Don't Be a Target!

Post on 13-Jun-2015

476 views 2 download

description

For the last few months we've watched with fascination the developing story of the data breach at Target, Neiman Marcus, Michael's and others. In this session we'll take a look at how the thieves accomplished this feat including what they do with their takings, how it might have been prevented, and why the bank may not care all that much. Along the way you'll learn ways to secure your own information so your business doesn't become the next Target. Post-mortem of the Target data breach, with tips for avoiding becoming the next victim. Created for SQL Saturday 287 in Madison, WI.

Transcript of Don't Be a Target!

Stealing Home… Depot f/k/a Don’t Be a Target! Post-Mortem of the latest data breaches, with tips to help you avoid becomingthe next Target, Kmart, Dairy Queen,Home Depot.

Don’t Be a Target!

Eric SeljeMadison, WI

@EricSelje

Salty Dog Solutions, LLC

Database Developer

General IT Guy

10/17/14 © Eric Selje2 | 2 |

© Eric Selje3/29/14|3 |

© Eric Selje3/29/14|4 |

© Eric Selje3/29/14|5 |

© Eric Selje3/29/14|6 |

© Eric Selje3/29/14|7 |

© Eric Selje3/29/14|8 |

© Eric Selje3/29/14|9 |

“RAM Scraping”

© Eric Selje3/29/14|10 |

© Eric Selje3/29/14|11 |

© Eric Selje3/29/14|12 |

© Eric Selje3/29/14|13 |

© Eric Selje3/29/14|14 |

© Eric Selje3/29/14|15 |

© Eric Selje3/29/14|16 |

© Eric Selje3/29/14|17 |

© Eric Selje

Lesson: Know your Scams

And share what you know with everybody, including your pointy-haired boss.

3/29/14|18 |

© Eric Selje

Lesson: Don’t be a Fazio!

You are only as secure as your subcontractors and or third-party vendors, and your clients are only as secure as you are!

If you’re a consultant/subcontractor/vendor, Don’t be a Fazio.

Keep yourself covered.

3/29/14|19 |

© Eric Selje3/29/14|20 |

© Eric Selje

Lesson: Don’t Cross the Streams

3/29/14|21 |

© Eric Selje

Lesson: Segment Your Network

3/29/14|22 |

© Eric Selje3/29/14|23 |

© Eric SeljeOctober 14|24 |

© Eric Selje3/29/14|25 |

© Eric Selje

Lesson: Know What’s Running on Your Servers

3/29/14|26 |

© Eric Selje3/29/14|27 |

© Eric Selje3/29/14|28 |

© Eric Selje3/29/14|29 |

© Eric Selje3/29/14|30 |

© Eric Selje3/29/14|31 |

© Eric Selje

http://rescator.so

3/29/14|32 |

© Eric Selje

Warning!

3/29/14|33 |

© Eric Selje

http://rescator.su

3/29/14|34 |

© Eric Selje3/29/14|35 |

McDumpals.me

© Eric Selje3/29/14|36 |

© Eric Selje3/29/14|37 |

© Eric Selje3/29/14|38 |

© Eric Selje3/29/14|39 |

© Eric Selje3/29/14|40 |

© Eric Selje3/29/14|41 |

© Eric Selje3/29/14|42 |

© Eric Selje3/29/14|43 |

© Eric Selje3/29/14|44 |

© Eric Selje

Summary (Lessons Learned)

Don’t be a Fazio! Make sure you and your vendors are secure

Keep abreast of the latest scams (and share!)

Least Privilege Principle Segment Your Network (Don’t Cross the

Streams) Know What’s Running on Your Servers Separate Signal from Noise, and pay

attention to the signals

3/29/14|45 |

© Eric Selje3/29/14|46 |

© Eric Selje

Resources

http://www.jupiterbroadcasting.com/51107/targeting-the-hvac-techsnap-148/ @allanjude @chrisLAS https://www.cs.columbia.edu/~smb/blog/2014-02/2014-02-05.html http://krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvac-company/ http://www.infrasupport.com/target-get-on-the-ball-with-this-data-breach/ http://online.wsj.com/news/articles/SB10001424052702304703804579381520736715690 http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/An-evolution-of-BlackPOS-malware/

ba-p/6359149#.Uy9FvFeo11k

http://www.informationweek.com/security/attacks-and-breaches/target-breach-8-facts-on-memory-scraping-malware/d/d-id/1113440

http://security.stackexchange.com/questions/46319/why-emv-cards-cannot-be-cloned http://

www.npr.org/blogs/alltechconsidered/2014/01/23/264910138/target-hack-a-tipping-point-in-moving-away-from-magnetic-stripes

http://www.xylibox.com/2012/03/pos-carding.html http://www.slideshare.net/AlertLogic/the-target-breach-anatomy-of-an-attack Photograph of Henry Adams writing at desk by Marian Hooper Adams (1843–1885)

(Massachusetts Historical Society) [Public domain], via Wikimedia Commons3/29/14|47 |