Category Archives: Security

Verizon 2009 Data Breach Report

Verizon has released their 2009 Data Breach Investigations Report. Perhaps someone can recommend a new name for next year so we don’t have to say “did you see DBIR?” This is pronounced “Da Bear” and seems to start all kinds of references to Chicago sports.

Back to the point, the numbers are up, as most security professionals probably already knew and expected:

The percentage of breaches in our caseload involving financial service organizations, targeted attacks, and customized malware all doubled in 2008. It’s sure to win me the “Captain Obvious Award” from the Securitymetrics list, but organized crime activity increased and was responsible for over 90% of the 285 million records compromised. The scales continue to tilt more and more toward servers and applications as the point of compromise.

Here are some key points I noted:

Verizon continues to maintain a vast majority (74%) of data breaches originate from external sources, yet the “involved multiple parties” category grew nearly 10%.

Almost all (98%) of the breaches were related to a misconfiguration (mistake), hacking, or malware installed to collect data. Speaking of mistakes, I have to point out Figure 11 on page 15:

Oh, well. Nothing like a mistake within a report on mistakes.

More seriously, there is significant growth in the malware development community. You might say this is an obvious trend in an industry where writing malware now generates large amounts of cash. Nine out of ten records exposed are due to malware and yet only one-third of incidents involved malware.

Default credentials (third-party remote access) and application-level attacks on the database were the most effective attack vectors used to place the malware. This makes sense if the systems with data are still targeted. If those systems become more secure, then I suspect the attacks will come more through phishing, attachments and other social engineering efforts. Right now, however, malware is installed by the attackers themselves 90% of the time. Keyloggers and spyware are the most common, followed by backdoor/shell, and then capture/store data software.

Note that a small percentage of attacks (17%) considered to be “highly difficult” accounted for nearly all (95%) of the records breached.

The large number of breaches and exposure of cardholder data seems to be having an effect on economics of the underground:

…market saturation has driven the price down to a point where magnetic-stripe information is close to worthless. The value associated with selling stolen credit card data have dropped from between $10 and $16 per record in mid-2007 to less than $0.50 per record today.

Verizon says this comes from data collected by their underground intelligence operations. I wonder why do they call it underground. Intelligence operations would have the same meaning, but maybe they want to distinguish themselves as dedicated to monitoring only the underground as opposed to law-abiding citizens.

PIN data is now highly targeted, and has many issuers scratching their head, as we know from the RBS Worldpay, Citibank/7-11 and related cases. Verizon suggests this is a natural evolution based on the deflated value of cards and higher value of PINs.

The higher value commanded by PIN data has spawned a cycle of innovation in attack methodologies. Criminals have reengineered their processes and developed new tools—such as memory-scraping malware—to steal this valuable commodity. This has led to the successful execution of complex attack strategies previously thought to be only theoretically possible.

This is an interesting problem. Either security has failed to the point where cardholder data has flooded the market, driving down prices and thus forcing criminals to seek more valuable data such as PIN…or security has worked on cardholder data and so criminals have had to shift to PIN data to steal money/goods.

Two-thirds of the breaches were never publicly reported, but are included in the study:

At the time of this writing, about a third of the breaches investigated by our team last year are publicly disclosed. More, especially those toward the end of the year, are likely to follow. Others will likely remain unknown to the world as they do not fall under any legal disclosure requirements.

Oh, this is just begging regulators to start investigating and to create more laws. Two-thirds is a high percentage to call an official breach yet never disclose.

Unlike the datalossdb.org information, Verizon says 31% of breaches were in retail and 30% were in financial services. The latter is said to have doubled its percentage since last year. Does this reflect Verizon’s customer profile more than neutral market data?

The increase of data breaches in the financial sector is indicative of recent trends in cybercriminal activity highlighted in the “State of Cybercrime” section. As will be discussed throughout this report, financial services firms were singled out and fell victim to some very determined, very sophisticated, and—unfortunately—very successful attacks in 2008. This industry accounted for 93 percent of the over 285 million records compromised. This finding reflects a few very large breaches investigated by our IR team in the past year.

That says both the financial sector was targeted more in the shift-to-PIN trend mentioned above, and financial services breaches are large, but also that it was who Verizon worked with more often. I think another way of saying this is that retailers represented the breach when it targeted acquiring banks, but issuing banks are categorized as financial services, so issuers are officially sharing in the 60% of all breaches landscape. The other 40% of breaches seem to be related to travel and products.

Insider breaches, although lower in frequency (11%), appear to expose more records per incident (100,000 median) than external breaches (43% with a median of almost 40,000). With that in mind, total records exposed by only external sources was more than two hundred times greater (267mil) than only internal sources (1.3mil). This is due to the average of external source breaches running nearly 6mil. Verizon takes this, tries to characterize it in terms of likelihood and impact, and concludes that things are “exactly opposite” from prior years:

The threats are said to be predominantly from East Europe and East Asia. If you include North America, you have 82% of all attack sources, although a large majority of investigations stopped with an IP and never assigned geographic data. Likewise, attacks are usually not traced to a specific entity but about 20 percent still were found to be known organized crime.

Insider attacks came as often a regular user as an administrator. I say this does not bode well for administrators, although Verizon seems to think they are proving why we should not “infer administrators acted more deliberately and maliciously”. Administrator attacks should be assumed much lower than user, if you ask me, but maybe that’s because I still think of administrators as those you would hold to a higher standard before giving them access. A user could be anyone. In any case, delays in shutting down access were said to be the attack vector.

Verizon says the vast majority of attacks are at the application level. Yet, for all the noise on cross site scripting attacks in recent years, the data shows that default credentials are still by far the biggest problem, followed by SQL attacks. XSS is barely even on the charts. This is echoed by the fact that breaches that exploited known vulnerabilities involved patches available for more than a year. The data provided makes it look as though if you can patch within six months, you would not appear in the Verizon report. Perhaps most dramatic is the claim that they saw only one wireless exploit for all of 2008.

I thought it interesting that the highest percentage of breaches by software was split 30/30 between POS and DB with application servers at 12%, yet percentage of total records was split 75/19 between DB and application servers. Thus, POS were often breached but only accounted for 6% of all records. This makes sense as the POS should be wiped of data immediately after authorization and only hold a small subset of transactions. Web servers, just to make a point, were ten percent of all breaches but disclosed 0.004% of records. Begs the question of why it was not 0%, since web servers do not store data. This also makes me question Verizon’s claim that “Our data set…is comprised only of incidents in which an actual breach occurred.” Laptops account for 4% of breaches and have 0.000% of records. Why are laptops included then?

The unknowns section actually surprised me. I thought unknown assets were a frequent problem, such as in the FAA breach. However, Verizon suggests unknown data is a bigger issue, followed by unknown privileges and then connections. In other words, people know they have an asset, but usually do not know it has regulated data, often do not know what accounts have access, and sometimes do not know who can connect to it.

Another surprise was this comment:

In the large majority of cases, it was the lax security practices of the third party that allowed the attack. It should not come as a surprise that organizations frequently lack measures to provide visibility and accountability for partner-facing systems.

Lack measures or lack incentive? My experiences have always been that IT organizations love to assume third party systems will take care of themselves even when they known it not to be the case. This is like a form of liability transfer with no documentation. When the chips are down, this continues with people claiming the third party should have known, done a better job, and so forth. The job of the security organization is often to point out that third parties and partners are not doing anything they said they would, or haven’t a clue with regard to risk, and to try and find someone who will take responsibility for the relationship. This latter step is often the core issue. Many regulators are getting wise to this ruse and assigning a formal liability statement to those who use partners, so ambiguity and excuses will be less convenient. For example the ARRA/HITECH of 2009 clamped HIPAA rules directly onto treatment of business associates, whereas before HIPAA only applied to regulated entities themselves.

The recommendations seem straightforward, but perhaps they could have organized it by PCI priority/requirement instead of creating a new list. I mean they do not even mention removing data, which is clearly an essential step to avoiding a breach:

1. Changing default credentials is key
2. Avoid shared credentials
3. User account review
4. Application testing and code review
5. Smarter patch management strategies
6. Human resources termination procedures
7. Enable application logs and monitor them
8. Define “suspicious” and “anomalous” (then look for whatever “it” is)

Finally, there is interesting data on the timing relative to breach and discovery. Rather than comment here I’ll likely do a webinar dedicated to this topic in the near future, as well as expand on the other comments above.

Flying on Algae

Spiegel Online interviewed a Boeing executive who says Algae Could ‘Supply Entire World with Aviation Fuel’

SPIEGEL ONLINE: One of the major points of concern is land use. Take, for example, jatropha, one possible source of biofuels. How many square kilometres of that plant would actually be necessary to fuel a flight over the Atlantic Ocean?

Glover: Good question, I never figured it out that way. We really do not expect that all of the world’s flights will be fuelled by jatropha plants exclusively.

SPIEGEL ONLINE: Than let us talk about algae. How big do these cultures need to be?

Glover: The optimists say, to supply the entire world with aviation fuel, you would perhaps need an area of the size of Belgium. We still need quite a bit of research and development work to really determine whether that is possible. So far, we are very pleasantly surprised by the innovation and the progress.

That is about 12,000 square miles (31,000 sq km) or about the size of the US state of Maryland, which seems like a tiny space in order to fuel all air transportation. I wonder how much total space is dedicated to coal and oil. The Sahara Desert is 8.6 million sq km so there is plenty of room available for such a scheme in a place no one will notice, another nice thing about biofuel compared with oil and coal. This also reminds me of the argument that solar panels in only 0.3 percent of the desert could meet all of Europe’s energy needs.

Somalia Targeted for Nation Building

Defense experts in the US are coming forward to suggest the piracy problem with Somalia might require something like stabilizing the country, DefenseLink reported yesterday.

Whether it’s humanitarian aide to Somalia or possible military training to Somalis, [Pentagon spokesman Bryan] Whitman said, there’s no shortage in ways and means the United States and international partners could approach the piracy issue and Somalia’s lack of a legitimate government. The pure size of the region presents difficulties, he added.

“Clearly, it’s a big challenge when you’re talking about a coastline and body of water as large as it is, and you’re dealing with a country that is largely ungoverned — that certainly is a complicating situation,” Whitman said.

I have mentioned before that the US most likely wanted to destabilize the region for purposes of keeping open access to suspected terrorists. In short, sovereignty of a newly forming Islamic state with historic animosity towards the US would have made strategic anti-terror missions far more difficult in the Horn. Thus, as Somalia was on the verge of stabilizing, the US appeared to undermine the new rulers rather than support them.

Fearing the influence of militant factions within the Islamic Courts, the United States backed a loose coalition of warlords who had the savvy to dub themselves the Alliance for the Restoration of Peace and Counterterrorism. Somali women took to the streets to protest the U.S. policy.

“Many women supported the Islamic Courts in Mogadishu because they received security,” said Alia Adem Abdi, who chairs the Hiran Women Action on Advocacy for Peace and Human Rights Organization, based in Somalia’s restive central Hiran region. “They had an access to move freely in the capital city. Also the children had access to go to school. But not now.”

Last Christmas, a weak Transitional Federal Government stormed Mogadishu with backing from neighboring Ethiopia and tacit support from the United States, sending the coalition of jihadis and militias who backed the Islamic Courts underground.

Perhaps the US did not anticipate the growth of an uncontrolled piracy market as a result of their alliance with Ethiopia and military operations in this region. On the other hand, perhaps the prior administration felt the the risks and side-effects to shipping were an acceptable cost for their anti-terror doctrine. In either case I see a change in policy regarding risk management and Islamic state relations, rather than a new approach to piracy as a result of the Maersk incident.

New Credit Card Security in America

Every time I speak at a PCI event someone in the audience asks when America will get more security controls for credit cards themselves. It is a valid question. The cards have not changed much in decades, while the threats clearly have grown exponentially. The most often cited reason I hear for America’s lack of security controls in cards is the cost of changing the infrastructure that reads them. Perhaps this was best expressed as a business decision where the cost of fraud was measured against the cost and benefits of securing the infrastructure. The balance has now tilted and Computerworld reports on new security measures as reinforcements for PCI.

Fifth Third is testing the use of magnetic-stripe technology to create unique digital fingerprints for each card. Dan Roeber, vice president and manager of merchant PCI compliance at the bank, said it has distributed about 1,000 new card readers to retailers that haven’t been told about the pilot project. The readers use data from the magnetic stripe on the back of cards to create a “DNA picture,” which is matched against baseline information during the transaction authorization process, Roeber added during a panel discussion at the Visa conference.

The argument for this first technology is that it avoids key management issues for end-to-end encryption, which many companies are still afraid to implement.

The pilot at OfficeMax involves a challenge-and-response technique being used to help authorize card transactions. The retailer is asking shoppers for information such as their ZIP codes, the last four digits of their phone numbers or their three-digit area codes. The responses are then matched against previously submitted answers, said William Van Orman, OfficeMax’s treasurer.

That sounds reasonable, except it is based on a clumsy system of managing secrets, very similar to the fear of key management in the prior case. ZIP codes, phone numbers, area codes…the easier the information to manage the less value in terms of secrecy.

A third option is advanced payment management services. I was recently called by the fraud-alert service to verify charges on my account. Although the service is nice, it seems rather expensive to have a personal call take place. That is why automation will soon take this over and we should see transaction “alerts” pushed in real-time to mobile devices. Imagine instead of taking your receipts home and plugging them into quicken manually, you get instant confirmation on your mobile accounting software when you use your credit card. If you do not recognize the charge, you can respond with a fraud alert notice yourself.