Tag Archive for 2009

Lessons From A Mega Data Breach

Updated 04-05-09 Wired is reporting that on August 28, 2009, accused hacker, Albert Gonzalez accepted a plea agreement with federal prosecutors in Boston. According to the report’s Gonzalez has agreed to plead guilty to all the charges in a 19-count indictment and will face a sentence of 15 to 25 years for master-minding the mega data breach. He’s also agreed to forfeit nearly $3 million in cash as well as a Miami condo, a BMW car, a Tiffany diamond ring and three Rolex watches that he gave to others as gifts, a Glock 27 firearm seized from him at the time of his arrest and a 350C currency counter, among other items.

The agreement resolves the case against Gonzalez in Massachusetts — which charged him with hacking into TJX, Barnes & Noble, and OfficeMax — as well as a case in the eastern district of New York that charged him with hacking into the Dave & Busters restaurant change. There are still outstanding charges alleging that Gonzalez also hacked into Heartland Payment Systems, Hannaford Brothers, ATMs stationed in 7-11 stores, and two unnamed national retailers.

Gonzalez is scheduled to officially enter his plea at a court hearing on September 11. His lawyer, Rene Palomino, did not return calls seeking comment from the New York Times.

Updated 08-30-09 – On 08-24-09 The Financial Times reported that Gonzalez and crew penetrated a network linking 2,200 Citibank-branded ATMs kiosks inside 7-Eleven stores from late 2007 through to at least February 2008. The ATMs displayed Citibank’s logo. The network and the machines were owned by Texas-based CardTronics, which took in monthly fees from Citi. Reportedly the group lifted card and PIN codes from the system, and their allies manufactured new cards that were used to get about $2m in cash from Citibank ATMs elsewhere. An FBI affidavit said Yuriy Ryabinin of Brooklyn withdrew $750,000 from Citibank accounts in February 2008.

Lessons From A Mega Data BreachThe U.S. Department of Justice handed down an indictment in the Heartland Payment Services data breach on August 17, 2009.  The Heartland, data breach is the largest data theft on record in the U.S. The Feds allege that beginning in October 2006, 28-year-old Albert Gonzalez, aka “segvec,” “soupnazi,” and “j4guar17,” of Miami, FL, and his unnamed co-conspirators, in Russia and Virginia executed the Heartland data breach. This attack led to the theft of over 130 million credit and debit cards accounts. Gonzales faces two counts of conspiracy and conspiracy to engage in wire fraud.

Heartland Payment Systems data breach

accused hacker, Albert Gonzalez

In addition to stealing credit and debit card data from New Jersey-based Heartland Payment Systems; the conspirators also targeted 7-Eleven Inc., and Hannaford Brothers, a supermarket chain based in Maine, along with two other major national retailers whose names were withheld. According to the Government planning for the attacks began in 2006. The indictment says that in October of 2006, Gonzalez and his co-conspirators began to search for potential corporate victims by gathering intelligence such as the credit and debit card systems used by their targets.

7/11 data breach

In August 2007, 7-Eleven was hit with a SQL injection attack which resulted in an undetermined number of accounts being compromised. In November 2007, Hannaford reportedly detected a Trojan designed to skim magnetic stripe information from the checkout stations. This attack compromised 4.2 million accounts. Beginning on or about Dec. 26, 2007, Heartland was hit with a SQL injection attack on its corporate network that resulted in malware being placed on its payment processing system and the theft of more than 130 million credit and debit card numbers and corresponding card data.

According to the indictment, Gonzalez and his cohorts exploited vulnerabilities that are typically in many cybercrime cases. SQL injection attacks were used to insert specially crafted malware designed to evade detection. Once inside the corporate networks, the attackers used sniffers to conducted reconnaissance, find and steal credit and debit card numbers, and other information. According to the DOJ, the group tested their malware by putting it up against about 20 different anti-virus programs. The group used computers in California, Illinois, Latvia, the Netherlands, and Ukraine to stage attacks and store malware and stolen information.

Could have been defended against

While the attacks seem to be phased-in and coordinated, the attackers used classic and well-known methods that could have been defended against, experts say.  Robert Graham, CEO of Errata Security told Dark Reading that the attacks outlined in the indictment basically offer a roadmap for how most breaches occur, “This is how cybercrime is done,” Graham says. “If there is a successful attack against your company, this is roughly what the hackers will have done. Thus, this should serve as a blueprint for your cyber defenses.”

In a Dark Reading article, Rich Mogull, founder of Securosis, says the attacks were preventable, mainly because they employed common hacking techniques that can be foiled.  He points out that the attacks seem to mimic those in an advisory issued by the FBI and Secret Service that warned of attacks on the financial services and online retail industry that targeted Microsoft’s SQL Server. The advisory included ways to protect against such attacks, including disabling SQL stored procedure calls. “This seems to be a roadmap” to these breaches, Mogull says. “The indictment tracks very closely to the nature of attacks in that notice.

The attack took planning and organization, but ultimately it was done with relatively common attack techniques,” said Rohit Dhamankar, director of DVLabs at TippingPoint in an eWeek article, “It just goes to show that even the most basic type of attack can do serious damage and enterprises need to be more vigilant about protecting the outward-facing portions of their networks.

Rick Howard, intelligence director for iDefense, told Dark Reading that enterprises still aren’t closing known holes in their networks and applications. “They were using the same stuff that works all the time,” he says. “And it’s [an example of] another organization not diligent in closing up [vulnerabilities] we know about.”

Prevention

Upesh Patel, vice president of business development at Guardium, told Dark Reading the attackers must have exploited applications with authenticated connections to the database. “Since a SQL Injection attack exploits vulnerabilities in the database, the attack could have occurred from any end-user application that was accessing the database.

Errata’s Graham says the initial attack vector, SQL injection, is often dismissed by enterprises as unimportant. “We always find lots of SQL injection [flaws] with our clients. We talk to them about it, but get push-back from management and developers who claim SQL injection is just a theoretical risk.

As a fix, Graham recommends, ”The simple solution is to force developers to either use ‘parameterized’ queries or ‘sanitize’ input.” He also suggests that SQL-based servers be hardened. “Once they got control of the database, they were able to escalate the attack to install malware on the systems. The simple solution is to remove all features of the database that aren’t needed,” he says, such as “xp_cmdshell,” which attackers commonly abuse. Graham goes on to suggest that anti-virus doesn’t catch custom malware like the attackers wrote for their attacks, so add policies and technologies that can spot unknown threats.

Gonzalez crews’ alleged use of their own sniffers that copied card data from the network could have been thwarted with encryption according to Richard Wang, Sophos Labs‘ U.S. manager. Wang tells InternetNews that the data should have been encrypted while in transit on the wire.

Sopho’s Wang says that the databases need to be secured, “Businesses should secure the application code, and make sure that the underlying server and operating system are up to date with the latest patches.” Securosis’ Mogull says not to use a privileged account for the relational database management system. In a blog post, Mogull says to deploy data leakage protection to see if you can detect any card data internally before the bad guys find it, and l to focus on egress filtering.

This was preventable,” Securosis’ Mogull says of the major breaches. “There was some degree of sophistication — like they knew HSMs — but definitely the main way they got in is not the most sophisticated.

Gonzalez, who is in federal custody, faces a maximum sentence of 20 years in prison on wire fraud conspiracy, and another five years on conspiracy, plus $250,000 for each charge. In May 2008, the U.S. Attorney’s Office for the Eastern District of New York charged Gonzalez with an alleged role in the hacking of a computer network run of restaurant chain Dave & Buster’s. The trial on those charges is scheduled to begin in Long Island, N.Y., in September.

In August of 2008, the Department of Justice announced more indictments against Gonzalez and others for a number of retail hacks affecting eight major retailers and involving the theft of data related to 40 million credit cards. Those charges were filed in the District of Massachusetts. Gonzalez is scheduled for trial on those charges in 2010.

rb-

The work we do on behalf of our clients often includes many of the steps highlighted in this incident. We always insist that vendors harden any servers brought on to a client’s site and that unnecessary services be removed. Before we recommend the Owner accept any installation, the vendor has to fully patch the OS and any applications provided. More recently we have started to include internal and external facing port scans.

Heartland Payment Systems Reports Breach

TJX Hacker Charged With Heartland, Hannaford Breaches

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Nokia Tries Wireless Electricity

Nokia Tries Wireless ElectricityIf someday the researchers at Nokia (NOK), are right you will be able to use wireless electricity to charge your mobile. Putting your cell phone in standby mode may no longer cause the dreaded vampire power. Vampire power is often described as pointlessly wasting electricity with little benefit other than a small red light and instant start-up.

Nokia logoAccording to an article in the UK’s Guardian, Nokia is developing a mobile phone charging system that is able to power itself on nothing more than ambient radiowaves that constantly surround us. The Guardian article points out that radiowaves power the old crystal radio sets and modern radio frequency identification (RFID) tags.

Nokia claims that its system is able to scavenge enough ambient electromagnetic radiation emitted from Wi-Fi transmitters, cell-phone antennas, TV towers, and other sources miles away to run a cell phone. Individually the energy available in each of these signals is minute, but by harvesting radio waves across a range of frequencies it all adds up, said Markku Rouvala, one of the researchers who developed the device at the Nokia Research Center in Cambridge, UK.

Nokia’s device uses a wide-band antenna and two very simple passive circuits. The design of the antenna and the receiver circuit makes it possible to pick up frequencies from 500 megahertz to 10 gigahertz and convert the electromagnetic waves into an electrical current. The second circuit is designed to feed this current to the battery to recharge it.

Even if you are only getting microwatts (mW), you can still harvest energy, provided your circuit is not using more power than it’s receiving,” Rouvala told Technology Review. So far the researchers have been able to harvest up to 5 mW. Their next goal is to get in excess of 20 mW, enough power to keep a phone in standby mode indefinitely. but not enough to actually use the phone to make or receive a call the researcher says.  Rouvala says that his group is working towards a prototype that could harvest up to 50 mW of power, enough to slowly recharge a switched-off phone.

Earlier this year, Joshua Smith at Intel and Alanson Sample at the University of Washington, in Seattle, developed a temperature-and-humidity sensor that draws its power from the signal emitted by a 1.0-megawatt TV antenna 4.1 kilometers away. This only involved generating 60 mW.  Smith says that 50 mW could need around 1,000 strong signals and that an antenna capable of picking up such a range of frequencies would cause efficiency losses along the way.

Harry Ostaffe, head of marketing for Pittsburgh-based company Powercast, which sells a system for recharging sensors from about 15 meters away with a dedicated radio signal told Technology Review, “To get 50 milliwatts seems like a lot.

If Nokia’s claims stand up, then it could push energy harvesting into mainstream consumer devices and improve their environmental footprint. Steve Beeby, an engineer and physicist at the University of Southampton, U.K., who has researched harvesting vibrational energy, adds, “If they can get 50 milliwatts out of ambient RF, that would put me out of business.” He says that the potential could be huge because MP3 players typically use only about 100 milliwatts of power and spend most of their time in lower-power mode.

According to Technology Review. Nokia is being cagey with the details of the project, but Rouvala is confident about its future: “I would say it is possible to put this into a product within three to four years.” Ultimately, though, he says that Nokia plans to use the technology in conjunction with other energy-harvesting approaches, such as solar cells embedded into the outer casing of the handset.

rb-

As I have chronicled in the past and here, wireless power is a good solution looking for a way to be implemented. Wireless power has now hit the GartnerHype-Cycle.” According to the July 2009 Gartner Hype-Cycle, Wireless Power has just entered the “Peak of Inflated Expectations” zone and is still 5-10 years from mainstream adoption. 

This technology holds many benefits to the environment (less wasted electricity) and user convenience (how many proprietary power adapters do you have?), it is yet to be seen if consumer demand can overcome the inertia of the status quo and the power of big money lobbying by the coal, nuclear and utilities. Right now my money is on the money.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

No Job Growth for 10 Years

The New York Times is reporting that for the first time since the Depression, the American economy has added virtually no job growth in the private sector over a 10-year period. The total number of jobs has grown a bit, but that is only because of government hiring.

The NYT charts show the job performance from July 1999, through July of this year. For the decade, there was a net gain of 121,000 private-sector jobs, according to the survey of employers conducted each month by the Bureau of Labor Statistics. In an economy with 109 million such jobs, that indicated an annual growth rate for the 10 years of 0.01 percent.

According to the NYT, until the current downturn, the long-term annual growth rate for private-sector jobs had not dipped below 1 percent since the early 1960s. Most often, the rate was well above that.

NYT chart

Fortunately for me, the NYT says the field of management and technical consulting leaped at an annual rate of 5 percent. But while designing computers and related equipment was a growth field, building them was a very different story, as the manufacturing shifted largely to Asia. The number of jobs making computer and electronic equipment in the United States fell at an annual rate of 4.4 percent, substantially more than the overall decline in manufacturing jobs, of 3.7 percent.

That was a better showing than that of the automakers, which shed jobs at a rate of 6.7 percent a year. By contrast, auto dealers cut jobs at a much slower rate of 1.3 percent a year, although that rate may accelerate later this year as General Motors and Chrysler dealerships are closed.

The total picture is of an economy that has changed in substantial ways over the decade. After the recession ends, job growth is likely to resume. But there is no indication that the secular trend toward a more service-oriented economy will reverse. and few expect that manufacturing will reverse its long decline as a major employer in the United States.

rb-

Enough said –

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Check Your EULA

I have been trying out EULAlyzer  2.0 from Javacool Software for a couple of months and have found the results to be interesting to say the least. EULAyzer scans the software publishers’ End User License Agreements (EULA) for privacy risks, unwanted software, and other surprises like pop-up ads, sending personally identifiable information, or using unique identifiers to track the user’s activity.

EULACheck Your EULAlyzer searches the publishers’ documents for what the vendor calls “words of interest” and then assigns its “Interest Rating” to the program. Like other anti-spyware programs, EULAlyzer ranks risks on a scale of 1 to 10 based on how crucial the disclosed information can be to the user’s security based on suspicious wording. The product also includes a search function that can be used to perform user-specific keyword searches of the entire EULA.

The copy and paste function can be used to quickly find suspicious parts of web-based license agreements, website terms, privacy policies, and other similar documents. By default the program scans for language that deals with:

  • Advertising
  • Tracking
  • Data Collection
  • Privacy-Related Concerns
  • Installation of Third-Party / Additional Software
  • Inclusion of External Agreements By Reference

EULAlyzer leverages the power of crowdsourcing through a related  EULA Research Center, which optionally allows users to anonymously submit license agreements they scan to enlarge the underlying database of EULA’s and further improve the program.  There is also a web forum available to provide support on the application.

rb-

EULAlyzer is a proactive tool in the fight against malware. In the enterprise, this tool can be used by those responsible for developing and maintaining disk images. It can also be used by the compliance staff to quickly flag potential issues and pass them up the line to SME or the legal department.

EULAlyzer is no substitute for reading the EULA. We all know that the EULA should be read and understood before proceeding with any software installation. What EULAlyzer does is save time and effort by flagging the most onerous parts of a EULA for your review to focus on potentially riskier behavior.

I found EULAlyzer interesting and effective. It made me realize the lengths that software manufacturers go to hide the details of the EULA. The EULA’s are buried deep down in sub-sub-sub directories, cryptically named and/or huge. The web-based EULA for Adobe Acrobat Reader is part of a 282 page PDF.

As for the application itself, I would like to see better explanations of the items the program flags, either through an in-depth help file or a web-based resource.

EULAlyzer is a donation-ware application that is free for personal and educational uses (there is a corporate version also available ) Compatible with: Windows 2000, XP, 2003, Vista.

NOTE: This blog does not provide legal advice. It can only highlight information that you may want to consider before making your own decisions to proceed or not. You should always consult a lawyer (or other competent authority) for advice on legal issues.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Global Tech Layoffs Pass Half a Million

The global body count in the tech sector has risen above 500,000 in July 2009. Since the correction, recession, economic melt-down started in earnest in October 2008, about 505,477 tech-related jobs have been right-sized, down-sized, resource actions eliminated. January 2009 is the worst month for employees with nearly 164,000 tech jobs eliminated. October 2008 saw over 56,000 workers pink-slipped. Approximately 53,500 tech workers we laid off in both December 2008 and February 2009. The last two months have shown a decline in the numbers of tech workers getting the ax. In June 2009, 4,326 workers were laid off, the smallest monthly count since the economic meltdown started. July 2009 witnessed 12,65 layoffs, most from Verizon. The July count is also well below the average 50,000 lay-offs a month pace being set during the economic meltdown.Global Tech Layoffs

rb-

These numbers say to me that we are still in for a long hard year before anything like a real turn-around emerges. So despite what Newsweek says, the recession is not over.

Among the firms that generated these layoffs are:

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.