13.07.2015 Views

hp-security-research-cyber-risk-report-pdf-2-w-1408

hp-security-research-cyber-risk-report-pdf-2-w-1408

hp-security-research-cyber-risk-report-pdf-2-w-1408

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

HP Security Research | Cyber Risk Report 2015ExposuresEmerging avenues for compromise: POS and IoTA number of different factors may arise and lead to different types of <strong>security</strong> exposures. Noveltechnology can lead to exposures, as the implications of new technology can sometimes bedifficult to guess and avenues of attack can be unexpected until observed in practice (remindingus that sometimes, we should think like an attacker).The following section addresses andcritically examines some of the recent and emerging fronts in the <strong>security</strong> wars.First, let us look in detail at technical aspects of one of the biggest <strong>security</strong> stories of 2014—the point of sale (POS) system breaches at a number of major retailers in the United States,most notably Target and Home Depot. Both breaches resulted in the compromise of millionsof customers’ credit card and account details and were perpetrated using malware specificallycreated to target POS systems. This type of malware has been seen in the wild for some yearsnow, and in this section we track its ongoing development by examining the evolution of threenotable examples—Dexter, BlackPOS, and Mozart. (Information on additional POS-focusedmalware, Decebal and Back-off, can be found in the glossary.)Considering the sensitive financial data that is processed and used by POS systems, they arean obvious target for attackers. As protections have increased at different points in the retailtransaction process, particularly in the transportation and storage of financial data, attackershave naturally looked to other intersections for possible points of compromise—in this case, atthe actual point of sale. In the second part of this section, however, we will look at technologieswhere an attacker’s path to monetization is less obvious.The second part of this section looks at emerging technology and <strong>security</strong> implications for theInternet of Things (IoT). To a large degree, the <strong>security</strong> aspects of the increasingly ubiquitousnetworked computing we see in IoT technologies are untested, but questions regarding theimplications of increasing convergence abound. Key areas of concern are sensitive data leakage,confidentiality (such as those <strong>report</strong>ed in a 2014 HP wearable-devices blog post 130 ), and dataintegrity. We look at some of the issues around these pervasive technologies and considerpossible future trends.The evolution of POS malwareIn recent years, we’ve seen multiple POS infiltration incidents, with particularly high-profilebreaches in 2013 and 2014 at Target and Home Depot. In the Target breach, the details of over40 million credit and debit cards and the information of 70 million customers were stolen. Inthe case of Home Depot, 56 million credit and debit card account details were taken. And theseare only the biggest incidents—there are undoubtedly more—both publically <strong>report</strong>ed on andotherwise, but even these are two too many. The modus operandi used by the attackers tocapture financial information in these breaches was POS malware. POS malware is not new, but2014 saw considerable development in these malicious programs. They have evolved rapidlyfrom being primitive and basic to advanced and complex. In this section, we look at three recentPOS malware types in order to better understand the threat landscape in this space and toexamine how they are evolving. All three are somewhat notorious. The first is Dexter, whichwas discovered in the wild in 2012. The second is BlackPOS, the malware that was used for theTarget breach, and the last is Mozart, which was used in the Home Depot breach.130http://h30507.www3.<strong>hp</strong>.com/t5/Applications-Services-Blog/Wearable-Technology-and-thechallenge-of-Fragmentation/ba-p/160704#.VIfDmE0cQ5s.42

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!