iTnews

Merchants blind to data breaches

By Darren Pauli on May 18, 2011 5:43PM
Merchants blind to data breaches

You can catch most hackers by reviewing logs and getting to know your web site visitors.

Merchants were responsible for detecting fraud-related data breaches in only 7 percent of cases according to numbers crunched by digital forensics company Klein and Co.

Acquiring banks discovered the lion's share data breaches which equated to about 40 percent of the total reported incidents.

About a quarter of the breaches were noticed and reported by rival banks.

The low detection rate of merchants was due to both the sophisticated fraud detection systems in place at banks, and often shonky security practices in the breached organisations.

"Many businesses don't check their logs or traffic," director Nick Klein said. "Much of the threat is from insiders, and even big businesses will have bad security and their sensitive information will be sold elsewhere."

Many external attacks can be detected by abnomalities in traffic, but this requires an understanding of regular traffic flows.

Administrators should know where vistors came from and what areas of a web site they accessed.

"Know your customer, know your logs," Klein said. "The kinds of activity vistors are doing should be consistent with what a site does."

Logs would reveal IP addresses from locations that do not match the demongraphic of visitors, and this should be taken as a red flag, Klein said.

"Almost all of the attacks come from overseas. You'll get a feel for it and you'll see the patterns of activity in your logs."

Klein said attackers typically do not cover their tracks.

One flag to look for is automated script, a potential sign of attack that runs faster than script inputted by a user. The two are often used in concert.

Of external attacks that resulted in data breaches, SQL injection was responsible for 31 percent of cases. Malware was fingered in 23 percent of the breaches and stolen adminstrative credentials were identitfied in 18 percent of cases.

Broadly, the detection of breaches was more difficult in rarer attack vectors.

SQL injection was also the most popular method of exfiltrating data. The methods could not be unconfirmed in about a quarter of cases, and access to administratve functions was blamed for 10 percent of breaches.

"In an office, only a few people would normally have admin rights, so you should give them their own unique access IDs and lock the accounts down," Klein  said.

Klien said there was "no clear pattern" to determine what businesses are the most vulnerable, however fraudsters tended to target less high-profile businesses.

Got a news tip for our journalists? Share it with us anonymously here.

Copyright © SC Magazine, Australia

Tags:
auscertauscert 2011forensicshackerslogsnetworkssecurity

Partner Content

5 essential digital transformation ideas
Promoted Content 5 essential digital transformation ideas
Don't miss Australia’s premiere IoT Conference on 9th June
Promoted Content Don't miss Australia’s premiere IoT Conference on 9th June
Top 5 Benefits of Managed IT Services
Promoted Content Top 5 Benefits of Managed IT Services
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Darren Pauli
May 18 2011
5:43PM
0 Comments

Related Articles

  • Federal Court puts cyber security onus on financial services firms
  • US says advanced hackers can hijack critical infrastructure
  • US and European partners take down hacker website RaidForums
  • British police probing hackers Lapsus$ say 2 teenagers charged
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

NSW digital driver's licences 'easily forgeable'

NSW digital driver's licences 'easily forgeable'

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co's 250Mbps and gigabit growth is finally clear

Kmart Australia re-platforms ecommerce site to AWS

Kmart Australia re-platforms ecommerce site to AWS

NBN Co sizes up six-figure customer exodus a year to fixed wireless

NBN Co sizes up six-figure customer exodus a year to fixed wireless

Digital Nation

CTO Juergen Mueller offers a glimpse into SAP's metaverse play
CTO Juergen Mueller offers a glimpse into SAP's metaverse play
COVER STORY: Data and IoT set digital agriculture on a sustainable future
COVER STORY: Data and IoT set digital agriculture on a sustainable future
Why do DeFi and DAOs matter to business?
Why do DeFi and DAOs matter to business?
Lendlease launches its own metaverse in Milan
Lendlease launches its own metaverse in Milan
COVER STORY: A Year in the Metaverse
COVER STORY: A Year in the Metaverse
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.