don't be a target!
DESCRIPTION
For the last few months we've watched with fascination the developing story of the data breach at Target, Neiman Marcus, Michael's and others. In this session we'll take a look at how the thieves accomplished this feat including what they do with their takings, how it might have been prevented, and why the bank may not care all that much. Along the way you'll learn ways to secure your own information so your business doesn't become the next Target. Post-mortem of the Target data breach, with tips for avoiding becoming the next victim. Created for SQL Saturday 287 in Madison, WI.TRANSCRIPT
Stealing Home… Depot f/k/a Don’t Be a Target! Post-Mortem of the latest data breaches, with tips to help you avoid becomingthe next Target, Kmart, Dairy Queen,Home Depot.
Don’t Be a Target!
Eric SeljeMadison, WI
@EricSelje
Salty Dog Solutions, LLC
Database Developer
General IT Guy
10/17/14 © Eric Selje2 | 2 |
© Eric Selje3/29/14|3 |
© Eric Selje3/29/14|4 |
© Eric Selje3/29/14|5 |
© Eric Selje3/29/14|6 |
© Eric Selje3/29/14|7 |
© Eric Selje3/29/14|8 |
© Eric Selje3/29/14|9 |
“RAM Scraping”
© Eric Selje3/29/14|10 |
© Eric Selje3/29/14|11 |
© Eric Selje3/29/14|12 |
© Eric Selje3/29/14|13 |
© Eric Selje3/29/14|14 |
© Eric Selje3/29/14|15 |
© Eric Selje3/29/14|16 |
© Eric Selje3/29/14|17 |
© Eric Selje
Lesson: Know your Scams
And share what you know with everybody, including your pointy-haired boss.
3/29/14|18 |
© Eric Selje
Lesson: Don’t be a Fazio!
You are only as secure as your subcontractors and or third-party vendors, and your clients are only as secure as you are!
If you’re a consultant/subcontractor/vendor, Don’t be a Fazio.
Keep yourself covered.
3/29/14|19 |
© Eric Selje3/29/14|20 |
© Eric Selje
Lesson: Don’t Cross the Streams
3/29/14|21 |
© Eric Selje
Lesson: Segment Your Network
3/29/14|22 |
© Eric Selje3/29/14|23 |
© Eric SeljeOctober 14|24 |
© Eric Selje3/29/14|25 |
© Eric Selje
Lesson: Know What’s Running on Your Servers
3/29/14|26 |
© Eric Selje3/29/14|27 |
© Eric Selje3/29/14|28 |
© Eric Selje3/29/14|29 |
© Eric Selje3/29/14|30 |
© Eric Selje3/29/14|31 |
© Eric Selje
http://rescator.so
3/29/14|32 |
© Eric Selje
Warning!
3/29/14|33 |
© Eric Selje
http://rescator.su
3/29/14|34 |
© Eric Selje3/29/14|35 |
McDumpals.me
© Eric Selje3/29/14|36 |
© Eric Selje3/29/14|37 |
© Eric Selje3/29/14|38 |
© Eric Selje3/29/14|39 |
© Eric Selje3/29/14|40 |
© Eric Selje3/29/14|41 |
© Eric Selje3/29/14|42 |
© Eric Selje3/29/14|43 |
© Eric Selje3/29/14|44 |
© Eric Selje
Summary (Lessons Learned)
Don’t be a Fazio! Make sure you and your vendors are secure
Keep abreast of the latest scams (and share!)
Least Privilege Principle Segment Your Network (Don’t Cross the
Streams) Know What’s Running on Your Servers Separate Signal from Noise, and pay
attention to the signals
3/29/14|45 |
© Eric Selje3/29/14|46 |
© Eric Selje
Resources
http://www.jupiterbroadcasting.com/51107/targeting-the-hvac-techsnap-148/ @allanjude @chrisLAS https://www.cs.columbia.edu/~smb/blog/2014-02/2014-02-05.html http://krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvac-company/ http://www.infrasupport.com/target-get-on-the-ball-with-this-data-breach/ http://online.wsj.com/news/articles/SB10001424052702304703804579381520736715690 http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/An-evolution-of-BlackPOS-malware/
ba-p/6359149#.Uy9FvFeo11k
http://www.informationweek.com/security/attacks-and-breaches/target-breach-8-facts-on-memory-scraping-malware/d/d-id/1113440
http://security.stackexchange.com/questions/46319/why-emv-cards-cannot-be-cloned http://
www.npr.org/blogs/alltechconsidered/2014/01/23/264910138/target-hack-a-tipping-point-in-moving-away-from-magnetic-stripes
http://www.xylibox.com/2012/03/pos-carding.html http://www.slideshare.net/AlertLogic/the-target-breach-anatomy-of-an-attack Photograph of Henry Adams writing at desk by Marian Hooper Adams (1843–1885)
(Massachusetts Historical Society) [Public domain], via Wikimedia Commons3/29/14|47 |