion of the evaluation, transforming how analysts are presented with detections generated from a cyberattack; detections are rolled up into incidents, giving analysts a focused view of how each attack progressed. With this tool in hand, we demonstrated good visibility into each attack scenario, detecting all steps and most meaningful substeps while maintaining a low volume of detections. Thus, for ESET, most missed substeps, e.g., API calls, provide the analyst with little to no value, could be discovered via other means, and present almost no loss of information for the reconstruction of the attack.

What we learned about our product

The most recent round of the ATT&CK Evaluations Enterprise pitted multiple vendors’ detection and response platforms against three attack scenarios named DPRK, CI0p, and LockBit, as well as a battery of 10 protection tests. With well-recognized research on all of the threat groups chosen for the scenarios, ESET engineers were interested to observe how ESET Inspect’s behavior could translate to supporting SOC operators as well as organizations leveraging security service offers such as ESET MDR.

With a nod to ESET’s preoccupation with efficiency, and MITRE’s new rules seeking to limit a detect-everything approach, the three attacks generated plenty of detections – correlated into incidents – allowing incident responders to easily understand how the attacks happened and thus take quick remediation. Additionally, the Incident Creator module eliminated considerable noise for the benefit of threat analysts – another priority for ESET, both inside and outside this test environment.

Turning off protection for the evaluation, and back on for the real world

With one of MITRE’s goals being to examine coverage of the TTPs in the ATT&CK knowledge base, vendors’ products in the detection scenarios are configured to not block or kill any of the threats they encounter. This is an important point because, in the real world, many of the threats employed in these scenarios would have been blocked either on first encounter or very soon thereafter.

For ESET, there are several fitting cases to highlight: The CI0p and LockBit ransomware samples, along with a couple other samples, would have been blocked in the first evaluation run. Although masked by the evaluation’s focus on ESET Inspect, it was actually ESET Live Guard Advanced, a key technology layer in the ESET PROTECT platform, that was behind the initial detection and blocking of these ransomware samples. Any remaining malware would have been blocked on the second run. This is good news in the real world because it means that customers benefit from efficient protection against threats.

In regard to the protection tests, while there are a few areas to improve the coverage provided by our products, 2024’s tests mainly focused on isolated and sometimes not clearly malicious substeps that, in the real world, could actually be benign and thus cause harm to customers if blocked. On real-world systems, cyberattackers aren’t running techniques and procedures “atomically,” i.e., disconnected from a full attack chain. Instead, their operations are a buildup, and the task of detection and response solutions is to correlate the full context to identify correctly that something malicious is afoot.

Figure 2. Detection of the SDBbot installer in the Cl0p config change run

Figure 3. Detection of the Firefox password stealer in the LockBit config change run

We are left feeling that the pursuit of total coverage of the ATT&CK knowledge base does not necessarily improve defenses or automatically assist security analysts in their daily work. In contrast to forensics or malware analysis, detection and response require only enough coverage of highly prevalent or severe techniques (or substeps) for the analyst to trigger a response. Missing detections for low-prevalence or low-severity techniques does not necessarily translate to lower protection. Quite the opposite, it could mean that work is streamlined, and remediation is faster because the major steps needed to identify the attack are immediately highlighted, thereby allowing a timely and adequate response to be triggered – in some cases even with automatic blocking of the detected threat.

Again, outside the ATT&CK Evaluations and atomic testing scenarios, third-party tests usually design scenarios that don’t prioritize coverage of TTPs. Instead, they measure blocking, false positives, performance, cost, and the like by a fully functioning product suite. They also focus more on critical steps of an attack, such as endpoint compromise and foothold, internal propagation, and asset breach.  The ultimate arbiter is stopping an attack, whether by blocking malicious files or killing malicious processes, or at least providing the security analyst with the means to do so.

“What sets this solution apart is its ability to deliver rapid response times, robust threat intelligence, and strong ransomware protection, all while offering strong compliance and localization support.”

-Warwick Ashford, Senior Analyst at KuppingerCole

A number of strong results demonstrate the efficacy of real-world performance. This includes real-world tests, such as AV-Comparatives’ Endpoint Prevention & Response (EPR) Test 2024 and 2023, and analyst perspectives, including selection of ESET as a leader in both KuppingerCole’s Leadership Compass for MDR and Leadership Compass for Endpoint Protection Detection & Response.

In KuppingerCole’s executive summary of the EPDR market, they discuss the wider industry’s use of the MITRE ATT&CK framework, as well as the fact that endpoint protection platforms and EDR tool sets have converged into the logical integrated pairing of Endpoint Protection Detection & Response (EPDR). This means the majority of vendors aim to improve based on MITRE’s micro-emulation of techniques and procedures, while developing successful, integrated EPDR proven by industry-standard, real-world testing. Ideally, covering these two scopes makes for battle-ready detection and response.

Battle-ready EPDR

In fact, EPDR solutions are the battle-ready systems that institutions and businesses invest in, deploy, and operate today. Above and beyond this, ESET continues to seek out other avenues to challenge its products and its engineers. Perhaps the zenith of this search has been reached with our regular participation at Locked Shields, a military simulation of today’s digital battlespace organized by the NATO Cooperative Cyber Defense Centre of Excellence.

In 2024, more than 60 ESET system engineers, security monitoring analysts, malware researchers and analysts, and comms specialists formed ranks with defenders from the Slovak and Hungarian militaries and the private and academic sectors to defend our assigned battlespace.

Our tool, ESET Inspect, backed by our multilayered security platform ESET PROTECT, was central to Slovakia-Hungary’s fourth place out of 18 participating teams and helped the team to top three placings in cyber threat intelligence, client-side protection and forensics. This cyber-battle simulation was an intensively immersive experience for all the technologists involved, whether as threat analysts working to understand the TTPs to anticipate the next stages of an attack or engineers configuring cyber defenses.

Conclusion

ESET remains as motivated to leverage MITRE’s Enterprise Evaluations to feed technical audiences with critical food for thought as we are to invest our institutional knowledge in Locked Shields to advance both our security practice and that of our NATO partners. The output of our engagement with MITRE, whether via the +350 contributions to the ATT&CK knowledge base or participation in the ATT&CK Evaluations, continues to be sharpened detection and response capabilities tuned to the real world and protecting our shared progress.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Scale Computing Named 2024 DCD>Awards Edge Data Center Project of the Year Winner

Scale Computing Named 2024 DCD>Awards Edge Data Center Project of the Year Winner

INDIANAPOLIS – December 19, 2024 – Scale Computing, the market leader in edge computing, virtualization, and hyperconverged solutions, today announced that Data Center Dynamics (DCD) has honored its deployment with Royal Farms—an established convenience store and fuel chain with more than 300 U.S. locations—with the 2024 Edge Data Center Project of the Year award.

The DCD>Awards recognize exceptional innovation, leadership, and results within the data center industry. This award category recognizes projects that can demonstrate a unique and strategic approach as to how a successful Edge deployment is designed, set up and operated, and show how this creates new and exciting opportunities for delivering on IT and business objectives. This year’s distinction spotlights the successful partnership between Scale Computing and Royal Farms, showcasing how a forward-looking edge computing strategy can transform operational efficiency, reduce complexity, and deliver a superior customer experience.

Royal Farms sought a modern, resilient, and cost-effective edge infrastructure solution to streamline IT operations across its distributed locations. By deploying the Scale Computing Platform (SC//Platform) at the store level, the company dramatically simplified its infrastructure, shortening installation times by 90% and decreasing management overhead and licensing costs by 75%. The result was a self-healing, automated environment that ensures reliable performance and high availability for critical applications, ultimately improving daily operations and enabling continuous innovation at the edge.

“We’re honored that Data Center Dynamics has recognized our work with the 2024 Edge Data Center Project of the Year award,” said Jeff Ready, CEO and co-founder, Scale Computing. “This award highlights how advanced edge computing solutions can redefine distributed IT environments, enabling organizations to improve performance, reduce complexity, and ultimately deliver a better experience to their customers.”

By continuing to deliver agile, high-performance solutions that simplify deployment and maintenance across distributed environments, Scale Computing helps organizations like Royal Farms gain unprecedented control over their IT environments. As enterprises increasingly embrace the edge to meet customer demands and drive competitive advantages, Scale Computing remains committed to delivering solutions that enable seamless, reliable, and cost-effective operations no matter where data and applications reside.

The DCD>Awards recognizes the most outstanding projects, people and teams across 17 categories. An independent panel of judges reviewed hundreds of entries submitted. Winners were announced December 11th at the 18th annual awards ceremony at Grosvenor House in London, and broadcast live worldwide.

To learn more about Scale Computing’s edge computing solutions and its award-winning work with Royal Farms, watch the video case study and explore additional insights at: https://www.scalecomputing.com/resources/why-royal-farms-chose-scale-computing.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

2024 at NordLayer, that’s a wrap

Summary: NordLayer had an exciting 2024. We turned five this year, launched new features, and won cybersecurity awards. Next stop: 2025.

The year is coming to a close, and the holidays are just around the corner. It’s a good time to look back on 2024. It’s been a busy year—full of challenges, exciting updates, and plenty to celebrate.

This year, NordLayer turned 5! We earned a few critical cybersecurity awards and were top-rated in our partner survey. Today, we have customers in 118 countries. That’s a great reminder of why we do what we do.

Along the way, we introduced features that make staying secure even easier. As always, we’ve worked hard to improve what we offer to our customers.

Thanks for being part of our journey. Here’s to wrapping up 2024 on a high note—and to an even brighter, safer 2025!

Donatas quote

A snapshot of NordLayer’s 2024

A quick look at 2024

NordLayer turns 5

NordLayer started in 2019 as a VPN tool to secure remote work. When COVID-19 hit, businesses faced new challenges. We had to onboard hundreds of employees quickly, ensuring secure connections and business continuity. It was a tough test, but we overcame it, protecting businesses around the world.

As remote and hybrid work took off, NordLayer became more than just a VPN. We grew fast. We added new security features and focused on the Zero Trust model, improving our customers’ security.

This year, as we celebrate our fifth birthday, we’ve become a comprehensive network security platform. In 2024, we launched several new features and improvements, with more to come.

Top rated by our partners

In 2024, we brought 450 new partners (1000+ in total) on board, expanding our network across 40 countries.

Partner survey results

Last year, MSPs and our partners faced challenges related to strict compliance regulations and rapid tech changes. We ran a survey to see how we’re helping, and our partners gave us a 9/10 rating.

Our partners appreciate how easily NordLayer fits into their workflow, fast and reliable support, and the chance to grow revenue—all while keeping their clients safe.

Donata quote

Our customer stories

NordLayer now has more than 9,000 customers in 118 countries. We’ve gathered feedback from many of them, and their stories show how our solutions help them stay secure and efficient.

Customer quotes

New features and improvements in 2024

Here’s an overview of the new features and product improvements we made in 2024. Each makes network management easier and more efficient while boosting security. We have also added new locations to the NordLayer VPN server network.

Product development timeline

At the beginning of 2024, we added Active Session Timeout, a new feature and made one improvement to the Zero Trust Network Access (ZTNA) segment. How does it benefit users?

Features 5

We’ve also introduced a few new features to enhance network security and performance.

Features 6

With five new dashboards in the Control Panel, IT admins can get more insights and make network management easier.

Dashboard

Brave browser users can enjoy smooth performance with full support for the NordLayer Browser Extension. We’ve also improved the Site-to-Site feature, giving IT admins better visibility into site-to-site tunnels and the ability to make real-time adjustments in the Control Panel.

The last feature released in 2024 is Download Protection. It scans newly downloaded files for malware and provides instant reports on any threats or user activity, ensuring real-time protection.

Awards and events

It was a big year for NordLayer. We won the UK Business Security Award for the Outstanding Cybersecurity Solution 2024 category, and Tekpon announced NordLayer as the Top Cloud Security Software Tool.

We also earned a Cybersecurity Excellence Award for Network Access Control. Competing with over 600 entries, this award highlights how NordLayer makes network security simple and reliable for businesses. And we’re not stopping there—we’ll keep pushing to make our solutions better.

Povilas quote

In 2024, the sales team stayed busy, attending 18 events across the USA and Europe. They connected with partners, showing them why NordLayer is a go-to name in security.

Photos from events

From work to play: how we build teams

Workation

At NordLayer, we know the best teams are built through shared experiences. With 1,300 people from 22 countries, our workstations mix work and fun. We work together, but we also relax and enjoy each other’s company.

These moments recharge our batteries for the upcoming challenges and help us build stronger connections. For us, it’s not just about working hard but also about having fun and growing together.

What’s next for 2025?

We’ll keep improving and expanding our network security SSE-based solutions. More features and product improvements are on the way. But what’s next for 2025? Stay tuned!

Andrius Buinovskis quote
 

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Delivering business security with extended prevention

Essential security can take care of most threats – but for businesses with larger networks, it might be time to extend the security envelope.

We’ve written before about how multilayered security is key to protection success. Each layer represents a dimension of protection, tackling specific threats or attack vectors. 

The best security solution should tackle all of this behind the scenes, only requiring human attention during setup, audits, or incidents. Security should be comprehensive, yes, but not too complicated, worsening the protective power of security operations.

To learn how complicated security tools can impact a business’s cybersecurity protection, read our blog on alert fatigue-induced burnout.

Moreover, the larger such an operation is, the harder it is to cover. Thankfully, some measures can alleviate such issues easily – such as automatic extended protection.

What do we mean by extended protection?

Let’s start from the bottom – the core of a security operation: endpoint protection, covering computers, mobile devices, and servers. Such points of convergence between users and digital networks are prime targets for threat actors, necessitating constant safeguarding.

Baseline endpoint protection should serve the smallest businesses, but larger ones might find that this is just not enough to cover their use of various cloud and mail apps, authentication, or a potential cyber insurance ask in the form of advanced encryption. Furthermore, larger businesses also require advanced threat defenses, somewhere beyond stand-alone endpoint security. This could be a protective sandbox set up to catch any incoming malicious samples, such as zero-day threats, before they hit the endpoint itself, or vulnerability and patch management to take care of exploitable gaps before they become an issue.

At ESET, we call all this extended protection – as it extends beyond endpoint security, adding additional protective layers, extending prevention efforts.

Why should a business want extended security tech?

The easy answer to why a business should seek extended protection is that their involvement in commerce is enough of an incentive for threat actors to have them in their sights. Based on various reports, cracking the security of SMBs and larger businesses is the most likely goal rather than well-defended enterprises (a business with fewer than 100 employees could face 350% more attacks than enterprises).

Ransomware, a threat likely faced by every business entity, has seen a 32% rise in H1 2024 compared to H2 2023, based on ESET threat telemetry, with most detections present in the US, Mexico, the UK, and Germany.

Moreover, similar trends are seen in remote desktop protocol (RDP) password-guessing attempts (a rise of 33%), with numerous detections in additional countries like the US, Brazil, Spain, France, Italy, Germany, Czechia, and Poland. Shockingly, despite numerous return-to-office mandates, the now common use of RDP for remote employees in hybrid work has seen the incidence of attacks continue to rise.

ESET telemetry also highlights the diversity of popular vulnerable external network intrusion vectors. While password guessing is highly represented statistically, it is followed by Log4j, Struts, and various other vulnerabilities, targeting RDP or VPN apps.

Márk Szabó

Most of the represented intrusion vectors concern key business apps that are used globally. Additionally, a majority of the represented Common Vulnerabilities and Exposures (CVEs) have patches. Despite this, they are still being actively exploited – meaning that businesses are not patching their tools, creating major opportunities for threat actors.

How to ensure extended protection

To ward off threat actors abusing a diversity of vectors, let’s tackle extended network needs step by step:

Advanced threat defense

To give additional protection against new and unknown threats, advanced defense is a good idea. In this case, it is done by adding a cloud filter on top of endpoint security, creating a sandboxed environment, such as with ESET LiveGuard Advanced, that can perform in-depth behavioral analyses to prevent targeted attacks, such as ransomware or attacks via the supply chain. This effectively places defenses outside a corporate network, preventing threats from executing inside.

Cloud and mail

Think of the sort of collaborative cloud and mail apps you use (Teams, OneDrive, Gmail, SharePoint), and consider how they enhance a network and connect it to points outside the premises of your organization – leading to extended collaboration opportunities.

As explained by ESET Security Writer Roman Cuprik, large cloud platforms have seen rapid growth, accounting for as much as 280 million users – inviting malicious actors to abuse them for gain. For example, GIFShell enabled threat actors to misuse MS Teams for phishing, executing commands to steal data using GIFs.

Therefore, protecting the cloud and mail through solutions such as ESET Cloud Office Security and ESET Mail Security is an easy way to prevent abuse, as they actively scans all files at all points of their life in the cloud – stopping spam, malware, phishing, and other threats early.

Authentication

It was previously mentioned that password-guessing attacks are quite common. Passwords themselves are often not enough to ensure account security, either because they have been leaked as part of a security breach or because of their simplicity, becoming easily brute-forced.

Thus, secure authentication adds a layer on top, preventing password misuse from letting attackers gain access to user accounts. This is very useful also in the case of RDP and VPN security, as those are also easily compromised through credential misuse. With authentication, though, security is ensured by the provision of one-time-use, time-limited codes or tokens, as attackers would need access to this factor to verify their access attempt.

Encryption

A basic compliance and cyber-insurance ask is encryption. Most often associated with data at rest (storage), encryption prevents physical exploitation of endpoint devices in case a computer, for example, is stolen. Encryption also minimizes risk stemming from data breaches, as specific solutions such as ESET Full Disk Encryption make sure that data are protected at all times.

Vulnerability and patch management (V&PM)

Known vulnerabilities (CVEs) present a major exploitable attack vector, open to abuse by malicious actors. CVEs can be present both in apps and OSs, which is why security updates exist to tackle any vulnerability gaps.

However, some businesses forget or don’t do this, leading to data breaches due to negligence. This can be followed by denied insurance claims and compliance-induced fines for not dealing with known security gaps. To prevent such cases comprehensively, think about obtaining a V&PM solution with automatic updates that satisfies this need in the background.

(Ex)tending your security

Extended security doesn’t mean extending security resources. Most of the previous solutions don’t require manual adjustments apart from initial setup, as the greatest thing about automation these days is its quiet but significant impact.

Think of it as a cardboard box – while the foil and soft particles (multilayered security) inside protect the integrity of your purchased product (endpoint), extended protection plugs any voids (vulnerabilities), tapes over the edges (encryption) and puts a cargo truck between the box and the outside world (advanced threat defense) to protect it from direct damage. As for authentication, every delivery must be signed for. 🙂

For more information on how multilayered endpoint security serves as a powerful core of business protection, read our blog posts on Fileless malware and UEFI bootkits.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Biggest data breaches of 2024

Summary: Data breaches in 2024 soared, with record-high costs and over 1 billion records exposed. Learn what caused it.

The modern economy runs on data. Businesses thrive based on how they collect, analyze, and use customer data. But none of that matters if you drop the ball on cybersecurity.

Data breaches are a hot topic with C-Suite leaders, IT journalists, and customers. That’s no surprise. 2023 was bad, but 2024 has been one of the worst years yet on the cybersecurity front.

An average data breach now costs $4.9 million. Ransomware costs an average of $5.2 million, and thieves have stolen over 1 billion records.

Even so, we’re not here to spread panic. As this list of 2024’s biggest data breaches shows, every breach has a cause and a solution. Good security practices will defeat most attackers, and it helps to learn where others have failed. But first, let’s talk about statistics.

Key facts about 2024’s data breaches

2024 has been another banner year for data breaches, with cybercriminals accelerating their efforts to steal and monetize confidential information. The stats below show that data theft is commonplace, and organizations face a challenging data security environment:

  • National Public Data (NPD) will probably be 2024’s biggest data breach. The mammoth breach potentially impacts 2.9 billion records, close to the most significant data leak ever.
  • Change Healthcare suffered the largest health-related data breach of the year, affecting over 100 million customer records. This could make it the largest healthcare breach in history.
  • The average cost of a data breach reached $4.88 million in 2024.
  • The cost of a data breach in cloud environments was even higher, averaging $5.17 million.
  • 40% of breaches involved data stored across multiple environments.
  • 68% of 2024 data breaches involved human errors, such as falling for phishing scams.
  • 14% of attacks involved security exploits, three times the 2023 total.
  • On average, organizations took 194 days to identify data breaches.
  • The average attack took 64 days to contain.
  • Meta (Ireland) was fined 91 million euros for exposing customer data, the largest GDPR penalty in 2024.
 

The biggest data breaches of 2024

A devastating data breach is a nightmare for customers and affected organizations. But breaches can have a positive side. Each incident is a learning opportunity. It’s easier to defend critical data when we understand the mistakes made by others and the tactics used by attackers.

With that in mind, let’s explore 2024’s biggest data breaches. New breaches hit the news weekly, but we will discuss these cases for years.

1. National Public Data (1.3 billion individuals)

This one could be 2024’s biggest data breach. Before this year, few people knew National Public Data, a subsidiary of Jerico Pictures, Inc., but the company is now notorious for data security failures.

In April, data broker USDoD listed a cache of NPD 2.9 billion records for sale on the Dark Web. According to Jerico, the exposed data is related to 1.3 billion individuals. With a sale value of $3.5 million, it’s easy to see why criminals targeted the data handling company.

Filings with the Maine Attorney General suggested a massive regulatory penalty was on the cards. To make matters worse, NPD users filed a civil action in August, alleging the breach was foreseeable and avoidable.

Before either case could proceed, Jerico Pictures filed for bankruptcy in October. The company lost customer trust and folded as a direct result of the NPD breach. While USDoD has been arrested, the data thieves remain at large.

What data types were involved? Almost everything. The 2.9 billion records included personally identifiable information (PII), historical addresses, social security numbers, and nicknames used by record holders.

How did it happen? The details are unclear. As far as we know, the data breach started in December 2023. A bad actor nicknamed SXUL targeted NPD servers using unknown techniques. The data started to circulate on dark web forums, ending up with USDoD in April.

 

2. AT&T (2 breaches, over 110 million individuals)

 

AT&T is so big that a data breach there affects almost everyone. Unfortunately, the telecommunications giant reported two significant data breaches in 2024.

The first was a historical hack dating back to 2022. During a six-month window, hackers extracted call and messaging data for 110 million customers. In this case, AT&T was partly at fault. The compromised data resided on servers maintained by hosting company Snowflake (itself listed later in a separate breach).

The other security incident emerged when 73 million customer records appeared on a data brokerage. Alongside identifiable information, the cache contained encrypted passwords to access AT&T accounts. Panicked by the disclosure, AT&T issued a rare force reset of over 7 million passwords.

What data types were involved? The Snowflake breach involved call and message metadata, not voice or text data. Even so, attackers could use metadata to determine user locations. The cache also included details of those contacted by AT&T customers, another useful identifier.

The second breach included sensitive personal information like full names, postal addresses, and phone numbers. It also featured the encrypted passwords we noted earlier. Combining the two sets could be very powerful in the hands of bad actors.

How did it happen? In the first case, thieves targeted Snowflake’s cloud storage infrastructure. Snowflake suggested that weak authentication processes caused the leak and that the UNC5537 hacking group was responsible.

The second AT&T data breach in 2024 is less clear. AT&T have not released information about the attackers or their mitigation processes. It looks like the password reset only happened after freelance security experts notified the TechCrunch website. Not a good look for AT&T’s internal team.

3. Patelco Credit Union (726,000 individuals)

Patelco is a Bay Area credit union that dates back to 1936 and manages over $9 billion in assets. That history almost ended in June 2024 when the company detected a significant ransomware attack.

The details of the massive data breach are sobering. The company’s initial fraud alert indicates a loss of 726,000 individual records and possible exposure of over 1 million records.

What data types were involved? The Patelco breach involves data about customers and current and former employees. Stolen data includes names, addresses, dates of birth, license numbers, and social security numbers. Credit reports and financial accounts were all put at risk.

How did it happen? According to Patelco, attackers entered the network on May 23 before accessing customer and employee databases on June 29. A ransomware attack then took down the credit union’s online banking, mobile app, and customer service centers, making it hard to resist their demands.

Two months later, the company notified regulators and customers. It also restored banking services after a damaging two-week break and provided support for customers needing an urgent credit report.

The perpetrators are unclear. However, the Dark Web ransomware gang RansomHub lists Patelco on their data brokerage and may have been responsible.

4. Community Clinic of Maui (123,000 individuals)

Attacks against healthcare organizations become more sophisticated yearly as hackers target sensitive personal information. This year, one of the worst attacks affected the Community Clinic of Maui (or Mālama).

According to the Clinic, threat actors accessed patient records between May 4 and May 7 this year. The ransomware attack took systems offline and directly impacted patient care.

The Clinic closed for two weeks, and nurses had to use paper charts for weeks after reopening. It took months to secure digital data and restore usual service.

What data types were involved? Regulatory filings suggest criminals stole social security number data, passport numbers, and names. Even worse, the attack exposed medical histories, biometric data, and financial account data (including CVVs).

How did it happen? Analysis indicates a group called LockBit mounted the attack, as the group announced responsibility in June. Attackers breached cloud storage systems, using ransomware-as-a-service agents to extract valuable data.

5. Infosys (8.5 million records)

Outsourcing company Infosys McCammish Systems announced a major breach on September 6, 2024, potentially affecting 6.5 million records.

According to filings, the attack dated back to late 2023, with attackers active between October and November. There was a long delay between data extraction and discovery.

The effects could be significant, as Infosys serves many massive financial and insurance partners. For instance, the breach exposed thousands of records from Wells Fargo and the Teachers Insurance and Annuity Association of America (TIAA).

What data types were involved? The Infosys breach involved insurance data, creating a critical identity theft risk. Data exposed included SSNs, birth dates, medical treatments, email passwords, state IDs, and driver’s license numbers.

How did it happen? LockBit took responsibility for the Infosys attack. The Russia-linked group implanted ransomware across the Infosys network, locking over 2,000 devices.

6. UnitedHealth (100 million individuals)

Cyberattackers continue to ruthlessly target healthcare companies, including some of America’s biggest operators. In February 2024, TechCrunch reported a breach at UnitedHealth that could impact 100 million customers.

Health and Human Services (HHS) received a filing in October 2024, and investigations continue. If the numbers are accurate, UnitedHealth could be the largest sensitive data breach in US history.

The attack targeted UH’s Change Healthcare payment processing system, deploying ransomware to take systems offline. The results have been crippling for providers reliant on UnitedHealth. Patients have experienced treatment and payment delays, not to mention the risks of identity theft.

What data types were involved? The attack exposed extremely sensitive protected health information (PHI). Records included medical histories, billing data, names and addresses, and financial accounts.

How did it happen? A ransomware collective called ALPHV/BlackCat executed the UnitedHealth attack. The group gained access to Change Healthcare systems, deployed ransomware, and extracted a $22 million bounty. Sadly, they failed to honor the agreement, taking a vast data hoard.

7. Young Consulting (950,000 individuals)

In August, news emerged of another enormous data breach. This time in the financial software sector. Software vendor Young Consulting admitted an attack in early 2024 had compromised almost a million records.

Between April 10 and 13, attackers freely explored the company’s network. They took full advantage, extracting data relating to a Young Consulting client, Blue Shield Insurance.

This was a major headache as Blue Shield is a HIPAA-covered entity. The threat actors subsequently sought to extort money from Young Consulting. Their extortion failed, and criminals made the data available via the Dark Web.

What data types were involved? The attack involved insurance information, including dates of birth, policy numbers, SSNs, and protected medical information like prescriptions and past procedures.

How did it happen? This is the crucial question. We know the attack was mounted by a ransomware group called BlackSuit. BlackSuit specializes in extortion attacks that access and encrypt data. The group posts this data on public websites until target organizations pay up.

8. Ticketmaster (40 million individuals)

In May 2024, data loss affected one of the world’s biggest entertainment companies. Ticketmaster admitted that thieves had extracted data relating to 40 million customers, making it one of the largest breaches in the entertainment sector.

The 1.3TB data haul included identifiable information and earned the attackers around $500,000 within weeks, which is not bad for a few days’ work.

What data types were involved? Attackers stole personal data, including customer names and addresses, payment data, and purchase histories. This unique information is a big deal as it can be used in identity theft and targeted phishing attacks.

How did it happen? Cyberattackers from the ShinyHunters group accessed the Ticketmaster network via a vulnerability in the customer service portal. They then searched for customer data and extracted everything they needed.

The initial vulnerability involved Snowflake’s hosting infrastructure. Attackers hijacked a cloud hosting account, gained access, and used hosting privileges to access a client database. This should concern any organization reliant on cloud hosting.

9. Evolve Bank (7.6 million individuals)

Finance is coming under intense pressure from cyberattackers, as the May 2024 Evolve Bank attack shows. The banking-as-a-service provider reported the security incident in July, describing a classic ransomware scenario.

Attackers accessed the bank’s network, extracted data, and threatened to sell it. When Evolve refused to pay, the cybercriminals followed through, exposing millions of accounts.

According to the bank, attackers did not directly access customer funds (a common feature of 2024 ransomware attacks). Experts attributed responsibility to LockBit, who has had a busy and productive year.

What data types were involved? LockBit always seeks certain data types above others. In the Evolve attack, exposed data included social security numbers, details of financial accounts, and postal addresses.

How did it happen? LockBit tends to launch attacks via ransomware-as-a-service kits. The attack method for Evolve is not known. In the past, LockBit has paid insiders to allow access, exploited VPN vulnerabilities, and compromised cloud infrastructure.

10. Dell (49 million customers and 10,000 employees)

Data breaches affect small startups and veteran companies alike. Few tech companies are as experienced as Dell. Nonetheless, the hardware giant fell victim to two catastrophic breaches in 2024.

In May, Dell admitted losing 49 million customer records between 2017 and 2024. According to the company, the attack did not include personal or financial data but did compromise personal addresses and purchase histories.

In September, a second incident emerged. This time, hackers extracted 3.5GB of confidential employee data.

This attack only affected 10,000 people, but the small number of victims is deceptive. Information about employees is invaluable for phishers seeking to compromise corporate assets. And the data extracted is exactly what they need.

What data types were involved? The first incident exposed previous purchases, home addresses, and customer names. Dell says that the attack did not involve financial data and SSNs.

The second attack included employees’ phone numbers and social security numbers, employee IDs, and their status. It also included data about partners, not just Dell workers.

How did it happen? Details are unclear. Most probably, threat actors posed as IT support, tricking staff into sharing VPN credentials. We know the incidents were revealed by a hacker named “grep,” who claimed to be selling personal data. Experts believe attackers gained access via Atlassian vulnerabilities.

11. Tile (66 million individuals)

Tile is a device tracking service that should improve user security. However, in June, the parent company Life360 admitted to a massive data breach involving Tile’s customer support platform.

Attackers followed the ransomware playbook, demanding a ransom from Life360. Life360 has not disclosed whether it paid.

What data types were involved? The good news is the breach did not include user location data. Unfortunately, hackers extracted customer names, home addresses, email addresses, and phone numbers.

How did it happen? Hackers used a previous employee’s credentials to access a Tile feature designed for law enforcement officers. This provided access to Life360’s data storage systems, potentially allowing attackers to extract personal information about every Tile user.

It appears that Tile lacked effective multi-factor authentication systems. The company may have failed to remove inactive accounts with administrative privileges, leaving the door wide open.

12. Snowflake (Unknown)

We’ve left Snowflake for last as it is like the “mother of all data breaches” in 2024. Snowflake is a major cloud data hosting company specializing in data processing and analysis. It has grown rapidly in the era of Big Data and AI. However, growth and cybersecurity may not be in sync.

As we’ve already seen, Snowflake was involved in some of 2024’s biggest corporate data breaches, including attacks on AT&T and Ticketmaster. In each case, a hacker known as UNC5537 claimed responsibility.

UNC5537’s task was shockingly simple. All it took to steal data from some of the world’s biggest companies was a few stolen credentials. What’s more, the stolen credentials weren’t fresh. Some had been on sale illegally for years.

What data types were involved? Everything. The attack extended to Ticketmaster, AT&T, Santander, AllState, Mitsubishi, and Anheuser-Busch.

How did it happen? Attackers accessed unencrypted user credentials on a Jira instance by exploiting an unsecured device. After that, they used the credentials to access Snowflake’s cloud environment. None of the stolen accounts had MFA enabled, making access simple.

Looking ahead: what might 2025 bring?

In 2024, we dealt with many types of cyber attacks. In 2025, we will most likely see more ransomware attacks, but against a new set of targets.

As the Snowflake attacks show, cloud deployments are a primary target. SaaS vendors need to strengthen their defenses and master access controls. That’s particularly important as AI becomes integrated into cloud operations.

The Snowflake attack exploited reliance on third-party data analysis resources. Many companies also rely on external partners to leverage LLMs and integrate with operational systems. These partners could easily become victims in 2025.

Whatever cybersecurity trends 2025 brings, now is a good time to improve your cybersecurity posture. NordLayer can help you avoid data breaches in the New Year and beyond. 

Our Business VPN and access management tools shield data, secure remote connections, and filter access requests. With our security solutions in your corner, such as traffic encryption and multi-factor authentication (MFA), you can avoid Snowflake-style vulnerabilities and ruin the chances of opportunist data thieves.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×