In the April 5, 2016 report by the Identity Threat Resourse Center (ITRC) there have been 227 breaches which have compromised 6,214,514 records containing personally identifiable information (PII). The ITRC tracks data breaches involving social security numbers, credit/debit card numbers, email/password/username records and protected health information (PHI).
It’s no secret this information is the new currency on the Dark Web. But let’s identify the how’s and why’s - and then what to do to avoid your information - both as an individual and as an organization from getting hacked.
Most of the studies indicate that data was acquired by insiders, aka: trusted environments that have physical devices like computers, tablets, phones, skimming devices, PoS, etc. How easy is it to en masse this data? One key logger on a Point-of-Sale (PoS) device can gather thousands of files before they are found out. ATM skimmers and cameras that record your credit card data accompanied by cameras recording your password on just a few ATMs will collect hundreds, of credit card numbers which will immediately be sold on the dark web.
Most stolen data is being sold in the Dark Web. But for how much? Here’s what the recent McAfee’s report, Hidden Data Economy estimates:
Bitglass, undertook an experiment in 2015 to understand what happens to sensitive data once it’s stolen. In the experiment, stolen data traveled the globe, landing in five different continents and 22 countries within two weeks. Overall, the data was viewed more than 1,000 times and downloaded 47 times; some activity had connections to crime syndicates in Nigeria and Russia.
I hope you are gasping. My intent is to horrify you. We cannot become complacent about being hacked. Just because your new credit card is over-nighted to you doesn’t mean there aren’t real life consequences for stolen data.
In 2015 over half of American adults had their personal information exposed - for those of us in this bucket (including me), it’s inconvenient, especially if you need to to recover your credit standing or regain your identity and not to mention the minor annoyances of auto renewal payments on Pandora, EZ-Pass, Netflix, etc. that will haunt you for 30+ days.
It’s not just credit card information for sale. On the Dark Web just about any information can be found, including free online accounts, including loyalty programs.
What’s the value? At face value, maybe it’s for the reward points. Digging deeper maybe it’s to profile targets of interest. Let me scare you a bit more. Let’s pretend we are watching Black List and Red needs to find and interrogate a U.S. Congressman. He can build an accurate profile by compiling data from the following loyalty programs: airline and hotel, gas and convenient store, Uber and Amtrak, fast food and coffee houses, and retail programs.
By having a key identifier, ie. personal email, Red knows, “Congressman Joe goes to Starbucks, corner of East and West everyday, orders a double espresso and then hops on Amtrak #7 Eastbound. He also goes to Subway for lunch between 2-3pm, corner of Smith and Weston. Every Sunday he stays home and binge watches Downton Abbey.”
Loyalty programs without an e-commerce component are an easy target to hack because they may not even use encryption. Simple child’s play in a hacker’s world.
On the Human Side:
On the Technology Side:
Be vigilant and keep watch of your finances, but not while while you’re using the free wifi at the coffee shop.
Be Safe – The Oldcommguy®
P.S. If your like me and don't click embedded links, here are the links to cut and paste in your browser:
http://www.idtheftcenter.org/images/breach/DataBreachReports_2016.pdf
https://blog.malwarebytes.org/cybercrime/2013/05/atm-and-point-of-sale-terminals-malware-the-bad-guys-just-never-stop/
http://www.mcafee.com/us/resources/reports/rp-hidden-data-economy.pdf
http://www.bitglass.com/
http://www.bitglass.com/company/news/press_releases/bitglasswheresyourdata
https://www.garlandtechnology.com/blog/slash-the-cost-of-a-security-breach-within-your-network
http://www.nytimes.com/interactive/2015/07/29/technology/personaltech/what-parts-of-your-information-have-been-exposed-to-hackers-quiz.html?_r=0
http://www.nbc.com/the-blacklist
https://www.garlandtechnology.com/blog/protect-your-network-know-your-baseline-traffic
If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.
If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.
While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.
Some of you may have noticed a flaw in the logic behind this solution! You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.
Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.
Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.
Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.