CyberheistNews Vol 5 #36 Breaking News: Got Hacked...The FTC Can Now Sue You



 
                                                       
CyberheistNews Vol #5 #36 Aug 25, 2015

Breaking News: Got Hacked...The FTC Can Now Sue You

For organizations that get hacked like Anthem, Target and recently Ashley Madison, the problems are only starting. Apart from towering legal fees and a damaged reputation, now an appeals court has confirmed that the FTC can slap you with fines as well. This is excellent ammo to get more IT security budget.

Yesterday, the third U.S. Federal circuit court ruled that the Federal Trade Commission (FTC) has the power to take action against organizations that employ poor IT security practices. The ruling was part of a lawsuit between the FTC and hotel chain Wyndham. This court decision affirms the FTC’s role as a digital watchdog with real-life teeth.

This Is A Big Deal

In 2008 and 2009, Wyndham was hacked three times, losing credit card data for more than 619,000 customers and causing 10.6 million dollars in loss due to fraud. Originally, the FTC sued them in 2012 over the lack of security that led to its massive hack. The hotel chain appealed to a higher court to dismiss it, arguing that the FTC didn’t have the authority to punish the hotel chain for its breach. Wrong move. Yesterday's decision states that Wyndham’s breach is exactly the sort of “unfair or deceptive business practice” the FTC is empowered to stop. This means Wyndham now needs to go back and confront the FTC’s lawsuit in a lower court.

The circuit court also stated that the FTC does not have to detail any specific best practices that Wyndham did not apply. The FTC did however, and it's not a pretty picture. Here are some of the highlights: Wyndham allowed its partner hotels to store credit card information in plain text, allowed easily guessable passwords in property management software, failed to use firewalls to limit access to the corporate network, and failed to restrict third-party vendors from access to its network. 

Data Insecurity As ‘Unfair’ Business Practice

The FTC argued that “taken together, they unreasonably and unnecessarily exposed consumers’ personal data to unauthorized access and theft.” In a statement to Ars, FTC Chairwoman Edith Ramirez wrote, “Today’s Third Circuit Court of Appeals decision reaffirms the FTC’s authority to hold companies accountable for failing to safeguard consumer data. It is not only appropriate, but critical, that the FTC has the ability to take action on behalf of consumers when companies fail to take reasonable steps to secure sensitive consumer information.” 

The upshot?

This appellate ruling establishes an important precedent for the legal consequences of a data breach. Berkely Law professor Chris Hofnagle said: "Had Wyndham won at the third circuit, it would have called into question the FTC’s ability to police privacy and security”. Well, now we know that the U.S. Government in the form of the FTC can and most likely will jump in and add even more cost to a super expensive data breach.

It's not clear how the hackers got into the hotel chain, but it would not surprise me if it was another phishing email that an employee clicked on. With easy to guess passwords, it is clear that they did not step employees through effective security awareness training. Having that in place is an IT best practice that has great ROI and is a crucial part of your defense-in-depth. 

It is clear that educating your users about these risks is very important. If you have not done so already, find out how affordable Kevin Mitnick Security Awareness Training is for your organization, and be pleasantly surprised:
http://info.knowbe4.com/kmsat_get_a_quote_now

Stop The AshMad Insanity!

First a 10Gig dump with the full database, then a 20Gig dump with their whole Github repository, and then to top it all off a 300G(!) dump. In an interview  with Motherboard, the hackers claimed to have data which includes employee  emails, internal documents, nude photographs, and private chats between  members. However, the Impact Team said it would not release explicit photos  of AshMad customers, but did not rule out publishing the private chats and  other photographs posted through the adultery website.

When asked about AshMad security, they said "Nobody was watching. No security", when it broke into their servers repeatedly over the past few years. One hacker  said, "[We] got in and found nothing to bypass."

The release last Tuesday contained customer data belonging to U.S. government  officials, British civil servants and high-level executives at European and  North America corporations. We have a copy and are researching it for  security purposes. 

Should You Check For Employees' Emails?

Well, this is a field mired in MANY problems. It's not a can of worms,  it's a can of scorpions. First, it depends on your organization. Any  government employee that has a clearance (and that is true for many  government contractors as well) is in immediate risk of losing that  clearance if they are found to have been engaged in infidelity, as they  become a target for blackmail. Adultery can be a criminal offense under  the Uniform Code of Military Justice.

Apparently not everyone was smart enough to obscure their real-life  identity using a webmail address. Robert Hansen, VP of WhiteHat Security found well over 13,000 email addresses from .MIL and .GOV  domains and a handful of congressmen among the hacked data. He also  identified a substantial number of addresses from various Fortune 500  companies like Microsoft, Cisco, Apple, and Bank of America. Perhaps  the most shocking revelation is that Hansen found three accounts using  Vatican.com email addresses.

The legal repercussions of scanning the database for email addresses with  an organization's domain name need to be clarified and well-understood  before that scan is done, each corporate lawyer will have to look into  that based on their individual organizational situation. 

After that determination, IT and/or HR can look into this database, and see  if any organizational email has been used or compromised, which then would  have to be deleted and a new email address issued to that user, either with  mentioning the reason (or omitting it) again based on Legals advice. 

I could envision you scanning the AshMad database for your domain name, and issuing new creds to employees found, simply with a generic mention  that the address was compromised.

A major risk is end-users going to websites that claim to show if their name  is in the list. Many of these sites will be phish-bait and anything typed in will  be used for a variety of nefarious purposes and/or infect the workstation. Any  organization should warn their users to watch out for attacks like that.  See my recent blog post with a real example of AshMad extortion:
http://blog.knowbe4.com/phishing-alert-warn-your-users-against-ashley-madison-scams-now

"100,000 Refrigerators Attack Bank Of America"

This nightmare headline was voiced by Vint Cerf, father of the Internet when he was asked what his greatest fear was about the future Internet of Things in an interview by WashingtonExec: 

"Ensuring that devices, including household appliances that now make up the Internet of Things, are properly configured so that uncontrolled or unauthorized access is denied. The nightmare headline for me is, ‘100,000  Refrigerators Attack Bank of America’. That is going to take some serious thinking not only about basic security technology but also how to configure devices at scale, no one wants to spend their entire weekend typing IPV6  addresses for each and every household device."

This is a good InfoSec read, warmly recommended and not too long:
http://www.washingtonexec.com/2015/08/exclusive-father-of-the-internet-vint-cerfs-forecast-for-internet-of-things/

What CIOs Can Learn About Security Threats From 4 Recent Hacks

John Brandon at CIO came out with a good story you should read and forward to your C-Level execs. The media and the public are finally waking up to the fact that almost all organizations are at risk of  getting hacked. Analyzing a few recent high-profile breaches might just help you prevent the same thing from happening at your company.

There are four examples that each show the problem and the mitigation, I am quoted in two of the solutions:
http://www.cio.com/article/2972263/security/what-cios-can-learn-about-security-threats-from-4-recent-hacks.html 
Warm Regards,
Stu Sjouwerman

Quotes Of The Week
 
       
"There is nothing on this earth more to be prized than true friendship."
- Thomas Aquinas - Philosopher (1225 - 1274)

"If you want to go fast - go alone. If you want to go far - go together."  - African Proverb

     Thanks for reading CyberheistNews

Security News
 

Compliance In Half The Time At Half The Cost

I'm sure you will agree, compliance has become a major headache. It is a HUGE burden on already limited IT resources. Yearly audits have become major projects. They are expensive in both dollars and your IT staff time.

Imagine an environment in which your organization is completely compliant  24/7/365, and where all employees work together as a team without nagging and tons of emails. KnowBe4 Compliance Manager (KCM) can help you to achieve  that state. It is an IT compliance workflow automation tool that allows  you to:
    • Manage all of your specific regulatory requirements in one location (PCI-DSS, HIPAA, GLBA, SOX, etc...).

    • Eliminate duplication of effort.

    • Assign the Directly Responsible Individual (DRI) for a control.

    • Direct your auditors to one location for evidence of compliance controls being in place and up to date.

    • NEW: Auditor Role, your auditor can log in remotely and save you billable hours.
Go to this link for more info and to request a web demo:
http://info.knowbe4.com/_kcm_pci_30-0

This Week's Five Most Popular HackBusters Posts

    1. Hackers Finally Post Stolen Ashley Madison Data:
      http://www.hackbusters.com/news/stories/367508-hackers-finally-post-stolen-ashley-madison-data

    2. 'Doctor Who' Weeping Angel string lights will terrify your guests:
      http://www.hackbusters.com/news/stories/368922-doctor-who-weeping-angel-string-lights-will-terrify-your-guests

    3. Windows 10 can find and disable pirated games:
      http://www.hackbusters.com/news/stories/366355-windows-10-can-find-and-disable-pirated-games

    4. Top 10 Popular Programming Languages used on GitHub:
      http://www.hackbusters.com/news/stories/369390-here-s-top-10-popular-programming-languages-used-on-github

    5. Fallout 4 could be more successful than Skyrim, says Bethesda:
      http://www.hackbusters.com/news/stories/369448-fallout-4-could-be-more-successful-than-skyrim-says-bethesda

Off With Their Heads! Execs Get The Ax For Data Breaches

Until last year, executives were able to pass the buck to IT in case a data breach hit the organization. However, several recent high-profile resignations are now putting the focus on board members. Here are a few examples:

US Office of Personnel Management head Katherine Archuleta was forced to resign over a massive hack that exfiltrated well over 20 million highly confidential personal records of government employees. Thomas Meston, CFO of the London-based hedge fund Fortelus, also lost his job following a cyber hack that emptied $1.2 million from the fund’s bank account.

And those are just the two latest victims. The trend began for real last  year when Target's CEO stepped down in the wake of a disastrous data  breach that compromised 40 million shoppers’ credit cards and 70 million customers’ personal data. Steinhafel had little choice but to resign as the CEO of the US 40 billion company. 

The important thing for board members to realize is that they can do little to mitigate the damage after the data has been exfiltrated. Once the data breach has happened, they will find themselves held responsible for, and accused of prior negligence. At that point it's up to the CEO and the board to defend themselves against these claims and that all appropriate measures had been taken to protect the organization’s data. 

Up to a few years ago, it sounded reasonable for boards to delegate the defense against hackers to the IT department. They relied to a large degree on traditional firewalls and antivirus. However, the last few years antivirus (AV) has shown to fall behind badly. With hundreds of thousands of new malware flavors being released in the wild every day, bad guys are overwhelming AV and often get through. 

Today, it is seen as the task of the Board to prioritize and make IT security budget budgets available so that defense-in-depth can be done the right way.

In order to protect not only their own careers but also the future of the organizations they lead, senior executives must now understand that the buck stops with them and securing their data, almost always their organization’s most valuable asset, is paramount.

Thomas Meston, hedge fund Fortelus' CFO was forced to resign after falling victim to a social engineering attack over the phone. The attack however, had all the hallmarks of a professional job. It was clear the hacker had done their homework and researched Meston in  great detail, a technique also used in spear-phishing attacks, which are sometimes followed up with very real-sounding phone calls.

Meston fell for the hacker's scam, but whatever the form of the  attack, it is clear that today the cyber security buck stops at the board level. To prevent "human hacks" (which are the weak link of  IT security), stepping all employees through effective security awareness training is a very cost-effective way to prevent a large percentage of data breaches.
   
Cyberheist 'FAVE' LINKS:
 
Copyright © 2014-2015 KnowBe4 LLC, All rights reserved.

Our mailing address is: 33 North Garden Ave Suite 1200, Clearwater, Florida, 33755



Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews