The Futility of Obsession

cruelsister

Level 42
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 13, 2013
3,151
I feel that it is a fairly safe assumption that any reading this post on MT is both computer knowledgeable and Security conscious. And among those security related concerns is the importance of keeping Credit Card transactions over the Net secure. To this end, many have implemented various strategies from anti-keyloggers to anti-URL spoofing techniques to virtual desktops with or without Linux environments all to prevent the BlackHats from accessing Credit Card data.

Although the above listed techniques (if implemented and used correctly) are effective, it is essential that one note that any sales transaction requires two parties: a Buyer (you) who is security conscious and well protected, as well as a Seller who may not be as concerned. A case in point (and the reason for this diatribe) is the potential massive breach at Home Depot that was reported on yesterday:
http://malwaretips.com/threads/home-depot-breach.32768/
http://malwaretips.com/threads/home-depot-breach.32768/

For those who may not be aware, Home Depot is one of the largest retailers in the world, with current sales estimates for 2014 of over 83 billion USD. With such massive annual sales volumes, one would think the security for these transactions would be a priority, especially as the company would be able to learn from previous breaches and adjust their security accordingly. Basically one would think that such a Corporation would at least take as much care with user data as you take, Dear Reader. But you would be sadly mistaken.

So far, nothing specific about this breach is forthcoming from the company other than “We’re looking into some unusual activity that might indicate a possible payment data breach and we’re working with our banking partners and law enforcement to investigate.” However the grape-vine has been active and a few things are coming to the surface. As with most previous malware breaches, a custom written malware file was sent to Corporate (usually as an email with attachment), the malware was run and proceeded to infect the system. This malware took advantage of antiquated Windows XP based Point-of-Sale devices (CC read via magnetic strips) and subsequent data harvests send off to BlackHat Land. It should be mentioned that current conjecture has this malware infection initiating about last April (Oh God- around 5 months!).

It may come as a surprise that that security routines implemented by Corporate IT did not catch either the malware itself or the malicious routines, but it really shouldn't be. Just as in the massive Target breach last year, Home Depot relies upon one of the most popular Enterprise security packages around (don't ask) which in turn relies on detection via either definition or in the wild prevalence, as well as Outbound Firewall alerts of data transmission.

The lack of usefulness of this traditional approach to malware detection is readily evident. Custom made malware targeting a single victim will neither be detected by definition (as it has never been seen before), nor will a "Community" approach work as being targeted it won't spread to others. The Outbound alerts will certainly happen, but as the stolen data packages are transmitted intermittently and not continuously such alerts are buried in the logs that such a massive organization generates.

So what has the initial reaction of Home Depot been? "Customers were assured that if a breach is confirmed they will not be responsible for any possible fraudulent charges. The company added, “The financial institution that issued your card or Home Depot are responsible for those charges.” The company will offer free identity protection services to impacted customers and recommends customers monitor financial accounts for unusual activity." (Above quote shamelessly lifted from Forbes). They've also reduced there quarterly earnings from 0.90/share to 0.80/share, the cost of mitigating damages.

The cost of better security would have been much less and would have avoided the breach, but why bother? The customers are only peasants and will have to be satisfied with what they are given.
 
  • Like
Reactions: NSG001

Behold Eck

Level 15
Verified
Top Poster
Well-known
Jun 22, 2014
724
It`s all about the money honey and I work for a government department that recently got rid of their UPS so if theirs a power cut then ... bam! Everything worked on for that day is gone.I mean WTF.....where is the sense ?

Anyway I `m sure banks or a lot of them operate along the same lines being reactive instead of proactive.What ever worked yesterday should work tomorrow and if theres a budget cut then lets cut I.T. what could possably go wrong ?

As long as you (the pleb)get your money back I suppose and as long as a corporate head doesnt award him/herself a wopping bonus by suggesting upgrading the banks base operating system (instead of paying microsoft millions for continued xp updates) might be the way forward ?

Regards Eck:)
 

Behold Eck

Level 15
Verified
Top Poster
Well-known
Jun 22, 2014
724
If I was the president or manager of that company, I'd shut it down. Or at least offer my services for free.

Yeah, you could shut it down and then get a government grant to start it up again under a different name and award yourself a big fat bonus............nice work if you can get it.

Regards Eck:)
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top