SlideShare a Scribd company logo
Data Security Compliance Advisors 
Certified Identity Theft Risk Management Specialists 
873 East Baltimore Pike #501 
Kennett Square, PA 19348 
610-444-5295 
www.BTR-Security.com
Data Security Compliance Advisors 
Certified Identity Theft Risk Management Specialists 
873 East Baltimore Pike #501 
Kennett Square, PA 19348 
610-444-5295 
www.BTR-Security.com
Data Security Compliance Advisors 
Certified Identity Theft Risk Management Specialists 
873 East Baltimore Pike #501 
Kennett Square, PA 19348 
610-444-5295 
www.BTR-Security.com 
A DATA BREACH of “PII” IS DEFINED AS A FIRST NAME, FIRST INITIAL OR LAST NAME PLUS: 
A Social Security Number 
A Driver’s License Number or State-Issued ID Number 
An Account Number, Credit Card Number or Debit Card Number Combined with any Security Code, Access Code, PIN or Password
Data Security Compliance Advisors 
Certified Identity Theft Risk Management Specialists 
873 East Baltimore Pike #501 
Kennett Square, PA 19348 
610-444-5295 
www.BTR-Security.com 
A DATA BREACH IS DEFINED AS ANY INTURDER TO YOUR ENTERPRISE 
Your Trade Secrets 
Access To Your Servers By a “Hactivism” Criminal 
Whatever Is Important To Your Enterprise
Data Security Compliance Advisors 
Certified Identity Theft Risk Management Specialists 
873 East Baltimore Pike #501 
Kennett Square, PA 19348 
610-444-5295 
www.BTR-Security.com 
When a hacker gets anyone’s credentials, it is easy for them to build a profile of the individual to gain even more information from social media sites. 
From there they can “spearPhish” more information from the victim OR THEIR CONTACTS! 
Examples of profile building follow:
Data Security Compliance Advisors 
Certified Identity Theft Risk Management Specialists 
873 East Baltimore Pike #501 
Kennett Square, PA 19348 
610-444-5295 
www.BTR-Security.com 
LOST CREDENTIALS PUT YOU UNDER ATTACK 
Name: 
Lucas Newman 
Extraction Date: 
12/30/20XX 
Email: 
lnewman@firstrepublic.com 
Hometown: 
Portland, Oregon 
Hashed 
Password: 
16b90b178faff0e3e2f92ec647b50b11 
Occupation: 
Managing Director and Portfolio Manager 
Extraction Type: 
Hack 
Source:
Data Security Compliance Advisors 
Certified Identity Theft Risk Management Specialists 
873 East Baltimore Pike #501 
Kennett Square, PA 19348 
610-444-5295 
www.BTR-Security.com 
Name: 
Robyn Mondin 
Extraction Date: 
12/30/20XX 
Email: 
robyn.mondin@firstcitizens.com 
Hometown: 
Asheville, North Carolina 
Clear Password: 
36f76603a2212c7fc6ff4fb8ec77a64c 
Occupation: 
Mortgage Banker 
Extraction Type: 
Hack 
Source:
Data Security Compliance Advisors 
Certified Identity Theft Risk Management Specialists 
873 East Baltimore Pike #501 
Kennett Square, PA 19348 
610-444-5295 
www.BTR-Security.com 
EVERY EMPLOYEE, PARTNER, AND SYSTEM IS A WEAK LINK 
Name: 
Pat Grundish 
Extraction Date: 
8/13/20XX 
Email: 
pat.grundish@53.com 
Hometown: 
Englewood, Ohio 
Clear Password: 
p_grundish 
Occupation: 
Mortgage Loan Officer 
Extraction Type: 
Hack 
Source: 
Name: 
Mandy Knerr 
Extraction Date: 
8/13/20XX 
Email: 
mandy.knerr@53.com 
Hometown: 
Huber Heights, Ohio 
Clear 
Password: 
m_knerr 
Occupation: 
Sr. Marketplace Loan Officer 
Extraction Type: 
Hack 
Source:
Data Security Compliance Advisors 
Certified Identity Theft Risk Management Specialists 
873 East Baltimore Pike #501 
Kennett Square, PA 19348 
610-444-5295 
www.BTR-Security.com 
MULTIPLE VECTORS OF ATTACK RESULT IN BREACHES 
Data Breaches 
Point of Sale Systems 
Email 
Web 
Mobile 
Lost/ Stolen Device 
FTP 
Cloud Services 
Employees 
Hacking 
Social Media
Data Security Compliance Advisors 
Certified Identity Theft Risk Management Specialists 
873 East Baltimore Pike #501 
Kennett Square, PA 19348 
610-444-5295 
www.BTR-Security.com 
THREE PRIMARY CAUSES DRIVE DATA BREACHES 
Data Breaches 
Monetization 
Negligence 
Ego
Data Security Compliance Advisors 
Certified Identity Theft Risk Management Specialists 
873 East Baltimore Pike #501 
Kennett Square, PA 19348 
610-444-5295 
www.BTR-Security.com 
IT Administrators 
harden their networks by building 
walls with Anti-Virus software to keep 
out the bad guys 
The Result 
is that Anti-Virus software can’t keep 
up and the bad guys are already 
inside your walls 
Malware 
76,000 new malware 
strains are released into 
the wild every day 
Credentials 
73% of online banking 
users reuse their 
passwords for non-financial 
websites 
PROVIDING VISIBILITY BEYOND THE IT WALLS
Data Security Compliance Advisors 
Certified Identity Theft Risk Management Specialists 
873 East Baltimore Pike #501 
Kennett Square, PA 19348 
610-444-5295 
www.BTR-Security.com 
THE PROBLEM YOU DIDN’T KNOW YOU HAVE 
IT Administrators 
harden their networks by building 
walls with Anti-Virus software to keep 
out the bad guys 
The Result 
is that Anti-Virus software can’t keep 
up and the bad guys are already 
inside your walls 
The Problem 
is that 76,000 new 
malware strains are 
released into the wild 
every day 
The Problem 
is that 73% of online 
banking users reuse 
their passwords for non-financial 
websites
Data Security Compliance Advisors 
Certified Identity Theft Risk Management Specialists 
873 East Baltimore Pike #501 
Kennett Square, PA 19348 
610-444-5295 
www.BTR-Security.com
Data Security Compliance Advisors 
Certified Identity Theft Risk Management Specialists 
873 East Baltimore Pike #501 
Kennett Square, PA 19348 
610-444-5295 
www.BTR-Security.com 
ANATOMY OF A SPEARPHISHING ATTACK 
Target 
Victim 
1 
Install 
Malware 
2 
Access 
Network 
3 
Collect & 
Transmit 
Data 
4 
Breach 
Event 
5
Data Security Compliance Advisors 
Certified Identity Theft Risk Management Specialists 
873 East Baltimore Pike #501 
Kennett Square, PA 19348 
610-444-5295 
www.BTR-Security.com 
THE LONG-TERM EFFECTS OF THE STRATFOR BREACH 
2005 
•An employee of a Kansas City investment bank registers for the free Stratfor newsletter 
December 2011 
•Stratfor becomes aware of its breach 
January 2012 
Stratfor initiates a massive breach response, including removing all related data from the Web 
February 2013 
•A hactivist group identifies the credential/password combo that still accesses investment bank’s webmail 
February 2013 
•Hacktivist group publishes investment bank’s client information on the company’s home page 
It took nearly eight years to feel the full effect of a duplicate password. 
Over 300,000 individuals had their personal information leaked, such as credit card numbers, addresses, phone numbers, and more. 
Employee used same password to access the Stratfor newsletter as his password to corporate webmail account.
Data Security Compliance Advisors 
Certified Identity Theft Risk Management Specialists 
873 East Baltimore Pike #501 
Kennett Square, PA 19348 
610-444-5295 
www.BTR-Security.com 
CASE STUDY: Target Corporation 
Nov. 27 – Dec. 15 2013 
•Hacker execute extended attach against Target’s point-of-sale system 
Dec. 18, 2013 
•News of the breach is reported by data and security blog KrebsOnSecurity 
Dec. 20, 2013 
•Target acknowledges the breach, saying it is under investigation 
Dec. 21, 2013 
•JP Morgan announces it is placing daily spending caps on affected customer debit cards 
Dec. 22, 2013 
•Customer traffic drops over the holiday season, resulting in a 3-4% drop in customer transactions 
Jan. 10, 2014 
•Target lowers its fourth- quarter financial projections, saying sales were “meaningfully weaker-than-expected” 
Current estimates of the total financial impact to Target is $200 million 
Target provided affected individuals with 12 months of identity theft protection and insurance coverage 
110M user accounts compromised , exposing credit and debit card numbers, CVN numbers, names, home addresses, e- mail addresses and or phone numbers
Data Security Compliance Advisors 
Certified Identity Theft Risk Management Specialists 
873 East Baltimore Pike #501 
Kennett Square, PA 19348 
610-444-5295 
www.BTR-Security.com 
“Ongoing forensic investigation has indicated that the intruder stole a vendor's credentials which were used to access our system.” Molly Snyder, Target Corporation January 2014
Data Security Compliance Advisors 
Certified Identity Theft Risk Management Specialists 
873 East Baltimore Pike #501 
Kennett Square, PA 19348 
610-444-5295 
www.BTR-Security.com 
Email Attack on Vendor Set Up Breach at Target* 
* Source: http://krebsonsecurity.com/ 
The breach at Target Corp. that exposed credit card and personal data on more than 110 million consumers appears to have begun with a malware- laced email phishing attack sent to employees at an HVAC firm that did business with the nationwide retailer, according to sources close to the investigation. 
Last week, KrebsOnSecurity reported that investigators believe the source of the Target intrusion traces back to network credentials that Target had issued to Fazio Mechanical, a heating, air conditioning and refrigeration firm in Sharpsburg, Pa.
Data Security Compliance Advisors 
Certified Identity Theft Risk Management Specialists 
873 East Baltimore Pike #501 
Kennett Square, PA 19348 
610-444-5295 
www.BTR-Security.com 
THE PROFILE OF AN ATTACKER 
The malware used to hack Target’s POS system was written by a Ukrainian teen 
•Andrey Hodirevski from southwest Ukraine is alleged to have carried out the attack from his home 
•The card details were sold through his own forum as well as other communities 
• investigated the breach when it occurred and was able to verify various discussions and identifiers pointing to this suspect
Data Security Compliance Advisors 
Certified Identity Theft Risk Management Specialists 
873 East Baltimore Pike #501 
Kennett Square, PA 19348 
610-444-5295 
www.BTR-Security.com 
CyberID-Sleuth™ IDENTIFIES PROVIDES EARLY WARNING AT TWO POINTS 
CyberID-Sleuth™ 
scours botnets, criminal 
chat rooms, blogs, websites and 
bulletin boards, Peer-to-Peer 
networks, forums, private 
networks, and other black market 
sites 24/7, 365 days a year 
CyberID-Sleuth™ 
harvests 1.4 million 
compromised credentials per 
month 
Dark 
Web CyberID-Sleuth™ 
identifies your data 
as it accesses criminal command-and- 
control servers from multiple 
geographies that national IP 
addresses cannot access 
CyberID-Sleuth™ 
harvests 7 million 
compromised IP addresses every 
two weeks
Data Security Compliance Advisors 
Certified Identity Theft Risk Management Specialists 
873 East Baltimore Pike #501 
Kennett Square, PA 19348 
610-444-5295 
www.BTR-Security.com 
CyberID-Sleuth™ Credential Monitoring * 
* Allow us to run your IP Address through our system too 
Tier I
Data Security Compliance Advisors 
Certified Identity Theft Risk Management Specialists 
873 East Baltimore Pike #501 
Kennett Square, PA 19348 
610-444-5295 
www.BTR-Security.com 
CyberID-Sleuth™ PROVIDES MORE THAN AUTOMATED ALERTS 
Credential 
Monitoring 
Identifying email addresses from a corporate domain 
that have been hacked, phished, or breached 
IP Address Scanning 
Identifying devices in a corporate network connected to a known malware command and control server 
Doxing awareness and 
hacktivist activity monitoring 
Locating the individuals and exchanges involved in intellectual property theft 
Hacks, exploits 
against networks, 
glitches, leaks, phishing/keylogging monitoring 
Identification of communities targeting brands, networks or IP addresses 
Identification of intellectual property distribution 
Identification of individuals posing 
a risk to any IP address 
Tier II 
Tier I
Data Security Compliance Advisors 
Certified Identity Theft Risk Management Specialists 
873 East Baltimore Pike #501 
Kennett Square, PA 19348 
610-444-5295 
www.BTR-Security.com 
Tier I 
Tier II
Data Security Compliance Advisors 
Certified Identity Theft Risk Management Specialists 
873 East Baltimore Pike #501 
Kennett Square, PA 19348 
610-444-5295 
www.BTR-Security.com 
THE COSTS OF A DATA BREACH ARE VARIED 
Detection or Discovery—”Activities that enable a company to reasonably detect the breach of personal data either at risk (in storage) or in motion” 
Escalation—”Activities necessary to report the breach of protected information to appropriate personnel within a specified time period.” 
Notification—physical mail, e-mail, general notice, telephone 
Victim Assistance—card replacement, credit monitoring offer, identity theft protection offer, access to customer service representatives 
Churn of existing customers / personnel 
Future Diminished Acquisition of customers or employees
Data Security Compliance Advisors 
Certified Identity Theft Risk Management Specialists 
873 East Baltimore Pike #501 
Kennett Square, PA 19348 
610-444-5295 
www.BTR-Security.com 
It’s time for you to know what the bad guys know

More Related Content

PPTX
Cyber ID Sleuth Data Security Forensics
PPTX
Target data breach presentation
PDF
Ce hv8 module 19 cryptography
ODP
Critical Controls Might Have Prevented the Target Breach
PDF
Target Breach Analysis
PPTX
Anatomy of a spear phishing attack
PPT
Identity Theft nigerian fraud cross border fraud
PPT
June NOW 2014
Cyber ID Sleuth Data Security Forensics
Target data breach presentation
Ce hv8 module 19 cryptography
Critical Controls Might Have Prevented the Target Breach
Target Breach Analysis
Anatomy of a spear phishing attack
Identity Theft nigerian fraud cross border fraud
June NOW 2014

What's hot (20)

PPTX
What i learned at the infosecurity isaca north america expo and conference 2019
PPTX
Hacking presentation
PDF
Verizon 2014 data breach investigation report and the target breach
PDF
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
PPTX
Data protection on premises, and in public and private clouds
PPTX
What Cybercriminals Want: Company Data – by United Security Providers
PDF
The good, the bad and the ugly of the target data breach
PDF
The Cost Of Hacking
PDF
2017 Phishing Trends & Intelligence Report: Hacking the Human
PPTX
How I'd hack into your business and how you can stop me!
PDF
Data Breach Detection: Are you ready for GDPR?
PDF
MMV Webinar 2. GDPR Insights. January 2018
PPTX
Next generation data protection and security for oracle users - gdpr blockc...
PPTX
Data breach
PDF
Protection on cyber fraud
PPTX
Application security meetup data privacy_27052021
PPTX
Unveiling the dark web. The importance of your cybersecurity posture
PPT
Identity Theft business
PDF
Asto card into
What i learned at the infosecurity isaca north america expo and conference 2019
Hacking presentation
Verizon 2014 data breach investigation report and the target breach
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
Data protection on premises, and in public and private clouds
What Cybercriminals Want: Company Data – by United Security Providers
The good, the bad and the ugly of the target data breach
The Cost Of Hacking
2017 Phishing Trends & Intelligence Report: Hacking the Human
How I'd hack into your business and how you can stop me!
Data Breach Detection: Are you ready for GDPR?
MMV Webinar 2. GDPR Insights. January 2018
Next generation data protection and security for oracle users - gdpr blockc...
Data breach
Protection on cyber fraud
Application security meetup data privacy_27052021
Unveiling the dark web. The importance of your cybersecurity posture
Identity Theft business
Asto card into
Ad

Viewers also liked (20)

PDF
Consultorias en Seguridad Integral
PDF
Paco guzmán.
PDF
Educational Prospectus 2011
PPTX
LinkedIn for Mergers and Acquisitions
DOCX
Shankar kandavel resume new
PPTX
Presentacion nb21 sinvideo
PDF
How to De-Risk the Creation and Moderation of User-Generated Content
PPTX
empresa creada para la materia de p. organizacional
PDF
AAA CTLA 2009 IFRS Panel Presentation in New York
PPTX
Web Engineering - Web Application Testing
PDF
169 coral
PDF
Imaginea - SugarCRM iPhone App - User Guide
PDF
Gianluca Diegoli [mini]marketing 91 tesi per un marketing diverso
PDF
Tecfluid Perfil de Empresa
PPTX
2015 SBDC Social Media Seminar (March)
PPS
Micro autos
PDF
Mac OS X
PDF
Vidapremium Magazine 25
PPT
Misra,D.C.(2009) Defining Egovernment MDI, Gurgaon 13.2.2009
PPT
Artigas 3
Consultorias en Seguridad Integral
Paco guzmán.
Educational Prospectus 2011
LinkedIn for Mergers and Acquisitions
Shankar kandavel resume new
Presentacion nb21 sinvideo
How to De-Risk the Creation and Moderation of User-Generated Content
empresa creada para la materia de p. organizacional
AAA CTLA 2009 IFRS Panel Presentation in New York
Web Engineering - Web Application Testing
169 coral
Imaginea - SugarCRM iPhone App - User Guide
Gianluca Diegoli [mini]marketing 91 tesi per un marketing diverso
Tecfluid Perfil de Empresa
2015 SBDC Social Media Seminar (March)
Micro autos
Mac OS X
Vidapremium Magazine 25
Misra,D.C.(2009) Defining Egovernment MDI, Gurgaon 13.2.2009
Artigas 3
Ad

Similar to CyberID-Sleuth (20)

PPTX
Certified Banking TPM - Module 3 powerpoint presentation
PPTX
Cyber Frontline - Level 2 - Module 2.pptx
PPTX
Certified Banking Security C-Suite - Module 1.pptx
PDF
Cybersecurity for Marketing
PDF
Axxera End Point Security Protection
PPTX
Cyber Frontline - Level 3 - Module 2.pptx
PPT
Security Manager - Slides - Module 6 Powerpoint Presentation
PPT
Security Manager - Slides - Module 6 Powerpoint Presentation
PPTX
Cyber Frontline - Level 3 - Module 1.pptx
PPTX
Updated Cyber Security and Fraud Prevention Tools Tactics
PPTX
Cyber Frontline - Level 3 - Module 4.pptx
PPTX
Baker Tilly Presents: Emerging Trends in Cybersecurity
PDF
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
PPTX
Cyber Frontline - Level 1 - Module 2.pptx
PPTX
Protecting Client Data 11.09.11
PPT
Cyber-Security: A Shared Responsibility -- November 2013
PPT
Cyber Facts and Prevention Presentation Gianino
PPTX
Cap Tech Talks Webinar April=l 2020 business email cybersecurity
PPTX
Breakfast Briefings - February 2018
PDF
Data Privacy
Certified Banking TPM - Module 3 powerpoint presentation
Cyber Frontline - Level 2 - Module 2.pptx
Certified Banking Security C-Suite - Module 1.pptx
Cybersecurity for Marketing
Axxera End Point Security Protection
Cyber Frontline - Level 3 - Module 2.pptx
Security Manager - Slides - Module 6 Powerpoint Presentation
Security Manager - Slides - Module 6 Powerpoint Presentation
Cyber Frontline - Level 3 - Module 1.pptx
Updated Cyber Security and Fraud Prevention Tools Tactics
Cyber Frontline - Level 3 - Module 4.pptx
Baker Tilly Presents: Emerging Trends in Cybersecurity
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
Cyber Frontline - Level 1 - Module 2.pptx
Protecting Client Data 11.09.11
Cyber-Security: A Shared Responsibility -- November 2013
Cyber Facts and Prevention Presentation Gianino
Cap Tech Talks Webinar April=l 2020 business email cybersecurity
Breakfast Briefings - February 2018
Data Privacy

Recently uploaded (20)

PDF
Laughter Yoga Basic Learning Workshop Manual
PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
PDF
IFRS Notes in your pocket for study all the time
PPT
Data mining for business intelligence ch04 sharda
PDF
Nidhal Samdaie CV - International Business Consultant
PPTX
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
PDF
MSPs in 10 Words - Created by US MSP Network
PDF
Chapter 5_Foreign Exchange Market in .pdf
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PDF
Unit 1 Cost Accounting - Cost sheet
PPTX
Lecture (1)-Introduction.pptx business communication
PDF
Tata consultancy services case study shri Sharda college, basrur
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
Types of control:Qualitative vs Quantitative
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
DOCX
Euro SEO Services 1st 3 General Updates.docx
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PPTX
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
Laughter Yoga Basic Learning Workshop Manual
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
IFRS Notes in your pocket for study all the time
Data mining for business intelligence ch04 sharda
Nidhal Samdaie CV - International Business Consultant
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
MSPs in 10 Words - Created by US MSP Network
Chapter 5_Foreign Exchange Market in .pdf
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
Unit 1 Cost Accounting - Cost sheet
Lecture (1)-Introduction.pptx business communication
Tata consultancy services case study shri Sharda college, basrur
ICG2025_ICG 6th steering committee 30-8-24.pptx
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Types of control:Qualitative vs Quantitative
Ôn tập tiếng anh trong kinh doanh nâng cao
Euro SEO Services 1st 3 General Updates.docx
Roadmap Map-digital Banking feature MB,IB,AB
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise

CyberID-Sleuth

  • 1. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com
  • 2. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com
  • 3. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com A DATA BREACH of “PII” IS DEFINED AS A FIRST NAME, FIRST INITIAL OR LAST NAME PLUS: A Social Security Number A Driver’s License Number or State-Issued ID Number An Account Number, Credit Card Number or Debit Card Number Combined with any Security Code, Access Code, PIN or Password
  • 4. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com A DATA BREACH IS DEFINED AS ANY INTURDER TO YOUR ENTERPRISE Your Trade Secrets Access To Your Servers By a “Hactivism” Criminal Whatever Is Important To Your Enterprise
  • 5. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com When a hacker gets anyone’s credentials, it is easy for them to build a profile of the individual to gain even more information from social media sites. From there they can “spearPhish” more information from the victim OR THEIR CONTACTS! Examples of profile building follow:
  • 6. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com LOST CREDENTIALS PUT YOU UNDER ATTACK Name: Lucas Newman Extraction Date: 12/30/20XX Email: lnewman@firstrepublic.com Hometown: Portland, Oregon Hashed Password: 16b90b178faff0e3e2f92ec647b50b11 Occupation: Managing Director and Portfolio Manager Extraction Type: Hack Source:
  • 7. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com Name: Robyn Mondin Extraction Date: 12/30/20XX Email: robyn.mondin@firstcitizens.com Hometown: Asheville, North Carolina Clear Password: 36f76603a2212c7fc6ff4fb8ec77a64c Occupation: Mortgage Banker Extraction Type: Hack Source:
  • 8. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com EVERY EMPLOYEE, PARTNER, AND SYSTEM IS A WEAK LINK Name: Pat Grundish Extraction Date: 8/13/20XX Email: pat.grundish@53.com Hometown: Englewood, Ohio Clear Password: p_grundish Occupation: Mortgage Loan Officer Extraction Type: Hack Source: Name: Mandy Knerr Extraction Date: 8/13/20XX Email: mandy.knerr@53.com Hometown: Huber Heights, Ohio Clear Password: m_knerr Occupation: Sr. Marketplace Loan Officer Extraction Type: Hack Source:
  • 9. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com MULTIPLE VECTORS OF ATTACK RESULT IN BREACHES Data Breaches Point of Sale Systems Email Web Mobile Lost/ Stolen Device FTP Cloud Services Employees Hacking Social Media
  • 10. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com THREE PRIMARY CAUSES DRIVE DATA BREACHES Data Breaches Monetization Negligence Ego
  • 11. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com IT Administrators harden their networks by building walls with Anti-Virus software to keep out the bad guys The Result is that Anti-Virus software can’t keep up and the bad guys are already inside your walls Malware 76,000 new malware strains are released into the wild every day Credentials 73% of online banking users reuse their passwords for non-financial websites PROVIDING VISIBILITY BEYOND THE IT WALLS
  • 12. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com THE PROBLEM YOU DIDN’T KNOW YOU HAVE IT Administrators harden their networks by building walls with Anti-Virus software to keep out the bad guys The Result is that Anti-Virus software can’t keep up and the bad guys are already inside your walls The Problem is that 76,000 new malware strains are released into the wild every day The Problem is that 73% of online banking users reuse their passwords for non-financial websites
  • 13. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com
  • 14. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com ANATOMY OF A SPEARPHISHING ATTACK Target Victim 1 Install Malware 2 Access Network 3 Collect & Transmit Data 4 Breach Event 5
  • 15. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com THE LONG-TERM EFFECTS OF THE STRATFOR BREACH 2005 •An employee of a Kansas City investment bank registers for the free Stratfor newsletter December 2011 •Stratfor becomes aware of its breach January 2012 Stratfor initiates a massive breach response, including removing all related data from the Web February 2013 •A hactivist group identifies the credential/password combo that still accesses investment bank’s webmail February 2013 •Hacktivist group publishes investment bank’s client information on the company’s home page It took nearly eight years to feel the full effect of a duplicate password. Over 300,000 individuals had their personal information leaked, such as credit card numbers, addresses, phone numbers, and more. Employee used same password to access the Stratfor newsletter as his password to corporate webmail account.
  • 16. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com CASE STUDY: Target Corporation Nov. 27 – Dec. 15 2013 •Hacker execute extended attach against Target’s point-of-sale system Dec. 18, 2013 •News of the breach is reported by data and security blog KrebsOnSecurity Dec. 20, 2013 •Target acknowledges the breach, saying it is under investigation Dec. 21, 2013 •JP Morgan announces it is placing daily spending caps on affected customer debit cards Dec. 22, 2013 •Customer traffic drops over the holiday season, resulting in a 3-4% drop in customer transactions Jan. 10, 2014 •Target lowers its fourth- quarter financial projections, saying sales were “meaningfully weaker-than-expected” Current estimates of the total financial impact to Target is $200 million Target provided affected individuals with 12 months of identity theft protection and insurance coverage 110M user accounts compromised , exposing credit and debit card numbers, CVN numbers, names, home addresses, e- mail addresses and or phone numbers
  • 17. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com “Ongoing forensic investigation has indicated that the intruder stole a vendor's credentials which were used to access our system.” Molly Snyder, Target Corporation January 2014
  • 18. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com Email Attack on Vendor Set Up Breach at Target* * Source: http://krebsonsecurity.com/ The breach at Target Corp. that exposed credit card and personal data on more than 110 million consumers appears to have begun with a malware- laced email phishing attack sent to employees at an HVAC firm that did business with the nationwide retailer, according to sources close to the investigation. Last week, KrebsOnSecurity reported that investigators believe the source of the Target intrusion traces back to network credentials that Target had issued to Fazio Mechanical, a heating, air conditioning and refrigeration firm in Sharpsburg, Pa.
  • 19. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com THE PROFILE OF AN ATTACKER The malware used to hack Target’s POS system was written by a Ukrainian teen •Andrey Hodirevski from southwest Ukraine is alleged to have carried out the attack from his home •The card details were sold through his own forum as well as other communities • investigated the breach when it occurred and was able to verify various discussions and identifiers pointing to this suspect
  • 20. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com CyberID-Sleuth™ IDENTIFIES PROVIDES EARLY WARNING AT TWO POINTS CyberID-Sleuth™ scours botnets, criminal chat rooms, blogs, websites and bulletin boards, Peer-to-Peer networks, forums, private networks, and other black market sites 24/7, 365 days a year CyberID-Sleuth™ harvests 1.4 million compromised credentials per month Dark Web CyberID-Sleuth™ identifies your data as it accesses criminal command-and- control servers from multiple geographies that national IP addresses cannot access CyberID-Sleuth™ harvests 7 million compromised IP addresses every two weeks
  • 21. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com CyberID-Sleuth™ Credential Monitoring * * Allow us to run your IP Address through our system too Tier I
  • 22. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com CyberID-Sleuth™ PROVIDES MORE THAN AUTOMATED ALERTS Credential Monitoring Identifying email addresses from a corporate domain that have been hacked, phished, or breached IP Address Scanning Identifying devices in a corporate network connected to a known malware command and control server Doxing awareness and hacktivist activity monitoring Locating the individuals and exchanges involved in intellectual property theft Hacks, exploits against networks, glitches, leaks, phishing/keylogging monitoring Identification of communities targeting brands, networks or IP addresses Identification of intellectual property distribution Identification of individuals posing a risk to any IP address Tier II Tier I
  • 23. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com Tier I Tier II
  • 24. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com THE COSTS OF A DATA BREACH ARE VARIED Detection or Discovery—”Activities that enable a company to reasonably detect the breach of personal data either at risk (in storage) or in motion” Escalation—”Activities necessary to report the breach of protected information to appropriate personnel within a specified time period.” Notification—physical mail, e-mail, general notice, telephone Victim Assistance—card replacement, credit monitoring offer, identity theft protection offer, access to customer service representatives Churn of existing customers / personnel Future Diminished Acquisition of customers or employees
  • 25. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com It’s time for you to know what the bad guys know