Don't Be a Target!

47
Stealing Home… Depot f/k/a Don’t Be a Target! Post-Mortem of the latest data breaches, with tips to help you avoid becoming the next Target, Kmart, Dairy Queen, Home Depot.

description

For the last few months we've watched with fascination the developing story of the data breach at Target, Neiman Marcus, Michael's and others. In this session we'll take a look at how the thieves accomplished this feat including what they do with their takings, how it might have been prevented, and why the bank may not care all that much. Along the way you'll learn ways to secure your own information so your business doesn't become the next Target. Post-mortem of the Target data breach, with tips for avoiding becoming the next victim. Created for SQL Saturday 287 in Madison, WI.

Transcript of Don't Be a Target!

Page 1: Don't Be a Target!

Stealing Home… Depot f/k/a Don’t Be a Target! Post-Mortem of the latest data breaches, with tips to help you avoid becomingthe next Target, Kmart, Dairy Queen,Home Depot.

Page 2: Don't Be a Target!

Don’t Be a Target!

Eric SeljeMadison, WI

@EricSelje

Salty Dog Solutions, LLC

Database Developer

General IT Guy

10/17/14 © Eric Selje2 | 2 |

Page 3: Don't Be a Target!

© Eric Selje3/29/14|3 |

Page 4: Don't Be a Target!

© Eric Selje3/29/14|4 |

Page 5: Don't Be a Target!

© Eric Selje3/29/14|5 |

Page 6: Don't Be a Target!

© Eric Selje3/29/14|6 |

Page 7: Don't Be a Target!

© Eric Selje3/29/14|7 |

Page 8: Don't Be a Target!

© Eric Selje3/29/14|8 |

Page 9: Don't Be a Target!

© Eric Selje3/29/14|9 |

“RAM Scraping”

Page 10: Don't Be a Target!

© Eric Selje3/29/14|10 |

Page 11: Don't Be a Target!

© Eric Selje3/29/14|11 |

Page 12: Don't Be a Target!

© Eric Selje3/29/14|12 |

Page 13: Don't Be a Target!

© Eric Selje3/29/14|13 |

Page 14: Don't Be a Target!

© Eric Selje3/29/14|14 |

Page 15: Don't Be a Target!

© Eric Selje3/29/14|15 |

Page 16: Don't Be a Target!

© Eric Selje3/29/14|16 |

Page 17: Don't Be a Target!

© Eric Selje3/29/14|17 |

Page 18: Don't Be a Target!

© Eric Selje

Lesson: Know your Scams

And share what you know with everybody, including your pointy-haired boss.

3/29/14|18 |

Page 19: Don't Be a Target!

© Eric Selje

Lesson: Don’t be a Fazio!

You are only as secure as your subcontractors and or third-party vendors, and your clients are only as secure as you are!

If you’re a consultant/subcontractor/vendor, Don’t be a Fazio.

Keep yourself covered.

3/29/14|19 |

Page 20: Don't Be a Target!

© Eric Selje3/29/14|20 |

Page 21: Don't Be a Target!

© Eric Selje

Lesson: Don’t Cross the Streams

3/29/14|21 |

Page 22: Don't Be a Target!

© Eric Selje

Lesson: Segment Your Network

3/29/14|22 |

Page 23: Don't Be a Target!

© Eric Selje3/29/14|23 |

Page 24: Don't Be a Target!

© Eric SeljeOctober 14|24 |

Page 25: Don't Be a Target!

© Eric Selje3/29/14|25 |

Page 26: Don't Be a Target!

© Eric Selje

Lesson: Know What’s Running on Your Servers

3/29/14|26 |

Page 27: Don't Be a Target!

© Eric Selje3/29/14|27 |

Page 28: Don't Be a Target!

© Eric Selje3/29/14|28 |

Page 29: Don't Be a Target!

© Eric Selje3/29/14|29 |

Page 30: Don't Be a Target!

© Eric Selje3/29/14|30 |

Page 31: Don't Be a Target!

© Eric Selje3/29/14|31 |

Page 32: Don't Be a Target!

© Eric Selje

http://rescator.so

3/29/14|32 |

Page 33: Don't Be a Target!

© Eric Selje

Warning!

3/29/14|33 |

Page 34: Don't Be a Target!

© Eric Selje

http://rescator.su

3/29/14|34 |

Page 35: Don't Be a Target!

© Eric Selje3/29/14|35 |

McDumpals.me

Page 36: Don't Be a Target!

© Eric Selje3/29/14|36 |

Page 37: Don't Be a Target!

© Eric Selje3/29/14|37 |

Page 38: Don't Be a Target!

© Eric Selje3/29/14|38 |

Page 39: Don't Be a Target!

© Eric Selje3/29/14|39 |

Page 40: Don't Be a Target!

© Eric Selje3/29/14|40 |

Page 41: Don't Be a Target!

© Eric Selje3/29/14|41 |

Page 42: Don't Be a Target!

© Eric Selje3/29/14|42 |

Page 43: Don't Be a Target!

© Eric Selje3/29/14|43 |

Page 44: Don't Be a Target!

© Eric Selje3/29/14|44 |

Page 45: Don't Be a Target!

© Eric Selje

Summary (Lessons Learned)

Don’t be a Fazio! Make sure you and your vendors are secure

Keep abreast of the latest scams (and share!)

Least Privilege Principle Segment Your Network (Don’t Cross the

Streams) Know What’s Running on Your Servers Separate Signal from Noise, and pay

attention to the signals

3/29/14|45 |

Page 46: Don't Be a Target!

© Eric Selje3/29/14|46 |

Page 47: Don't Be a Target!

© Eric Selje

Resources

http://www.jupiterbroadcasting.com/51107/targeting-the-hvac-techsnap-148/ @allanjude @chrisLAS https://www.cs.columbia.edu/~smb/blog/2014-02/2014-02-05.html http://krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvac-company/ http://www.infrasupport.com/target-get-on-the-ball-with-this-data-breach/ http://online.wsj.com/news/articles/SB10001424052702304703804579381520736715690 http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/An-evolution-of-BlackPOS-malware/

ba-p/6359149#.Uy9FvFeo11k

http://www.informationweek.com/security/attacks-and-breaches/target-breach-8-facts-on-memory-scraping-malware/d/d-id/1113440

http://security.stackexchange.com/questions/46319/why-emv-cards-cannot-be-cloned http://

www.npr.org/blogs/alltechconsidered/2014/01/23/264910138/target-hack-a-tipping-point-in-moving-away-from-magnetic-stripes

http://www.xylibox.com/2012/03/pos-carding.html http://www.slideshare.net/AlertLogic/the-target-breach-anatomy-of-an-attack Photograph of Henry Adams writing at desk by Marian Hooper Adams (1843–1885)

(Massachusetts Historical Society) [Public domain], via Wikimedia Commons3/29/14|47 |