Chapter 19 Notes Flashcards
What happened with Equifax
- Summer 2017
- grabbed data on 143 million customers in the US, Canada, and UK (addresses, SSN, driver’s liecense numbers, credit card numbers, etc.)
- due to an exploit of a vulnerability in an open source component, Apache Struts product, that the firm had 2 months to fix
- CEO retired and the total cost revealed to be the most expensive in corporate history.
What was the Target Hack
- hackers installed malware in Target’s security and payments system in 2013 designed to steal every credit card used in company US stores (40 million cards and personal info on 70 million customers exposed)
- target paid over a million for software from the security firm FireEye to detect breaches in real time and the software worked, Target just ignored the warnings
- the firm’s secuirty software has an option to automatically delete malware as its detected but the team turned the function off
- as a result was the firm’s largest ever decline in transactions, falling profits, lawsuits, and the CEO’s dismissal.
- code was snuck into the system using security creds of one of Target’s partners and disguised as BladeLogic, a data center management product
What did the data breaches of Equifax and Target show?
security must be a top organizational priority, but also that the vast majority of security breaches are preventable. it is important to determine whether firm has technologies, training, policies, and procedures to assess risks, lessen the liklihood of damage, and respond in the event of a breacj
Annual worldwide cybercrime costs:
$600B per year
Motivations for hackers?
account theft and illegal funds transfer, stealing personal or financial data, compromising computing assets for use in othr crimes, extortion, intellectual property theft, espionage, cyberwarfare, terrorism, pranksters, protest hacking , revenge
what are data harvesters?
cybercriminals who infiltrate systems and collect data for illegal resale, typically to cash-out faudsters
what are cash-out fraudsters
criminals who might purchase assets from data harvesters to be used for illegal financial gain. they might buy goods using stolen credit cards or create false accounts
what are botnets?
networks of infiltrated and compromised machines controlled by a central command; can be used for sending spam from thousands of accounts, launching fraud efforts or staging distributed denial of service (DDoS), which effectively shut down websites by overwhleming with a crushing load of seemingly legit requests sent by thousands of machines at the same time.
Extorsionist might leverage botnets or hacked data to demand payment to avoid retribution. (T/F)
True, a US-based extortion plot againt VA threatened to reveal names, SSN and other info stolen from medical recorrds database.
What is ransomware?
allows criminals to take data assets hostage, locking and encrypting infected computers, rendering them unusable and irrecoverable unless wants are met like payment
Coorporate espionage is performed by:
insiders, rivals, or foreign government
for ex. a scientist was busted trying to sell R&D documents and secret data on proprietary products.
How has cyberware become a legitimate threat?
technology disruptions by terrorits or a foreign power might be devastating
ex. cutting off power, communication, temperature controls (demonstrated by white hat hackers in a 60 minute news program; forcing oil refinery to overheat and cause an explosion, which would be expensive and difficult to replace).
What is Stuxnet?
a worm that infiltrated Iranian nuclear facilities and reprogrammed the industrial control software operating hundreds of uranium-enriching centrifuges; caused devices to spin into damage. the sophisticated attack went undetected as it was happening.
showed that it’s now possible to destroy critical infrastructure without firing a shot.
Malicious pranksters are also called
griefers or trolls; one group posted seizure-inducing images on websites frequently visited by people suffering with epilepsy.
What are hacktivists?
target firms, websites, or even users as a protest measure; Twitter was once brought down, and Facebook was hobbled as hackers targeted the social networking and blog accounts of Georgian blogger Cyxymu. this attack silences millions of accounts as collateral damage in a DDoS attack meant to mute the single critic.