SlideShare a Scribd company logo
AUTOPSY OF A DATA BREACH
The Target Case
Allison Linder
Lysanne Loucel
Sreejith R. Nair
Todd Williams
Target Data Breach
• Target Corporation is the second-largest discount store retailer in the United States.
• Target was considered one of the leaders in cybersecurity in the retail industry.
• In December 2013, a data breach of Target's systems affected up to 110 million
customers. Compromised customer information included names, phone numbers, email
and mailing addresses
• In March 2015, Target reached a class-action settlement with affected consumers for $10
million (plus class-action attorney fees).
• In May 2016, Target settled with affected banks and credit unions for $39 million (plus
class-action attorney fees), of which $19 million would be disbursed by a MasterCard
program.
The What's?
• What is Data breach ?
• What steps did the cybercriminals follow in committing this theft?
• What factors allowed this theft to takes place? Or what were the vulnerabilities?
• What were the consequences for the stake holders?
• What control or measures can the business take to protect itself?
• What lessons can be drawn from this security incident ?
Data Breach
• What is Data breach ?
A data breach is the intentional or unintentional release of
secure/private/confidential information to an untrusted environment.
 Device theft or loss
 Document errors
 Weak and stolen credentials
 Internet spyware
 Vulnerable systems and applications
World's Biggest Data Breaches
1. Yahoo! 1 billion, December 2016
2. Yahoo! 500 million, September 2016
3. MySpace 360 million May 2016
4. LinkedIn 100 million, May 2016
5. Scottrade, 4.6 million, October 2015
6. T-Mobile (via Experian), 15 million, October 2015
7. Ashley Madison, 32 million, August 2015
8. Anthem 80 million, February 2015
9. Office of Personnel Management, 21.5 million, July 2015
10. UCLA Health 4.5 million, July 2015
11. Home Depot, 53 million, September 2014
12. EBay 145 million, May 2014
13. Target, 110 million, November 2013
14. JP Morgan Chase, 83 million, October 2013
15. Sony PlayStation Network, 77 million, April 2011
16. TJ Maxx, 45.7 million 2007
17. AOL, 92 million, October 2007
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
Vulnerabilities & Crime
• A phishing email sent to Target's HVAC vendor, Fazio Mechanical Services who had
remote access to Target’s network for things such as billing and PoS.
• The response to the email gave the attackers the Fazio’s user code and password.
This allowed them to install Malware that steals credentials.
• The attackers disguised the malicious component as a legitimate one to hide it in
plain sight ("hiding in plain sight" tactic)
• Once the malware obtained the credit card data, it created a remote file share
remotely, and it would periodically copy its local file to the hacker’s remote share.
Ignorance
• Target’s FireEye advanced monitoring system had noticed suspicious activity and
alerted Target on the first data transfer and alerts escalated from there. Target had
chose to do nothing in response.
• The software itself could have prevented the attack but Target chose to deactivate
this part of the software as it was new and unfamiliar.
• Target’s own anti-virus system had detected fowl activity and these warnings were
also ignored.
Market Reaction
NYSE: TGT – Nov 2013 – Dec 2015
The breaches had a short-term effect on the market, little impact on the long term. Industry analysts
have inferred that shareholders are numb to news of data breaches.
Breach Aftermath
• Target CEO Gregg Steinhafel Steps Down
• COO John Mulligan attended U.S. Senate hearings where his company was grilled for
the way it handled the breach.
• Target Vendor Fazio Mechanical Services acknowledges Breach.
• CIO Beth Jacob resigned on March 5
• Target elevated a new role/position, Chief Information Security Officer.
• The Consumer Lawsuit - The claim in the consumer lawsuit is that the breach was
avoidable and occurred because Target did not take proper precautions in protecting its
computer systems.
• The Bank Lawsuit - The claim in the bank lawsuit is that Target's actions and inactions
- disabling certain security features and failing to heed the warning signs as the hackers'
attack began - caused foreseeable harm to plaintiffs.
6 Steps To Prevent A Data Breach
1. Stop incursion by targeted attacks.
2. Identify threats by correlating real-time alerts with global intelligence.
3. Proactively protect information.
4. Automate security through IT compliance controls.
5. Prevent data exfiltration.
6. Integrate prevention and response strategies into security operations.
Lessons Can Be Drawn From This Case
• EMV Technology Alone Is Not Enough to Stop Fraud
• Network Segmentation Is a Necessity
• Third-Party Oversight Is Part of Compliance
• Log Monitoring Needs Analytics
• Executives, Boards Are Accountable
• Retailers May Be Liable for Breaches
• Cyberthreat Intelligence Sharing Must Improve
Citations And References
• http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-
hacks/
• https://hbr.org/2015/03/why-data-breaches-dont-hurt-stock-prices
• http://info.rippleshot.com/blog/everything-you-need-to-know-about-the-target-data-
breach-lawsuits
• http://www.cio.com/article/2600345/security0/11-steps-attackers-took-to-crack-
target.html
• http://quotes.wsj.com/TGT
• https://www.forbes.com/sites/sungardas/2014/01/17/five-lessons-for-every-business-from-
targets-data-breach/#6b78f7c16563
THANK YOU
Allison Linder
Lysanne Loucel
Sreejith R. Nair
Todd Williams

More Related Content

What's hot

NTT DoCoMo : Case Study
NTT DoCoMo : Case StudyNTT DoCoMo : Case Study
NTT DoCoMo : Case Study
Hardik Patoriya
 
A Business case study on LinkedIn
A Business case study on LinkedInA Business case study on LinkedIn
A Business case study on LinkedIn
Mayank Banerjee
 
Dakota product
Dakota productDakota product
Dakota product
Elie Saavedra
 
Jsw shoppe
Jsw shoppeJsw shoppe
Jsw shoppe
Jay K Garg
 
Facebook Scandal
Facebook ScandalFacebook Scandal
Facebook Scandal
SB Solutions
 
Case Study on Coach K: A matter of the heart
Case Study on Coach K: A matter of the heartCase Study on Coach K: A matter of the heart
Case Study on Coach K: A matter of the heart
ClaraN1
 
Charles schwab
Charles schwabCharles schwab
Charles schwab
Gitanjali Maria
 
The Walt Disney Company and Pixar Inc.: To Acquire or Not to Acquire
The Walt Disney Company and Pixar Inc.: To Acquire or Not to AcquireThe Walt Disney Company and Pixar Inc.: To Acquire or Not to Acquire
The Walt Disney Company and Pixar Inc.: To Acquire or Not to Acquire
Eric Moon
 
De beer's diamond dilemma case study
De beer's diamond dilemma case studyDe beer's diamond dilemma case study
De beer's diamond dilemma case study
Arpita Pari
 
Harrah's Entertainment, Inc. Case Analysis
Harrah's Entertainment, Inc. Case AnalysisHarrah's Entertainment, Inc. Case Analysis
Harrah's Entertainment, Inc. Case Analysis
mbartugs
 
HubSpot - Inbound marketing and web 2.0 case study
HubSpot - Inbound marketing and web 2.0 case studyHubSpot - Inbound marketing and web 2.0 case study
HubSpot - Inbound marketing and web 2.0 case study
Ronak Shah
 
Bank of America : Mobile Banking
Bank of America : Mobile BankingBank of America : Mobile Banking
Bank of America : Mobile Banking
Nabduan Duangmanee
 
emerging nokia - should they focus on developed or emerging markets
 emerging nokia - should they focus on developed or emerging markets emerging nokia - should they focus on developed or emerging markets
emerging nokia - should they focus on developed or emerging markets
Saurabh Arora
 
Apple pay
Apple payApple pay
Apple pay
Helal Al-Helal
 
Charles Schwab & Co. Inc: The ‘Talk to Chuck’ Advertising Campaign
Charles Schwab & Co. Inc: The ‘Talk to Chuck’ Advertising Campaign  Charles Schwab & Co. Inc: The ‘Talk to Chuck’ Advertising Campaign
Charles Schwab & Co. Inc: The ‘Talk to Chuck’ Advertising Campaign
Swarupa Rani Sahu
 
New York times Paywall case study
New York times Paywall case study New York times Paywall case study
New York times Paywall case study
amritpal kaur
 
Wal-Mart Stores’ Discount operations
Wal-Mart Stores’ Discount operationsWal-Mart Stores’ Discount operations
Wal-Mart Stores’ Discount operations
AJAL A J
 
PPT Wells Fargo
PPT  Wells FargoPPT  Wells Fargo
PPT Wells Fargo
MyAssignmenthelp.com
 

What's hot (20)

NTT DoCoMo : Case Study
NTT DoCoMo : Case StudyNTT DoCoMo : Case Study
NTT DoCoMo : Case Study
 
A Business case study on LinkedIn
A Business case study on LinkedInA Business case study on LinkedIn
A Business case study on LinkedIn
 
Rite Aid
Rite Aid Rite Aid
Rite Aid
 
Dakota product
Dakota productDakota product
Dakota product
 
Jsw shoppe
Jsw shoppeJsw shoppe
Jsw shoppe
 
Facebook Scandal
Facebook ScandalFacebook Scandal
Facebook Scandal
 
Case Study on Coach K: A matter of the heart
Case Study on Coach K: A matter of the heartCase Study on Coach K: A matter of the heart
Case Study on Coach K: A matter of the heart
 
Charles schwab
Charles schwabCharles schwab
Charles schwab
 
The Walt Disney Company and Pixar Inc.: To Acquire or Not to Acquire
The Walt Disney Company and Pixar Inc.: To Acquire or Not to AcquireThe Walt Disney Company and Pixar Inc.: To Acquire or Not to Acquire
The Walt Disney Company and Pixar Inc.: To Acquire or Not to Acquire
 
De beer's diamond dilemma case study
De beer's diamond dilemma case studyDe beer's diamond dilemma case study
De beer's diamond dilemma case study
 
Harrah's Entertainment, Inc. Case Analysis
Harrah's Entertainment, Inc. Case AnalysisHarrah's Entertainment, Inc. Case Analysis
Harrah's Entertainment, Inc. Case Analysis
 
HubSpot - Inbound marketing and web 2.0 case study
HubSpot - Inbound marketing and web 2.0 case studyHubSpot - Inbound marketing and web 2.0 case study
HubSpot - Inbound marketing and web 2.0 case study
 
Bank of America : Mobile Banking
Bank of America : Mobile BankingBank of America : Mobile Banking
Bank of America : Mobile Banking
 
CVS case
CVS caseCVS case
CVS case
 
emerging nokia - should they focus on developed or emerging markets
 emerging nokia - should they focus on developed or emerging markets emerging nokia - should they focus on developed or emerging markets
emerging nokia - should they focus on developed or emerging markets
 
Apple pay
Apple payApple pay
Apple pay
 
Charles Schwab & Co. Inc: The ‘Talk to Chuck’ Advertising Campaign
Charles Schwab & Co. Inc: The ‘Talk to Chuck’ Advertising Campaign  Charles Schwab & Co. Inc: The ‘Talk to Chuck’ Advertising Campaign
Charles Schwab & Co. Inc: The ‘Talk to Chuck’ Advertising Campaign
 
New York times Paywall case study
New York times Paywall case study New York times Paywall case study
New York times Paywall case study
 
Wal-Mart Stores’ Discount operations
Wal-Mart Stores’ Discount operationsWal-Mart Stores’ Discount operations
Wal-Mart Stores’ Discount operations
 
PPT Wells Fargo
PPT  Wells FargoPPT  Wells Fargo
PPT Wells Fargo
 

Similar to Target data breach presentation

Document-3.docx
Document-3.docxDocument-3.docx
Document-3.docx
SonalVanjari
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
seadeloitte
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Eric Vanderburg
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
NetIQ
 
security_threats.pdf and control mechanisms
security_threats.pdf and control mechanismssecurity_threats.pdf and control mechanisms
security_threats.pdf and control mechanisms
ronoelias98
 
Intro to Information AssuranceModule 3Chaston Carter0417.docx
Intro to Information AssuranceModule 3Chaston Carter0417.docxIntro to Information AssuranceModule 3Chaston Carter0417.docx
Intro to Information AssuranceModule 3Chaston Carter0417.docx
normanibarber20063
 
Information AssuranceChaston Carter041717 Target Corpora.docx
Information AssuranceChaston Carter041717 Target Corpora.docxInformation AssuranceChaston Carter041717 Target Corpora.docx
Information AssuranceChaston Carter041717 Target Corpora.docx
jaggernaoma
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
EamonnORagh
 
Security Industry Overview
Security Industry OverviewSecurity Industry Overview
Security Industry Overview
Thomvest Ventures
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
Bankingdotcom
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
IT Governance Ltd
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
Ulf Mattsson
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
pdewitte
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
Ulf Mattsson
 
Ivanti Threat Thursday for October 24
Ivanti Threat Thursday for October 24Ivanti Threat Thursday for October 24
Ivanti Threat Thursday for October 24
Ivanti
 
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborData Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Turner and Associates, Inc.
 
Cyber and Data Risks
Cyber and Data RisksCyber and Data Risks
Cyber and Data Risks
risksmith
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...jsnyder40
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
ssusera5ade5
 

Similar to Target data breach presentation (20)

Document-3.docx
Document-3.docxDocument-3.docx
Document-3.docx
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
security_threats.pdf and control mechanisms
security_threats.pdf and control mechanismssecurity_threats.pdf and control mechanisms
security_threats.pdf and control mechanisms
 
Intro to Information AssuranceModule 3Chaston Carter0417.docx
Intro to Information AssuranceModule 3Chaston Carter0417.docxIntro to Information AssuranceModule 3Chaston Carter0417.docx
Intro to Information AssuranceModule 3Chaston Carter0417.docx
 
Information AssuranceChaston Carter041717 Target Corpora.docx
Information AssuranceChaston Carter041717 Target Corpora.docxInformation AssuranceChaston Carter041717 Target Corpora.docx
Information AssuranceChaston Carter041717 Target Corpora.docx
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
Security Industry Overview
Security Industry OverviewSecurity Industry Overview
Security Industry Overview
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 
Ivanti Threat Thursday for October 24
Ivanti Threat Thursday for October 24Ivanti Threat Thursday for October 24
Ivanti Threat Thursday for October 24
 
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborData Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
 
Cyber and Data Risks
Cyber and Data RisksCyber and Data Risks
Cyber and Data Risks
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 

Target data breach presentation

  • 1. AUTOPSY OF A DATA BREACH The Target Case Allison Linder Lysanne Loucel Sreejith R. Nair Todd Williams
  • 2. Target Data Breach • Target Corporation is the second-largest discount store retailer in the United States. • Target was considered one of the leaders in cybersecurity in the retail industry. • In December 2013, a data breach of Target's systems affected up to 110 million customers. Compromised customer information included names, phone numbers, email and mailing addresses • In March 2015, Target reached a class-action settlement with affected consumers for $10 million (plus class-action attorney fees). • In May 2016, Target settled with affected banks and credit unions for $39 million (plus class-action attorney fees), of which $19 million would be disbursed by a MasterCard program.
  • 3. The What's? • What is Data breach ? • What steps did the cybercriminals follow in committing this theft? • What factors allowed this theft to takes place? Or what were the vulnerabilities? • What were the consequences for the stake holders? • What control or measures can the business take to protect itself? • What lessons can be drawn from this security incident ?
  • 4. Data Breach • What is Data breach ? A data breach is the intentional or unintentional release of secure/private/confidential information to an untrusted environment.  Device theft or loss  Document errors  Weak and stolen credentials  Internet spyware  Vulnerable systems and applications
  • 5. World's Biggest Data Breaches 1. Yahoo! 1 billion, December 2016 2. Yahoo! 500 million, September 2016 3. MySpace 360 million May 2016 4. LinkedIn 100 million, May 2016 5. Scottrade, 4.6 million, October 2015 6. T-Mobile (via Experian), 15 million, October 2015 7. Ashley Madison, 32 million, August 2015 8. Anthem 80 million, February 2015 9. Office of Personnel Management, 21.5 million, July 2015 10. UCLA Health 4.5 million, July 2015 11. Home Depot, 53 million, September 2014 12. EBay 145 million, May 2014 13. Target, 110 million, November 2013 14. JP Morgan Chase, 83 million, October 2013 15. Sony PlayStation Network, 77 million, April 2011 16. TJ Maxx, 45.7 million 2007 17. AOL, 92 million, October 2007 http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
  • 6. Vulnerabilities & Crime • A phishing email sent to Target's HVAC vendor, Fazio Mechanical Services who had remote access to Target’s network for things such as billing and PoS. • The response to the email gave the attackers the Fazio’s user code and password. This allowed them to install Malware that steals credentials. • The attackers disguised the malicious component as a legitimate one to hide it in plain sight ("hiding in plain sight" tactic) • Once the malware obtained the credit card data, it created a remote file share remotely, and it would periodically copy its local file to the hacker’s remote share.
  • 7. Ignorance • Target’s FireEye advanced monitoring system had noticed suspicious activity and alerted Target on the first data transfer and alerts escalated from there. Target had chose to do nothing in response. • The software itself could have prevented the attack but Target chose to deactivate this part of the software as it was new and unfamiliar. • Target’s own anti-virus system had detected fowl activity and these warnings were also ignored.
  • 8. Market Reaction NYSE: TGT – Nov 2013 – Dec 2015 The breaches had a short-term effect on the market, little impact on the long term. Industry analysts have inferred that shareholders are numb to news of data breaches.
  • 9. Breach Aftermath • Target CEO Gregg Steinhafel Steps Down • COO John Mulligan attended U.S. Senate hearings where his company was grilled for the way it handled the breach. • Target Vendor Fazio Mechanical Services acknowledges Breach. • CIO Beth Jacob resigned on March 5 • Target elevated a new role/position, Chief Information Security Officer. • The Consumer Lawsuit - The claim in the consumer lawsuit is that the breach was avoidable and occurred because Target did not take proper precautions in protecting its computer systems. • The Bank Lawsuit - The claim in the bank lawsuit is that Target's actions and inactions - disabling certain security features and failing to heed the warning signs as the hackers' attack began - caused foreseeable harm to plaintiffs.
  • 10. 6 Steps To Prevent A Data Breach 1. Stop incursion by targeted attacks. 2. Identify threats by correlating real-time alerts with global intelligence. 3. Proactively protect information. 4. Automate security through IT compliance controls. 5. Prevent data exfiltration. 6. Integrate prevention and response strategies into security operations.
  • 11. Lessons Can Be Drawn From This Case • EMV Technology Alone Is Not Enough to Stop Fraud • Network Segmentation Is a Necessity • Third-Party Oversight Is Part of Compliance • Log Monitoring Needs Analytics • Executives, Boards Are Accountable • Retailers May Be Liable for Breaches • Cyberthreat Intelligence Sharing Must Improve
  • 12. Citations And References • http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches- hacks/ • https://hbr.org/2015/03/why-data-breaches-dont-hurt-stock-prices • http://info.rippleshot.com/blog/everything-you-need-to-know-about-the-target-data- breach-lawsuits • http://www.cio.com/article/2600345/security0/11-steps-attackers-took-to-crack- target.html • http://quotes.wsj.com/TGT • https://www.forbes.com/sites/sungardas/2014/01/17/five-lessons-for-every-business-from- targets-data-breach/#6b78f7c16563
  • 13. THANK YOU Allison Linder Lysanne Loucel Sreejith R. Nair Todd Williams