The Investigators' Resource Centre Blog was developed to address the need for a comprehensive set of tools for the Private Investigation, Intelligence community and Security industry. Expanding from our quarterly newsletter, this blog will allow our followers a more dynamic and interactive forum for exchange of resources and information.
Friday, February 17, 2012
Thursday, February 16, 2012
The 15 worst data security breaches of the 21st Century
Data security breaches happen daily in too many places at once to
keep count. But what constitutes a huge breach versus a small one? For
some perspective, we take a look at 15 of the biggest incidents in
recent memory. Helping us out are security practitioners from a variety
of industries, including more than a dozen members of LinkedIn's Information Security Community, who provided nominations for the list.
By Taylor Armerding
- 1. Heartland Payment Systems
- Date: March 2008
- Impact: 134 million credit cards exposed through SQL injection to install spyware on Heartland's data systems.
- 2. TJX Companies Inc.
- Date: December 2006
- Impact: 94 million credit cards exposed. There are conflicting accounts about how this happened. One supposes that a group of hackers took advantage of a weak data encryption system and stole credit card data during a wireless transfer between two Marshall's stores in Miami, Fla. The other has them breaking into the TJX network through in-store kiosks that allowed people to apply for jobs electronically. According to KNOS Project cofounder and chief architect Kevin McAleavey, this was possible because TJX's network wasn't protected by any firewalls. Albert Gonzalez, hacking legend and ringleader of the Heartland breach, was convicted and sentenced to 40 years in prison, while 11 others were arrested.
- 3. Epsilon
- Date: March 2011
- Impact: Exposed names and e-mails of millions of customers stored in more than 108 retail stores plus several huge financial firms like CitiGroup Inc. and the non-profit educational organization, College Board.
- 4. RSA Security
- Date: March 2011
- Impact: Possibly 40 million employee records stolen.
- 5. Stuxnet
- Date: Sometime in 2010, but origins date to 2007
- Impact: Meant to attack Iran's nuclear power program, but will also serve as a template for real-world intrusion and service disruption of power grids, water supplies or public transportation systems.
- 6. Department of Veterans Affairs
- Date: May 2006
- Impact: An unencrypted national database with names, Social Security numbers, dates of births, and some disability ratings for 26.5 million veterans, active-duty military personnel and spouses was stolen.
- 7. Sony's PlayStation Network
- Date: April 20, 2011
- Impact: 77 million PlayStation Network accounts hacked; Sony is said to have lost millions while the site was down for a month.
- 8. ESTsoft
- Date: July-August 2011
- Impact: The personal information of 35 million South Koreans was exposed after hackers breached the security of a popular software provider.
- 9. Gawker Media
- Date: December 2010
- Impact: Compromised e-mail addresses and passwords of about 1.3 million commenters on popular blogs like Lifehacker, Gizmodo, and Jezebel, plus the theft of the source code for Gawker's custom-built content management system.
- 10. Google/other Silicon Valley companies
- Date: Mid-2009
- Impact: Stolen intellectual property
- 11. VeriSign
- Date: Throughout 2010
- Impact: Undisclosed information stolen
- 12. CardSystems Solutions
- Date: June 2005
- Impact: 40 million credit card accounts exposed. CSS, one of the top payment processors for Visa, MasterCard, American Express is ultimately forced into acquisition.
- 13. AOL
- Date: August 6, 2006
- Impact: Data on more than 20 million web inquiries, from more than 650,000 users, including shopping and banking data were posted publicly on a web site.
- 14. Monster.com
- Date: August 2007
- Impact: Confidential information of 1.3 million job seekers stolen and used in a phishing scam.
- 15. Fidelity National Information Services
- Date: July 2007
- Impact: An employee of FIS subsidiary Certegy Check Services stole 3.2 million customer records including credit card, banking and personal information.
By Taylor Armerding
http://www.csoonline.com
Tuesday, February 14, 2012
Nortel hit by suspected Chinese cyberattacks for a decade
Chinese hackers had access to Nortel files for nearly a decade, the Wall Street Journal reported on Tuesday (Nathan Denette/Canadian Press)
___________________________________________________________________________
Hackers based in China enjoyed widespread access to Nortel's computer network for nearly a decade, according to a report.
The hackers – who appeared to be based in China – had unfettered access to the former telecommunications giant as far back as 2000, according to Brian Shields, a former Nortel employee who launched an internal investigation of the attacks, the Wall Street Journal reports.
They “had access to everything”, Shields told the Journal. “They had plenty of time. All they had to do was figure out what they wanted.”
Over the years, the hackers downloaded business plans, research and development reports, employee emails and other documents.
According to the internal report, Nortel “did nothing from a security standpoint” about the attacks.
Corporate espionage is a growing problem for North American companies, with the majority of attacks coming from China.
Last
November, a group of U.S. analysts said there were as many as 12
different Chinese groups participating in cyberattacks on U.S. companies
and government agencies.
China has rejected allegations of cyberspying, saying it is also a target of attacks.
The long-term attack on Nortel isn’t the only time a Canadian company has been targeted by hackers.
During BHP Billiton’s hostile takeover bid for Saskatchewan’s PotashCorp, hackers traced to China targeted Bay Street law firms and other companies to get insider information on the $38-billion corporate takeover.
Those same hackers also targeted Canadian government computers in fall 2010, targeting the Finance Department, the Treasury Board, and Defence Research and Development Canada, a civilian agency of the Department of National Defence.
During the investigation, the telecom giant made no effort to determine if any of its products were compromised. Nortel, as a publicly traded company, would have been required by the U.S. Securities and Exchange Commission to disclose any “material” risks to investors.
According to Shields, Nortel discovered the hacking in 2004, and the company’s silence put acquiring companies at risk. Three former Nortel executives are currently on trial for allegedly tampering with quarterly results in order to trigger millions of dollars in bonus payments.
With files from The Associated Press
The hackers – who appeared to be based in China – had unfettered access to the former telecommunications giant as far back as 2000, according to Brian Shields, a former Nortel employee who launched an internal investigation of the attacks, the Wall Street Journal reports.
They “had access to everything”, Shields told the Journal. “They had plenty of time. All they had to do was figure out what they wanted.”
Over the years, the hackers downloaded business plans, research and development reports, employee emails and other documents.
According to the internal report, Nortel “did nothing from a security standpoint” about the attacks.
Corporate espionage is a growing problem for North American companies, with the majority of attacks coming from China.
China rejects cyberspying allegations
Last
November, a group of U.S. analysts said there were as many as 12
different Chinese groups participating in cyberattacks on U.S. companies
and government agencies.China has rejected allegations of cyberspying, saying it is also a target of attacks.
The long-term attack on Nortel isn’t the only time a Canadian company has been targeted by hackers.
During BHP Billiton’s hostile takeover bid for Saskatchewan’s PotashCorp, hackers traced to China targeted Bay Street law firms and other companies to get insider information on the $38-billion corporate takeover.
Those same hackers also targeted Canadian government computers in fall 2010, targeting the Finance Department, the Treasury Board, and Defence Research and Development Canada, a civilian agency of the Department of National Defence.
Nortel attacks went unreported
Nortel, currently selling off assets as part of a 2009 bankruptcy filing, failed to disclose the attacks to potential buyers of its patents and business units, according to the Journal.During the investigation, the telecom giant made no effort to determine if any of its products were compromised. Nortel, as a publicly traded company, would have been required by the U.S. Securities and Exchange Commission to disclose any “material” risks to investors.
According to Shields, Nortel discovered the hacking in 2004, and the company’s silence put acquiring companies at risk. Three former Nortel executives are currently on trial for allegedly tampering with quarterly results in order to trigger millions of dollars in bonus payments.
With files from The Associated Press
Thursday, February 9, 2012
Satellite Phones Hacked! – Eavesdropping On James Bond
Researchers at a university in Germany have used open-source software
to crack the encryption key for satellite telephones in about an hour.
The team bought two readily-available sat phones and downloaded firmware updates for them. The updates revealed the encryption on the sat phones was not much different from regular cell phone GSM encryption, which has been cracked in the past. From there, it did not take much to crack the sat phone encryption.
In some regions of the world standard cell phone communication is still not available. In war zones, developing countries and on the high seas, satellite phones are used instead. Here, the telephone is connected via radio directly to a satellite. This passes the incoming call to a station on the ground. From there, the call is fed into the public telephone network. So far this method was considered secure.
Encryption algorithms are implemented to protect the privacy of the user. There is, as yet, no alternative to the current standards. Since users cannot rely on their security against interception, similar to the security of standard cell phones, they will have to wait for the development of new technologies and standards, or make use of other means of communication for confidential calls.
By Mike Tuttle · February 8, 2012
The team bought two readily-available sat phones and downloaded firmware updates for them. The updates revealed the encryption on the sat phones was not much different from regular cell phone GSM encryption, which has been cracked in the past. From there, it did not take much to crack the sat phone encryption.
In some regions of the world standard cell phone communication is still not available. In war zones, developing countries and on the high seas, satellite phones are used instead. Here, the telephone is connected via radio directly to a satellite. This passes the incoming call to a station on the ground. From there, the call is fed into the public telephone network. So far this method was considered secure.
Encryption algorithms are implemented to protect the privacy of the user. There is, as yet, no alternative to the current standards. Since users cannot rely on their security against interception, similar to the security of standard cell phones, they will have to wait for the development of new technologies and standards, or make use of other means of communication for confidential calls.
By Mike Tuttle · February 8, 2012
Subscribe to:
Posts (Atom)