Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Don't Be a Target!

1,310 views

Published on

For the last few months we've watched with fascination the developing story of the data breach at Target, Neiman Marcus, Michael's and others. In this session we'll take a look at how the thieves accomplished this feat including what they do with their takings, how it might have been prevented, and why the bank may not care all that much. Along the way you'll learn ways to secure your own information so your business doesn't become the next Target.

Post-mortem of the Target data breach, with tips for avoiding becoming the next victim. Created for SQL Saturday 287 in Madison, WI.

Published in: Technology, News & Politics
  • Be the first to comment

Don't Be a Target!

  1. 1. Stealing Home… Depot f/k/a Don’t Be a Target! Post-Mortem of the latest data breaches, with tips to help you avoid becoming the next Target, Kmart, Dairy Queen, Home Depot.
  2. 2. Don’t Be a Target! Eric Selje Madison, WI @EricSelje Salty Dog Solutions, LLC Database Developer General IT Guy 2 | 10/17/14 © Eric Selje
  3. 3. 3 | 3/29/14| © Eric Selje
  4. 4. 4 | 3/29/14| © Eric Selje
  5. 5. 5 | 3/29/14| © Eric Selje
  6. 6. 6 | 3/29/14| © Eric Selje
  7. 7. 7 | 3/29/14| © Eric Selje
  8. 8. 8 | 3/29/14| © Eric Selje
  9. 9. “RAM Scraping” 9 | 3/29/14| © Eric Selje
  10. 10. 10 | 3/29/14| © Eric Selje
  11. 11. 11 | 3/29/14| © Eric Selje
  12. 12. 12 | 3/29/14| © Eric Selje
  13. 13. 13 | 3/29/14| © Eric Selje
  14. 14. 14 | 3/29/14| © Eric Selje
  15. 15. 15 | 3/29/14| © Eric Selje
  16. 16. 16 | 3/29/14| © Eric Selje
  17. 17. 17 | 3/29/14| © Eric Selje
  18. 18. Lesson: Know your Scams  And share what you know with everybody, including your pointy-haired boss. 18 | 3/29/14| © Eric Selje
  19. 19. Lesson: Don’t be a Fazio!  You are only as secure as your subcontractors and or third-party vendors, and your clients are only as secure as you are! If you’re a consultant/subcontractor/vendor, Don’t be a Fazio. Keep yourself covered. 19 | 3/29/14| © Eric Selje
  20. 20. 20 | 3/29/14| © Eric Selje
  21. 21. Lesson: Don’t Cross the Streams 21 | 3/29/14| © Eric Selje
  22. 22. Lesson: Segment Your Network 22 | 3/29/14| © Eric Selje
  23. 23. 23 | 3/29/14| © Eric Selje
  24. 24. 24 | October 14| © Eric Selje
  25. 25. 25 | 3/29/14| © Eric Selje
  26. 26. Lesson: Know What’s Running on Your Servers 26 | 3/29/14| © Eric Selje
  27. 27. 27 | 3/29/14| © Eric Selje
  28. 28. 28 | 3/29/14| © Eric Selje
  29. 29. 29 | 3/29/14| © Eric Selje
  30. 30. 30 | 3/29/14| © Eric Selje
  31. 31. 31 | 3/29/14| © Eric Selje
  32. 32. http://rescator.so 32 | 3/29/14| © Eric Selje
  33. 33. Warning! 33 | 3/29/14| © Eric Selje
  34. 34. http://rescator.su 34 | 3/29/14| © Eric Selje
  35. 35. McDumpals.me 35 | 3/29/14| © Eric Selje
  36. 36. 36 | 3/29/14| © Eric Selje
  37. 37. 37 | 3/29/14| © Eric Selje
  38. 38. 38 | 3/29/14| © Eric Selje
  39. 39. 39 | 3/29/14| © Eric Selje
  40. 40. 40 | 3/29/14| © Eric Selje
  41. 41. 41 | 3/29/14| © Eric Selje
  42. 42. 42 | 3/29/14| © Eric Selje
  43. 43. 43 | 3/29/14| © Eric Selje
  44. 44. 44 | 3/29/14| © Eric Selje
  45. 45. Summary (Lessons Learned)  Don’t be a Fazio! Make sure you and your vendors are secure  Keep abreast of the latest scams (and share!)  Least Privilege Principle  Segment Your Network (Don’t Cross the Streams)  Know What’s Running on Your Servers  Separate Signal from Noise, and pay attention to the signals 45 | 3/29/14| © Eric Selje
  46. 46. 46 | 3/29/14| © Eric Selje
  47. 47. Resources  http://www.jupiterbroadcasting.com/51107/targeting-the-hvac-techsnap-148/  @allanjude  @chrisLAS  https://www.cs.columbia.edu/~smb/blog/2014-02/2014-02-05.html  http://krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvac-company/  http://www.infrasupport.com/target-get-on-the-ball-with-this-data-breach/  http://online.wsj.com/news/articles/SB10001424052702304703804579381520736715690  http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/An-evolution-of-BlackPOS-malware/ ba-p/6359149#.Uy9FvFeo11k  http://www.informationweek.com/security/attacks-and-breaches/target-breach-8-facts-on-memory-scraping- malware/d/d-id/1113440  http://security.stackexchange.com/questions/46319/why-emv-cards-cannot-be-cloned  http://www.npr.org/blogs/alltechconsidered/2014/01/23/264910138/target-hack-a-tipping-point-in-moving- away-from-magnetic-stripes  http://www.xylibox.com/2012/03/pos-carding.html  http://www.slideshare.net/AlertLogic/the-target-breach-anatomy-of-an-attack  Photograph of Henry Adams writing at desk by Marian Hooper Adams (1843–1885) (Massachusetts Historical Society) [Public domain], via Wikimedia Commons 47 | 3/29/14| © Eric Selje

×