Last Year Data Breaches Cost Almost Half a Billion Dollars with over 800 Million Records Compromised

Posted on July 16th, 2014 by Dan Rampe

The Economist

More than Enough Material to Merit a Special Report, “Defending the Digital Frontier” by the Legendary British Journal, The Economist

If your Economics 101 class was anything like the ones many of us had to endure, just the word, “economist”, is enough to have you racing to the closest Starbucks for a double Venti. Fortunately, The Economist’s report is a lot livelier than that economics class back in the day — likely one of the reasons the publication’s been around since 1843.

Anyway, The Economist’s just released “Defending the Digital Frontier” (You may find the complete report by clicking this link.), which explores everything from possible remedies to the different types of hackers, their motives and modes of operation and why they can be so difficult to track.

Tracing the exact source of an attack can be next to impossible if the assailants want to cover their tracks.

Over the past decade or so various techniques have been developed to mask the location of web users. For example, a technology known as Tor anonymizes internet connections by bouncing data around the globe, encrypting and re-encrypting them until their original sender can no longer be traced.

Conversely, some hackers are only too happy to let the world know what they have been up to. Groups such as Anonymous and LulzSec hack for fun (“lulz” in web jargon) or to draw attention to an issue, typically by defacing websites or launching distributed-denial-of-service (DDoS) attacks… Anonymous also has a track record of leaking e-mails and other material from some of its targets.

Criminal hackers are responsible for by far the largest number of attacks in cyberspace and have become arguably the biggest threat facing companies. Some groups have organized themselves so thoroughly that they resemble mini-multinationals. The police found that [one] group was paying salaries to its staff and had hired a marketing director to tout its software to hackers. It even maintained a customer-support team.

The report also argues that there is a need to provide incentives to improve cybersecurity.

One idea is to encourage internet-service providers (ISPs), or the companies that manage internet connections, to shoulder more responsibility for identifying and helping to clean up computers infected with malicious software (malware). Another is to find ways to ensure that software developers produce code with fewer flaws in it so that hackers have fewer security holes to exploit.

An additional reason for getting tech companies to give a higher priority to security is that cyberspace is about to undergo another massive change. Over the next few years billions of new devices, from cars to household appliances and medical equipment, will be fitted with tiny computers that connect them to the

web and make them more useful. Dubbed “the Internet of things”, this is already making it possible, for example, to control home appliances using smartphone apps and to monitor medical devices remotely.”

And the report contains a number of fascinating anecdotes.

One night in April a couple in Ohio was [awakened] by the sound of a man shouting, “Wake up, baby!” When the husband went to investigate, he found the noise was coming from a web-connected camera they had set up to monitor their young daughter while she slept. As he entered her bedroom, the camera rotated to face him and a string of obscenities poured forth.

The webcam was made by a company called Foscam, and last year a family in Houston had a similar experience with one of their products. After that episode, Foscam urged users to upgrade the software on their devices and to make sure they had changed the factory-issued password. The couple in Ohio had not done so. The problem arose even though Foscam had taken all the right steps in response to the initial breach, which shows how hard it is to protect devices hooked up to the internet.

ThreatMetrix® builds trust on the Internet by offering market-leading advanced fraud prevention and frictionless context-based security solutions. These solutions authenticate consumer and workforce access to mission critical applications using real-time identity and access analytics that leverage the world’s largest trusted identity network.

ThreatMetrix secures enterprise applications against account takeover, payment fraud, fraudulent account registrations, malware, and data breaches. Underpinning the solution is the ThreatMetrix® Global Trust Intelligence Network, which analyzes over 500 million monthly transactions and protects more than 160 million active user accounts across 2,500 customers and 10,000 websites.

The ThreatMetrix solution is deployed across a variety of industries, including financial services, enterprise, e-commerce, payments, social networks, government and insurance.

For more information, visit www.threatmetrix.com or call 1-408-200-5755.

Join the cybersecurity conversation by visiting the ThreatMetrix blogFacebookLinkedIn and Twitter pages.

 

 

Hacker Claims Major Intrusions to Government Agencies. FBI Agrees.

Posted on December 17th, 2013 by Dan Rampe

DOE

Hacker Lauri Love brags in an email to a colleague that he and others from Anonymous hacked into “stuff [that’s] really sensitive. It’s basically every piece of information you’d need to do full identity theft on any employee or contractor” for the breached agency. Then again, as the old saying goes, it’s not bragging if you can actually do it. And a look at the FBI memo quoted in Dan Goodin’s story on arstechnical.com is a strong indication the FBI didn’t think for a moment Love was bragging. “The majority of the intrusions have not yet been made publicly known,” the memo stated. “It is unknown exactly how many systems have been compromised, but it is a widespread problem that should be addressed.”

And an email cited in a Reuters’ story from Energy Secretary Ernest Moniz’s chief of staff, Kevin Knobloch described the scope of the breaches. He said compromised data included data on approximately 2,000 bank accounts and personal information on at least 104,000 employees, contractors, family members, and others associated with the Department of Energy.

In addition to the Department of Energy, Love, a British resident, has been indicted on charges that he hacked into databases belonging to the Department of Energy, the Department of Health and Human Services, the US Sentencing Commission, et al.

In a series of attacks the FBI believed began almost a year ago, Love, say prosecutors, exploited a flaw in Adobe’s ColdFusion Web application development software to install backdoors that allowed him and others to return to steal data. Illegal access was gained to thousands of computer systems belonging to the U.S. government and others. And Love and others were able to download massive quantities of data allegedly resulting in millions of dollars in damages to victims.

According to Reuters, an Adobe spokesperson said the vulnerabilities in ColdFusion had already been fixed in newer releases.

ThreatMetrix secures Web transactions against account takeoverpayment fraudidentity spoofing, malware, and data breaches. The ThreatMetrix Global Trust Intelligence Network, which analyzes 500 million monthly transactions, provides context-based authentication and Web fraud prevention to help companies accelerate revenue, reduce costs and eliminate friction. ThreatMetrix protects more than 1,900 customers and 9,000 websites across a variety of industries, including financial servicesenterprisee-commerce, payments, social networks, government, and insurance. For more information, visit www.threatmetrix.com or call 1-408-200-5755.

Join the cybersecurity conversation by visiting the ThreatMetrix blogFacebookLinkedIn and Twitter pages.