60
Who is the Next Target and How is Big Data Related? Ulf Mattsson CTO, Protegrity ulf . mattsson [at] protegrity . com

Who is the next target and how is big data related ulf mattsson

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Who is the next target and how is big data related   ulf mattsson

Who is the Next Target and

How is Big Data Related?

Ulf MattssonCTO, Protegrity

ulf . mattsson [at] protegrity . com

Page 2: Who is the next target and how is big data related   ulf mattsson

The Changing Threat

Landscape

2

Page 3: Who is the next target and how is big data related   ulf mattsson

Data loss worries IT pros most

3

Source: 2014 Trustwave Security Pressures Report

Page 4: Who is the next target and how is big data related   ulf mattsson

Targeted Malware Topped the Threats

4

62% said that the pressure to protect from data breaches also increased over the past year.

Source: 2014 Trustwave Security Pressures Report

Page 5: Who is the next target and how is big data related   ulf mattsson

US and Canada - Targeted Malware Top Threat

5

In the United States and Canada, targeted malware was the top threat IT pros felt pressured to secure against, and in the U.K. and Germany, the top threat was phishing/social engineering. Respondents in each country surveyed said viruses and worms caused the lowest pressure.

Source: 2014 Trustwave Security Pressures Report

Page 6: Who is the next target and how is big data related   ulf mattsson

6

http://www.ey.com/Publication/vwLUAssets/EY_-_2013_Global_Information_Security_Survey/$FILE/EY-GISS-Under-cyber-attack.pdf

Page 7: Who is the next target and how is big data related   ulf mattsson

7

Source: Symantec 2013

The Cost of Cyber Crime

Page 8: Who is the next target and how is big data related   ulf mattsson

Organizations worldwide are not "sufficiently protected" against cyberattac

Cyberattacks fallout could cost the global economy $3 trillion by 2020

The report states that if "attackers continue to get better more quickly than defenders," as is presently the case, "this could result in a world where a 'cyberbacklash' decelerates digitization."

Risk of Cyberattacks is a Real and Growing Threat

8

Source: McKinsey report on enterprise IT security implications released in January 2014.

Page 9: Who is the next target and how is big data related   ulf mattsson

74 targeted cyberattacks per day between July 2012 and June 2013, with the energy sector accounting for 16.3% of them, which put it in second place behind government/public sector at 25.4%.

The U.S. government's Department of Homeland Security (DHS) reported last year that its Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to more than 200 incidents between Oct. 2012 and May 2013 — with 53% aimed at the energy sector.

There have, so far, not been any successful catastrophic attacks on the grid, and there is ongoing debate about how high the risk is for what both former Defense secretary Leon Panetta and former Homeland Security secretary Janet Napolitano called a "cyber Pearl Harbor" attack.

Source: www.csoonline.com/article/748580/energy-sector-a-prime-target-for-cyber-attacks

Energy Sector a Prime Target for Cyber Attacks

9

Page 10: Who is the next target and how is big data related   ulf mattsson

10

Breach Discovery Methods

Verizon 2013 Data-breach-investigations-report

Page 11: Who is the next target and how is big data related   ulf mattsson

11

Security Improving but We Are Losing Ground

Page 12: Who is the next target and how is big data related   ulf mattsson

Identity Theft

12

Source: www.pcworld.com/article/2088920/target-credit-card-data-was-sent-to-server-in-russia.html

Page 13: Who is the next target and how is big data related   ulf mattsson

The Wall Street Journal reported that financial institutions have spent big bucks—more than $200 million alone in the case of the Target episode—to ease our concerns

• The vast majority of that total ($172 million) covers the costs of replacing cards that have been compromised

Half of American adults said they are “extremely concerned” about their personal data when paying for goods at stores with plastic, according to a recent Associated Press-GfK poll

Source: www.cuinsight.com/target-shoppers-shrug-off-massive-credit-card-data-breach.html

Half of Americans Worry about Identity Theft

13

Page 14: Who is the next target and how is big data related   ulf mattsson

“Last year, some 13.1 million consumers suffered identity fraud,”

Those numbers don’t include the more than 110 million victims of the holiday breach, which, as it ripples through the population, will send the figures up like a rocket

A stranger takes over someone’s life about once every two seconds

And 1 in 3 of us now already has undesired personal experience with that upsetting fact, according to

• Even worse, that number is certain to grow dramatically this year

“Four years ago, the number of identity-fraud victims was 1 in 9, and last year it was 1 in 3. We think the way it is going, and given the … breach, that number will likely increase.”

Source: Javelin Strategy & Research’s 2014 Identity Fraud Report and nypost.com/2014/02/22/identity-crisis-exploding-with-massive-data-breaches/

Identity Theft Exploding with Massive Data Breaches

14

Page 15: Who is the next target and how is big data related   ulf mattsson

In many cases, an identity thief uses a legitimate taxpayer’s identity to fraudulently file a tax return and claim a refund

The agency’s work on identity theft and refund fraud continues to grow. For the 2014 filing season, the IRS has expanded its efforts to better protect taxpayers and help victims

Taxpayers can call the IRS’ Identity Protection Specialized Unit at 800-908-4490

Source: www.burlingtoncountytimes.com/business/irs-warns-about-scams/article_8d01916b-1af0-5960-8790-7991ef0bc20a.html

IRS Warns about Identity Theft

15

Page 16: Who is the next target and how is big data related   ulf mattsson

Target Data Breach

16

Page 17: Who is the next target and how is big data related   ulf mattsson

iSIGHT Partners has a deeply comprehensive understanding of the entire code family as well as that from several other victims

The USSS has permitted us to share limited details surrounding these types of attacks

iSIGHT partnered with the U.S. Secret Service

17

Page 18: Who is the next target and how is big data related   ulf mattsson

Credentials were stolen from Fazio Mechanical in a malware-injecting phishing attack sent to employees of the firm by email

• Resulted in the theft of at least 40 million customer records containing financial data such as debit and credit card information.

• In addition, roughly 70 million accounts were compromised that included addresses and mobile numbers.

The data theft was caused by the installation of malware on the firm's point of sale machines

• Free version of Malwarebytes Anti-Malware was used by Target

The subsequent file dump containing customer data is reportedly flooding the black market

• could be used to pilfer cash from accounts, be the starting point for the manufacture of fake bank cards, or provide data required for identity theft.

Source: Brian Krebs and www.zdnet.com/how-hackers-stole-millions-of-credit-card-records-from-target-7000026299/

How The Breach at Target Went Down

18

Page 19: Who is the next target and how is big data related   ulf mattsson

Memory Scraping

19

Page 20: Who is the next target and how is big data related   ulf mattsson

In its warning titled, "Recent Cyber Intrusion Events Directed Toward Retail Firms", the FBI said in the past year it has uncovered around 20 cases of cyberattacks against retailers year that utilized similar methods to those uncovered in the Target incident

"We believe POS malware crime will continue to grow over the near term, despite law enforcement and security firms' actions to mitigate it," said the FBI in the report, seen by Reuters

Source: searchsecurity.techtarget.com/news/2240213143/FBI-warns-of-memory-scraping-malware-in-wake-of-Target-breach

FBI warns of Memory-scraping Malware in wake of Target breach

20

Page 21: Who is the next target and how is big data related   ulf mattsson

Researchers at RSA's First Watch cybersecurity team:

• Similar to the gang that tapped into the point-of-sales systems at Target, Neiman-Marcus and Michaels

• That gang used a memory parsing program called POSRAM.

• This most recently discovered ring of thieves makes use of a similar piece of malware dubbed ChewBacca

Source:www.usatoday.com/story/cybertruth/2014/02/03/hacking-of-point-of-sales-systems-escalates/5060523/

Researchers: Another ring of Attackers on Retailers

21

Page 22: Who is the next target and how is big data related   ulf mattsson

The stolen credit card numbers of millions of Target shoppers took an international trip—to Russia

“The intrusion operators displayed innovation and a high degree of skill in orchestrating the various components of the activity,” according to a Jan. 14 report from iSight Partners, a Dallas-based information security company.

Security company Seculert found that data stolen in the Target breach was received by a compromised U.S. server, then sent to a Russian server.

Malware Collected 11GB of Data from Target

22

Page 23: Who is the next target and how is big data related   ulf mattsson

Memory Scraping Malware – Target Breach

Web Server

Payment CardTerminal

Point Of Sale Application

Memory Scraping Malware

Authorization,Settlement

Russia

Page 24: Who is the next target and how is big data related   ulf mattsson

Attacks using memory scrapers can target any application that processes credit card numbers

In the past, memory scraping often required the attacker to have a small amount of target environment knowledge to configure the capture tool

• The trend is toward generic discovery tools that could identify the desired information in a list of preconfigured processes or all running processes

Source: http://www2.trustwave.com/rs/trustwave/images/2013-Global-Security-Report.pdf

Attacks using memory scrapers

24

Page 25: Who is the next target and how is big data related   ulf mattsson

2014 Trustwave Security Pressures Report• The rate and sophistication of malware and data

breaches continue to accelerate, a trend that is proving seemingly impossible for businesses to counter.

Memory scraping• Used at Target: 110 million …

• It’s next to impossible to stop data leakage.

• You can’t beat it completely

• detecting or intercepting related malware-dropping attacks aimed at those POS devices may be quite difficult to detect.

• That's because attackers can use antivirus evasion techniques or packing tools to give the malware executable a never-before-seen checksum.

Malware

25

Page 26: Who is the next target and how is big data related   ulf mattsson

Old security is like "boiling the ocean“ • Since you are trying to “patch” all possible data paths

and sensitive data stores, and

May not even find a trace of the attack.• Malware

• Data leaks

Old Security Approaches

26

Page 27: Who is the next target and how is big data related   ulf mattsson

Proactive Data Security

27

Page 28: Who is the next target and how is big data related   ulf mattsson

28

The Changing Thechnology Landscape

Page 29: Who is the next target and how is big data related   ulf mattsson

Chip-and-PIN or EMV, is more secure than the current magnetic stripe technology

Cyber criminals can “easily create cloned cards” from magnetic stripe data

Major credit card companies have placed a deadline on U.S. merchants to adopt EMV technology by October of 2015, or face increased liability of fraud

Source: news.medill.northwestern.edu/chicago/news.aspx?id=228123

Is it Impossible to Prevent Data Breaches?

29

Page 30: Who is the next target and how is big data related   ulf mattsson

Use Big Data to Analyze Abnormal Traffic Pattern

Web Server

Payment CardTerminal

Point Of Sale Application

Memory Scraping Malware

Authorization,Settlement

Russia

Big Data

AnalyticsSIEM

Page 31: Who is the next target and how is big data related   ulf mattsson

Don’t just fix yesterdays problems

Compliance vs Security

Think like a hacker

Malware & Memory Scraping

Protect the Data Flow with Tokenization

Use Big Data to Analyze Data Traffic

31

Reactionary vs Proactive Data Security

Page 32: Who is the next target and how is big data related   ulf mattsson

Big Data

Page 33: Who is the next target and how is big data related   ulf mattsson

Hadoop• Designed to handle the emerging “4 V’s”

• Massively Parallel Processing (MPP)

• Elastic scale

• Usually Read-Only

• Allows for data insights on massive, heterogeneous data sets

• Includes an ecosystem of components:

What is Big Data?

33

Hive

MapReduce

HDFS

Physical Storage

Pig Other

Application Layers

Storage Layers

Page 34: Who is the next target and how is big data related   ulf mattsson

34

Source: Gartner

Has Your Organization Already Invested in Big Data?

Page 35: Who is the next target and how is big data related   ulf mattsson

35

Vulnerabilities in Big

Data

Page 36: Who is the next target and how is big data related   ulf mattsson

Holes in Big Data…

36

Source: Gartner

Page 37: Who is the next target and how is big data related   ulf mattsson

Many Ways to Hack Big Data

Source: http://nosql.mypopescu.com/post/1473423255/apache-hadoop-and-hbase

37

HDFS(Hadoop Distributed File System)

MapReduce (Job Scheduling/Execution System)

Hbase (Column DB)

Pig (Data Flow) Hive (SQL) Sqoop

ETL Tools BI Reporting RDBMS

Avr

o (S

eria

lizat

ion)

Zoo

keep

er (

Coo

rdin

atio

n)

Hackers

PrivilegedUsers

UnvettedApplications

OrAd Hoc

Processes

Page 38: Who is the next target and how is big data related   ulf mattsson

The Insider Threat

38

Page 39: Who is the next target and how is big data related   ulf mattsson

Big Data and Cloud environments are designed for access and deep insight into vast data pools

Data can monetized not only by marketing analytics, but through sale or use by a third party

The more accessible and usable the data is, the greater this ROI benefit can be

Security concerns and regulations are often viewed as opponents to data insight

Sensitive Data Insight & Usability

39

Page 40: Who is the next target and how is big data related   ulf mattsson

Big Data (Hadoop) was designed for data access, not security

Security in a read-only environment introduces new challenges

Massive scalability and performance requirements

Sensitive data regulations create a barrier to usability, as data cannot be stored or transferred in the clear

Transparency and data insight are required for ROI on Big Data

Big Data Vulnerabilities and Concerns

40

Page 41: Who is the next target and how is big data related   ulf mattsson

Threats to Big Data

41

Page 42: Who is the next target and how is big data related   ulf mattsson

The honey pot idea is a 10+ years old trick based on fake data (in a pot) and redirection of requests:

• Great for monitor what attackers are doing.

• A modern approach should be based on tokenization with fake data “everywhere” instead of in “a pot”.

Attacks on Big Data – Honey Pot

42

Page 43: Who is the next target and how is big data related   ulf mattsson

The old perimeter security and encryption :• The discussion should be how to “balance

between security and insight”.

Attacks on Big Data – Perimeter & Encryption

43

Page 44: Who is the next target and how is big data related   ulf mattsson

The challenge of maintaining a “classic” access control model:

• The “new approach” should be based on building the protection into the data (tokenization)

• Not be based only on preventing access to data

Attacks on Big Data – Access Control

44

Page 45: Who is the next target and how is big data related   ulf mattsson

The “data inference” (re-identification) problem:

• New problem

• Not a Big Data problem

A “balance between security and insight” is the right approach

The de-tokenization-policy should evaluate combination of data fields that are accessed over time.

Attacks on Big Data – Data Inference

45

Page 46: Who is the next target and how is big data related   ulf mattsson

The “the lack of analytical tools” • Can it prevent an attacker from finding sensitive

data?

Attackers are simply looking for sensitive records

• Not interested in advanced analytical results.

The attacker will find points in the data flow where sensitive data is easier to find

Attacks on Big Data – Analytical Tools

46

Page 47: Who is the next target and how is big data related   ulf mattsson

Evolution of

Data Security

47

Page 48: Who is the next target and how is big data related   ulf mattsson

Coarse Grained Security• Access Controls

• Volume Encryption

• File Encryption

Fine Grained Security• Access Controls

• Field Encryption (AES & )

• Masking

• Tokenization

• Vaultless Tokenization

Evolution of Data Security Methods

48

Time

Page 49: Who is the next target and how is big data related   ulf mattsson

Use of Enabling Technologies

Access controls

Database activity monitoring

Database encryption

Backup / Archive encryption

Data masking

Application-level encryption

Tokenization

1%

18%

30%

21%

28%

7%

22%

91%

47%

35%

39%

28%

29%

23%

Evaluating Current Use

49

Page 50: Who is the next target and how is big data related   ulf mattsson

Old and flawed:Minimal access levels so people can only carry out their jobs

Access Control

50

AccessPrivilege

Level

Risk

IHigh

ILow

High –

Low –

Page 51: Who is the next target and how is big data related   ulf mattsson

Applying the protection profile to the content of

data fields allows for a wider range of authority options

51

Page 52: Who is the next target and how is big data related   ulf mattsson

AccessPrivilege

Level

Risk

IHigh

ILow

High –

Low –

Old:Minimal access levels – Least

Privilege to avoid high risks

New:Much greater

flexibility and lower risk in data accessibility

How the New Approach is Different

52

Page 53: Who is the next target and how is big data related   ulf mattsson

Reduction of Pain with New Protection Techniques

53

1970 2000 2005 2010

High

Low

Pain& TCO

Strong Encryption Output:AES, 3DES

Format Preserving EncryptionDTP, FPE

Vault-based Tokenization

Vaultless Tokenization

Input Value: 3872 3789 1620 3675

!@#$%a^.,mhu7///&*B()_+!@

8278 2789 2990 2789

8278 2789 2990 2789

Format Preserving

Greatly reduced Key Management

No Vault

8278 2789 2990 2789

Page 54: Who is the next target and how is big data related   ulf mattsson

Fine Grained Data Security Methods

54

Vault-based Tokenization Vaultless TokenizationFootprint Large, Expanding. Small, Static.

High Availability, Disaster Recovery

Complex, expensive replication required.

No replication required.

Distribution Practically impossible to distribute geographically.

Easy to deploy at different geographically distributed locations.

Reliability Prone to collisions. No collisions.

Performance, Latency, and

Scalability

Will adversely impact performance & scalability.

Little or no latency. Fastest industry tokenization.

Vault-based vs. Vaultless Tokenization

Page 55: Who is the next target and how is big data related   ulf mattsson

Fine Grained Data Security Methods

55

Tokenization and Encryption are Different

Used Approach Cipher System Code System

Cryptographic algorithms

Cryptographic keys

Code books

Index tokens

Source: McGraw-HILL ENCYPLOPEDIA OF SCIENCE & TECHNOLOGY

TokenizationEncryption

Page 56: Who is the next target and how is big data related   ulf mattsson

PCI DSS 3.0• Split knowledge and dual control

PCI SSC Tokenization Task Force• Tokenization and use of HSM

Card Brands – Visa, MC, AMEX …• Tokens with control vectors

ANSI X9• Tokenization and use of HSM

The Future of Tokenization

56

Page 57: Who is the next target and how is big data related   ulf mattsson

I

Format

Preserving

Encryption

Security of Different Protection Methods

I

Vaultless

Data

Tokenization

I

AES CBC

Encryption

Standard

I

Basic

Data

Tokenization

57

High

Low

Security Level

Page 58: Who is the next target and how is big data related   ulf mattsson

10 000 000 -

1 000 000 -

100 000 -

10 000 -

1 000 -

100 -

Transactions per second*

I

Format

Preserving

Encryption

Speed of Different Protection Methods

I

Vaultless

Data

Tokenization

I

AES CBC

Encryption

Standard

I

Vault-based

Data

Tokenization

*: Speed will depend on the configuration

58

Page 59: Who is the next target and how is big data related   ulf mattsson

Type of Data

Use Case

IStructured

How Should I Secure Different Data?

IUn-structured

Simple –

Complex –

PCI

PHI

PII

Encryption of Files

CardHolder

Data

Tokenization of Fields

ProtectedHealth

Information

59

Personally Identifiable Information

Page 60: Who is the next target and how is big data related   ulf mattsson

Protegrity Summary

Proven enterprise data security software and innovation leader

• Sole focus on the protection of data

• Patented Technology, Continuing to Drive Innovation

Cross-industry applicability• Retail, Hospitality, Travel

and Transportation

• Financial Services, Insurance, Banking

• Healthcare

• Telecommunications, Media and Entertainment

• Manufacturing and Government

60