SlideShare a Scribd company logo
Cyber attacks are becoming more and more common. Besides
the obvious damage an attack of this kind can inflict on your
business, cyber crimes can erode your customers’ confidence in
you and keep them from coming back to your site.
This Oil Express Special Report spotlights recent cyber attacks
in the retail space and points out the lessons you can learn so it
doesn’t happen to your business!
OIL EXPRESS SPECIAL REPORT
Weak Links:
Cyber Attacks in the News &
How to Protect Your Assets
Criminal Mind: Case Study
of a Gas Station Data Threat
A recent case study from security consultant Verizon Enterprise
puts you inside a payment card harvesting scam.
The culprit is an employee of the vendor providing general
IT and point-of-sale support to a gas station chain. The
vendor connects via remote desktop over VPN to the
payment-processing server.
The unscrupulous employee seeks out late-night assignments
over weekends – when no one is around – and uses remote access
to customer systems to harvest payment card data.
He obtains the magnetic stripe
sequences for conducting
payment card fraud then he
resets the clock to the correct
date and time.
He verifies no other
active log-ins were
in progress, sets the
system clock forward or
backward in time and
modifies a configuration
file to enable a debug
setting in the payment
application. A shared
log-in is used.
This allows him to create
an output file capturing
clear text copies of
authorization requests
from each fuel pump.
–– Never assume a POS vendor has strict security practices.
–– The help desk should never share log-ins. “The shared log-ins limited
accountability and gave the threat actor the confidence that he could
get away with it,” said Verizon.
–– Usetwo-factorauthenticationforremoteaccessintothePOSservers.“A
keyloggeronanyofthehelpdesksystemsisallthatitwouldtakeforthis
tomorphfromapartnermisusebreachtoawidespreadexternalbreach,”
Verizonsaid.
He covers his tracks by conducting all malicious
activity only on his manager’s desktop system.
WhatCan
YouLearn
FromThis
CrimeStory?
Oil Express Special Report | 9737 Washingtonian Blvd, Ste 200, Gaithersburg, MD 20878-7364 | 888.301.2645 | www.opisnet.com 2
Verifone Acknowledges
Attempted Hack at
Gas Stations in the U.S.
Even a leading equipment vendor that provides data security solutions can be
vulnerable to attacks from hackers.
Verifone sells file authentication software called “VeriShield Retain” that’s designed
to provide protection against unauthorized access to payment devices. It also offers
“VeriShield Total Protect” end-to-end data encryption designed to protect data from
the point of capture, its website says.
But the large point-of-sale systems vendor said hackers attempted a “cyber
incident” in January 2017 at approximately two-dozen U.S. gas stations. No other
merchants were targeted, Verifone said in a statement without disclosing the
location of the affected gas stations.
The newsletter “Krebs on Security” reported that the breach affected companies
running its point-of-sale solutions, though Verifone was quoted saying the breach was
limited to its corporate network.
Last year, another large vendor that supplies
gas stations as well as many other retailers
with point-of-sale systems also experienced a
breach, according to an alert from Visa.
On Aug. 8, Oracle Security informed customers
of POS provider Oracle MICROS systems to
change their account passwords immediately
because it had detected malicious code in
certain legacy MICROS systems, Visa said.
Oil Express Special Report | 9737 Washingtonian Blvd, Ste 200, Gaithersburg, MD 20878-7364 | 888.301.2645 | www.opisnet.com 3
Steps You Can Take
if You Discover an
Attempted Hack
Proactively notify Visa, MasterCard and other card networks
even if, as was the case for Verifone, the incident appears to
be a “very limited cyber intrusion” into a corporate network.
6
Implement additional security controls across corporate
networks and determine the type of information that may
have been targeted.
Even if you, like Verifone, believe there were “no adverse
events or misuse of any data resulting from this incident,”
continue to monitor for data misuse.
Give your company staff and contractors 24 hours to change
all company passwords and provide a list of criteria to make
passwords more secure.
Passwords should be at least 12 characters, must be original
(not used by the same employee before) and must contain
uppercase and lowercase letters of the alphabet and non-
alphanumeric characters such as @, # or *.
Limit end users’ ability to load additional software
on laptops and desktops as a security measure.
1
2
3
4
5
6
Oil Express Special Report | 9737 Washingtonian Blvd, Ste 200, Gaithersburg, MD 20878-7364 | 888.301.2645 | www.opisnet.com 4
MAPCO Case Offers How-To
on Notifying Breach Victims
Early this year, large Southeastern retailer MAPCO Express Inc. settled lawsuits with
consumers and financial institutions for almost $2 million following its 2013 data breach,
according to legal documents.
About 185,000 accounts were compromised in the breach, records showed.
The notification of potential victims that MAPCO undertook exposes the monumental task of
exercising due diligence when disclosing the risk of fraud.
There are notice laws covering data breaches, on top of reaching out to customers in good faith and
following court orders. MAPCO’s more than 6.5 million digital notice impressions delivered by their
campaign well exceeded the 2.5 million impressions specified in their court-approved notice plan,
according to case documents.
Listen to Concerns
Respond to written mail
from potential victims. Your
customers need to hear
from you to address all their
potential issues.
Send Emails to
Permissioned Lists
All MAPCO “My Rewards”
customers who shopped
at a MAPCO location between
March 1, 2013, and April 30,
2013 received a direct email.
Go Digital
MAPCO included a social
media pitch to 5+ million
Facebook users with interests
similar to their customers’
as well as banner notices on
local news websites.
Consider Ads
MAPCO had 4,096 paid search
notice advertisements on
Google, where search engines
linked to search terms relevant
to the settlement.
Create a
Settlement Website
Post claim forms, important
dates and deadlines, legal
documents, notices and
frequently asked questions –
link digital advertising to site.
Hit the Phones
Set up an automated,
toll-free hotline available
around-the-clock every day
to answer questions on the
breach and settlement.
Oil Express Special Report | 9737 Washingtonian Blvd, Ste 200, Gaithersburg, MD 20878-7364 | 888.301.2645 | www.opisnet.com 5
Beware of Scams Like One
That Targeted Kroger
Kroger was reported to have been the recent target
of a phishing scam.
The bogus email, supposedly from the company’s
help desk, was an attempt to get employees of
the large fuel retailer and grocer to click on a link
leading to a website that would allow crooks to
obtain tax information.
The Kroger email thanked the addressee for
“choosing to receive your Kroger employee U.S. tax
statements electronically.” It provided a link to a
website and said that due to a change in privacy policy, employees must enter the site
to get tax information with their user ID and password. The “tax statements” could be
viewed or saved to the employee’s computer or printed from the website, the email said.
The message said the tax statements would be available for viewing and downloading
through Oct. 15, 2017. After that time, the employee would have to pay a “replacement
fee” to access the information.
Kroger did not respond to a request for comment on the phishing attempt.
Further investigation showed the email did not come from Kroger.
The W-2 scam uses a corporate officer’s name to request employee W-2 forms from
company payroll or human resources departments. The scam is just one of several
new variations of targeted phishing scams that have appeared in the past year
that focus on the large-scale thefts of sensitive tax information from tax preparers,
businesses and payroll companies, the IRS says.
Oil Express Special Report | 9737 Washingtonian Blvd, Ste 200, Gaithersburg, MD 20878-7364 | 888.301.2645 | www.opisnet.com 6
FBIWarnsAgainstCyberRansom
The FBI recently posted an alert
concerning the growing cyber-threat from
ransomware, a type of malware installed
on a computer or server that encrypts the
files, making them inaccessible until a
specified ransom is paid.
Ransomware typically is installed
when a user clicks on a malicious link,
opens a file in an email that installs the
malware, or through drive-by downloads
from a compromised website. Drive-by
downloads do not require user initiation.
Recent variants have targeted and
compromised vulnerable business servers
to identify and target hosts, multiplying
the number of potential infected servers
and devices on a network. The crooks
are also charging ransoms based on the
number of hosts or servers infected.
Recent victims infected with this type
of ransomware variant have not been
provided the decryption keys for all their
files after paying the ransom and some
have been extorted for even more money
after payment.
The result: Victims could have to pay
more to get their decryption keys,
a prolonged recovery time and the
possibility victims will not obtain full
decryption of their files, the agency said.
The FBI does not support paying a ransom
and recommends reporting infections to
a local FBI office or to the Internet Crime
Complaint Center at www.IC3.gov.
Victims should provide: Date of
infection, ransomware variant (identified
on the ransom page or by the encrypted
file extension), company information
(industry, business size, etc.), how the
infection happened (such as a link in email
or internet browsing), requested ransom
amount, actor’s bitcoin wallet address
(may be listed on ransom page), ransom
amount paid, overall losses tied to the
infection and victim impact statement.
In a Tech Support scam, the subject claims to be a corporate employee or an affiliate
of a major computer software or security company offering technical support. From
Jan. 1 to April 30, 2016, the Internet Crime Complaint Center received 3,668 such
complaints with adjusted losses of $2,268,982.
Oil Express Special Report | 9737 Washingtonian Blvd, Ste 200, Gaithersburg, MD 20878-7364 | 888.301.2645 | www.opisnet.com 7
LatestScam:ThievesGetSocial
As more and more entrepreneurs promote their businesses on social media, fraudsters
are following them. The Federal Trade Commission (FTC) said it has received complaints
from small business owners that fraudsters have reached out to them through
Facebook messages.
The scammers are telling businesses they are eligible for or have won a business grant
from the government. The same fraudulent pitch also has recently gone out via email and
online ads and could be attractive to business owners interested in federal assistance. For
example, it may appeal to oil marketers seeking to diversify into alternative fuels.
The FTC also reports that social media scams designed to steal information and hack
your accounts appear to be from a “friend.” The scammers can spoof social media
messages to make them appear to be from a business contact. The fraudster could be
trying to get your cellphone number, for example.
Be sure to warn employees of this form of fraud, especially those responsible for
handling your Facebook page, website and other social media accounts.
The “Business Email Compromise,”
or BEC scam, cost some 14,032 U.S.
companies nearly $1 billion from
October 2013 to May 2016. The
scam involves fraudsters assuming
the identity of the CEO, a company
attorney or a trusted vendor and
making an urgent request for money.
TheFTCsaystowatchfortheseredflags:
–– The government will not contact you through social media,
email or text message to offer funds.
–– Real government grants do not require you pay first,
so avoid offers that require payment to get the assistance.
–– The government will not request your passwords before
providing a grant. If you get such a request, it is just a thief
trying to hack into your accounts to steal your money or to
impersonate you to defraud others.
Keep up with the latest news on cyber attacks, data breaches, and everything
else impacting the petroleum marketing industry — sign up for a free 2 week
trial to Oil Express. Visit try.opisnet.com/oe17008 to get started.
Oil Express Special Report | 9737 Washingtonian Blvd, Ste 200, Gaithersburg, MD 20878-7364 | 888.301.2645 | www.opisnet.com 8

More Related Content

What's hot

2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
- Mark - Fullbright
 
Major 3rd-Party Data Breaches Of 2018
Major 3rd-Party Data Breaches Of 2018Major 3rd-Party Data Breaches Of 2018
Major 3rd-Party Data Breaches Of 2018
NormShield
 
Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?
NormShield
 
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch FizzThe Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
FitCEO, Inc. (FCI)
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
BakerTillyConsulting
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
Entersoft Security
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
Shawn Crimson
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
Guise Bule
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
Scott Mills
 
Ransomware Gang Masquerades as Real Company to Recruit Tech Talent
Ransomware Gang Masquerades as Real Company to Recruit Tech TalentRansomware Gang Masquerades as Real Company to Recruit Tech Talent
Ransomware Gang Masquerades as Real Company to Recruit Tech Talent
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
3rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 20183rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 2018
NormShield
 
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
Kate Dalakova
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
Labris Networks
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
Quick Heal Technologies Ltd.
 
Fortified Health Security - Horizon Report 2016
Fortified Health Security - Horizon Report 2016Fortified Health Security - Horizon Report 2016
Fortified Health Security - Horizon Report 2016Dan L. Dodson
 
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-ThreatsThe Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
- Mark - Fullbright
 
ThreatMetrix Fraud Network Presentation
ThreatMetrix Fraud Network PresentationThreatMetrix Fraud Network Presentation
ThreatMetrix Fraud Network PresentationThreatMetrix
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Dulanja Liyanage
 

What's hot (19)

2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
Major 3rd-Party Data Breaches Of 2018
Major 3rd-Party Data Breaches Of 2018Major 3rd-Party Data Breaches Of 2018
Major 3rd-Party Data Breaches Of 2018
 
Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?
 
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch FizzThe Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
 
Ransomware Gang Masquerades as Real Company to Recruit Tech Talent
Ransomware Gang Masquerades as Real Company to Recruit Tech TalentRansomware Gang Masquerades as Real Company to Recruit Tech Talent
Ransomware Gang Masquerades as Real Company to Recruit Tech Talent
 
3rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 20183rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 2018
 
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Cybercrime issue
Cybercrime issueCybercrime issue
Cybercrime issue
 
Fortified Health Security - Horizon Report 2016
Fortified Health Security - Horizon Report 2016Fortified Health Security - Horizon Report 2016
Fortified Health Security - Horizon Report 2016
 
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-ThreatsThe Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
 
ThreatMetrix Fraud Network Presentation
ThreatMetrix Fraud Network PresentationThreatMetrix Fraud Network Presentation
ThreatMetrix Fraud Network Presentation
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
 

Similar to Weak Links: Cyber Attacks in the News & How to Protect Your Assets

Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?
Web Werks Data Centers
 
Captive Insurance and Cyber Risk
Captive Insurance and Cyber RiskCaptive Insurance and Cyber Risk
Captive Insurance and Cyber Risk
The Law Office of Hale Stewart
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
Daniel Versola
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
seadeloitte
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
IJCSEA Journal
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
IJCSEA Journal
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
IJCSEA Journal
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
IJCSEA Journal
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
IRJET Journal
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...
Security B-Sides
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
Helen Carpenter
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
nimbleappgenie
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...
Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...
Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...
CDGcommerce
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing Tools
IRJET Journal
 

Similar to Weak Links: Cyber Attacks in the News & How to Protect Your Assets (20)

Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Cyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation GianinoCyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation Gianino
 
Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?
 
Captive Insurance and Cyber Risk
Captive Insurance and Cyber RiskCaptive Insurance and Cyber Risk
Captive Insurance and Cyber Risk
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...
Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...
Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing Tools
 

More from OilPriceInformationService

OPIS Mexico Brochure 2019
OPIS Mexico Brochure 2019OPIS Mexico Brochure 2019
OPIS Mexico Brochure 2019
OilPriceInformationService
 
OPIS Mexico Racks - en espanol
OPIS Mexico Racks - en espanol OPIS Mexico Racks - en espanol
OPIS Mexico Racks - en espanol
OilPriceInformationService
 
Informe de combustibles de México
Informe de combustibles de MéxicoInforme de combustibles de México
Informe de combustibles de México
OilPriceInformationService
 
OPIS Worldwide Jet Fuel Report Fact Sheet
OPIS Worldwide Jet Fuel Report Fact SheetOPIS Worldwide Jet Fuel Report Fact Sheet
OPIS Worldwide Jet Fuel Report Fact Sheet
OilPriceInformationService
 
Racks Use Case Infographic
Racks Use Case InfographicRacks Use Case Infographic
Racks Use Case Infographic
OilPriceInformationService
 
Spot Ticker Use Case Infographic
Spot Ticker Use Case InfographicSpot Ticker Use Case Infographic
Spot Ticker Use Case Infographic
OilPriceInformationService
 
OPIS Coverage Comes To Australia
OPIS Coverage Comes To Australia OPIS Coverage Comes To Australia
OPIS Coverage Comes To Australia
OilPriceInformationService
 
OPIS Buyer Persona: Transportation
OPIS Buyer Persona: TransportationOPIS Buyer Persona: Transportation
OPIS Buyer Persona: Transportation
OilPriceInformationService
 
OPIS in Mexico: A Brochure
OPIS in Mexico: A BrochureOPIS in Mexico: A Brochure
OPIS in Mexico: A Brochure
OilPriceInformationService
 
OPIS Fact Sheet: Europe Jet Fuel Report
OPIS Fact Sheet: Europe Jet Fuel ReportOPIS Fact Sheet: Europe Jet Fuel Report
OPIS Fact Sheet: Europe Jet Fuel Report
OilPriceInformationService
 
OPIS Fact Sheet: NGL Forwards Report
OPIS Fact Sheet: NGL Forwards ReportOPIS Fact Sheet: NGL Forwards Report
OPIS Fact Sheet: NGL Forwards Report
OilPriceInformationService
 
OPIS RetailSuite Brochure
OPIS RetailSuite BrochureOPIS RetailSuite Brochure
OPIS RetailSuite Brochure
OilPriceInformationService
 
OPIS Fact Sheet: MarketSharePro
OPIS Fact Sheet: MarketShareProOPIS Fact Sheet: MarketSharePro
OPIS Fact Sheet: MarketSharePro
OilPriceInformationService
 
Fact Sheet: OPIS Newsletter
Fact Sheet: OPIS NewsletterFact Sheet: OPIS Newsletter
Fact Sheet: OPIS Newsletter
OilPriceInformationService
 
OPIS Fact Sheet: International Feedstocks Intelligence Report
OPIS Fact Sheet: International Feedstocks Intelligence ReportOPIS Fact Sheet: International Feedstocks Intelligence Report
OPIS Fact Sheet: International Feedstocks Intelligence Report
OilPriceInformationService
 
OPIS Fact Sheet: Temperature Correction Assessment Report
OPIS Fact Sheet: Temperature Correction Assessment ReportOPIS Fact Sheet: Temperature Correction Assessment Report
OPIS Fact Sheet: Temperature Correction Assessment Report
OilPriceInformationService
 
OPIS Hoja de Hechos: Mexico Racks en espanol.
OPIS Hoja de Hechos: Mexico Racks en espanol. OPIS Hoja de Hechos: Mexico Racks en espanol.
OPIS Hoja de Hechos: Mexico Racks en espanol.
OilPriceInformationService
 
OPIS Fact Sheet: Bottom Line Report
OPIS Fact Sheet: Bottom Line ReportOPIS Fact Sheet: Bottom Line Report
OPIS Fact Sheet: Bottom Line Report
OilPriceInformationService
 
OPIS Fact Sheet: Mexico Racks
OPIS Fact Sheet: Mexico RacksOPIS Fact Sheet: Mexico Racks
OPIS Fact Sheet: Mexico Racks
OilPriceInformationService
 
OPIS Fact Sheet: Carbon Market Report
OPIS Fact Sheet: Carbon Market ReportOPIS Fact Sheet: Carbon Market Report
OPIS Fact Sheet: Carbon Market Report
OilPriceInformationService
 

More from OilPriceInformationService (20)

OPIS Mexico Brochure 2019
OPIS Mexico Brochure 2019OPIS Mexico Brochure 2019
OPIS Mexico Brochure 2019
 
OPIS Mexico Racks - en espanol
OPIS Mexico Racks - en espanol OPIS Mexico Racks - en espanol
OPIS Mexico Racks - en espanol
 
Informe de combustibles de México
Informe de combustibles de MéxicoInforme de combustibles de México
Informe de combustibles de México
 
OPIS Worldwide Jet Fuel Report Fact Sheet
OPIS Worldwide Jet Fuel Report Fact SheetOPIS Worldwide Jet Fuel Report Fact Sheet
OPIS Worldwide Jet Fuel Report Fact Sheet
 
Racks Use Case Infographic
Racks Use Case InfographicRacks Use Case Infographic
Racks Use Case Infographic
 
Spot Ticker Use Case Infographic
Spot Ticker Use Case InfographicSpot Ticker Use Case Infographic
Spot Ticker Use Case Infographic
 
OPIS Coverage Comes To Australia
OPIS Coverage Comes To Australia OPIS Coverage Comes To Australia
OPIS Coverage Comes To Australia
 
OPIS Buyer Persona: Transportation
OPIS Buyer Persona: TransportationOPIS Buyer Persona: Transportation
OPIS Buyer Persona: Transportation
 
OPIS in Mexico: A Brochure
OPIS in Mexico: A BrochureOPIS in Mexico: A Brochure
OPIS in Mexico: A Brochure
 
OPIS Fact Sheet: Europe Jet Fuel Report
OPIS Fact Sheet: Europe Jet Fuel ReportOPIS Fact Sheet: Europe Jet Fuel Report
OPIS Fact Sheet: Europe Jet Fuel Report
 
OPIS Fact Sheet: NGL Forwards Report
OPIS Fact Sheet: NGL Forwards ReportOPIS Fact Sheet: NGL Forwards Report
OPIS Fact Sheet: NGL Forwards Report
 
OPIS RetailSuite Brochure
OPIS RetailSuite BrochureOPIS RetailSuite Brochure
OPIS RetailSuite Brochure
 
OPIS Fact Sheet: MarketSharePro
OPIS Fact Sheet: MarketShareProOPIS Fact Sheet: MarketSharePro
OPIS Fact Sheet: MarketSharePro
 
Fact Sheet: OPIS Newsletter
Fact Sheet: OPIS NewsletterFact Sheet: OPIS Newsletter
Fact Sheet: OPIS Newsletter
 
OPIS Fact Sheet: International Feedstocks Intelligence Report
OPIS Fact Sheet: International Feedstocks Intelligence ReportOPIS Fact Sheet: International Feedstocks Intelligence Report
OPIS Fact Sheet: International Feedstocks Intelligence Report
 
OPIS Fact Sheet: Temperature Correction Assessment Report
OPIS Fact Sheet: Temperature Correction Assessment ReportOPIS Fact Sheet: Temperature Correction Assessment Report
OPIS Fact Sheet: Temperature Correction Assessment Report
 
OPIS Hoja de Hechos: Mexico Racks en espanol.
OPIS Hoja de Hechos: Mexico Racks en espanol. OPIS Hoja de Hechos: Mexico Racks en espanol.
OPIS Hoja de Hechos: Mexico Racks en espanol.
 
OPIS Fact Sheet: Bottom Line Report
OPIS Fact Sheet: Bottom Line ReportOPIS Fact Sheet: Bottom Line Report
OPIS Fact Sheet: Bottom Line Report
 
OPIS Fact Sheet: Mexico Racks
OPIS Fact Sheet: Mexico RacksOPIS Fact Sheet: Mexico Racks
OPIS Fact Sheet: Mexico Racks
 
OPIS Fact Sheet: Carbon Market Report
OPIS Fact Sheet: Carbon Market ReportOPIS Fact Sheet: Carbon Market Report
OPIS Fact Sheet: Carbon Market Report
 

Recently uploaded

Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
balatucanapplelovely
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 

Recently uploaded (20)

Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 

Weak Links: Cyber Attacks in the News & How to Protect Your Assets

  • 1. Cyber attacks are becoming more and more common. Besides the obvious damage an attack of this kind can inflict on your business, cyber crimes can erode your customers’ confidence in you and keep them from coming back to your site. This Oil Express Special Report spotlights recent cyber attacks in the retail space and points out the lessons you can learn so it doesn’t happen to your business! OIL EXPRESS SPECIAL REPORT Weak Links: Cyber Attacks in the News & How to Protect Your Assets
  • 2. Criminal Mind: Case Study of a Gas Station Data Threat A recent case study from security consultant Verizon Enterprise puts you inside a payment card harvesting scam. The culprit is an employee of the vendor providing general IT and point-of-sale support to a gas station chain. The vendor connects via remote desktop over VPN to the payment-processing server. The unscrupulous employee seeks out late-night assignments over weekends – when no one is around – and uses remote access to customer systems to harvest payment card data. He obtains the magnetic stripe sequences for conducting payment card fraud then he resets the clock to the correct date and time. He verifies no other active log-ins were in progress, sets the system clock forward or backward in time and modifies a configuration file to enable a debug setting in the payment application. A shared log-in is used. This allows him to create an output file capturing clear text copies of authorization requests from each fuel pump. –– Never assume a POS vendor has strict security practices. –– The help desk should never share log-ins. “The shared log-ins limited accountability and gave the threat actor the confidence that he could get away with it,” said Verizon. –– Usetwo-factorauthenticationforremoteaccessintothePOSservers.“A keyloggeronanyofthehelpdesksystemsisallthatitwouldtakeforthis tomorphfromapartnermisusebreachtoawidespreadexternalbreach,” Verizonsaid. He covers his tracks by conducting all malicious activity only on his manager’s desktop system. WhatCan YouLearn FromThis CrimeStory? Oil Express Special Report | 9737 Washingtonian Blvd, Ste 200, Gaithersburg, MD 20878-7364 | 888.301.2645 | www.opisnet.com 2
  • 3. Verifone Acknowledges Attempted Hack at Gas Stations in the U.S. Even a leading equipment vendor that provides data security solutions can be vulnerable to attacks from hackers. Verifone sells file authentication software called “VeriShield Retain” that’s designed to provide protection against unauthorized access to payment devices. It also offers “VeriShield Total Protect” end-to-end data encryption designed to protect data from the point of capture, its website says. But the large point-of-sale systems vendor said hackers attempted a “cyber incident” in January 2017 at approximately two-dozen U.S. gas stations. No other merchants were targeted, Verifone said in a statement without disclosing the location of the affected gas stations. The newsletter “Krebs on Security” reported that the breach affected companies running its point-of-sale solutions, though Verifone was quoted saying the breach was limited to its corporate network. Last year, another large vendor that supplies gas stations as well as many other retailers with point-of-sale systems also experienced a breach, according to an alert from Visa. On Aug. 8, Oracle Security informed customers of POS provider Oracle MICROS systems to change their account passwords immediately because it had detected malicious code in certain legacy MICROS systems, Visa said. Oil Express Special Report | 9737 Washingtonian Blvd, Ste 200, Gaithersburg, MD 20878-7364 | 888.301.2645 | www.opisnet.com 3
  • 4. Steps You Can Take if You Discover an Attempted Hack Proactively notify Visa, MasterCard and other card networks even if, as was the case for Verifone, the incident appears to be a “very limited cyber intrusion” into a corporate network. 6 Implement additional security controls across corporate networks and determine the type of information that may have been targeted. Even if you, like Verifone, believe there were “no adverse events or misuse of any data resulting from this incident,” continue to monitor for data misuse. Give your company staff and contractors 24 hours to change all company passwords and provide a list of criteria to make passwords more secure. Passwords should be at least 12 characters, must be original (not used by the same employee before) and must contain uppercase and lowercase letters of the alphabet and non- alphanumeric characters such as @, # or *. Limit end users’ ability to load additional software on laptops and desktops as a security measure. 1 2 3 4 5 6 Oil Express Special Report | 9737 Washingtonian Blvd, Ste 200, Gaithersburg, MD 20878-7364 | 888.301.2645 | www.opisnet.com 4
  • 5. MAPCO Case Offers How-To on Notifying Breach Victims Early this year, large Southeastern retailer MAPCO Express Inc. settled lawsuits with consumers and financial institutions for almost $2 million following its 2013 data breach, according to legal documents. About 185,000 accounts were compromised in the breach, records showed. The notification of potential victims that MAPCO undertook exposes the monumental task of exercising due diligence when disclosing the risk of fraud. There are notice laws covering data breaches, on top of reaching out to customers in good faith and following court orders. MAPCO’s more than 6.5 million digital notice impressions delivered by their campaign well exceeded the 2.5 million impressions specified in their court-approved notice plan, according to case documents. Listen to Concerns Respond to written mail from potential victims. Your customers need to hear from you to address all their potential issues. Send Emails to Permissioned Lists All MAPCO “My Rewards” customers who shopped at a MAPCO location between March 1, 2013, and April 30, 2013 received a direct email. Go Digital MAPCO included a social media pitch to 5+ million Facebook users with interests similar to their customers’ as well as banner notices on local news websites. Consider Ads MAPCO had 4,096 paid search notice advertisements on Google, where search engines linked to search terms relevant to the settlement. Create a Settlement Website Post claim forms, important dates and deadlines, legal documents, notices and frequently asked questions – link digital advertising to site. Hit the Phones Set up an automated, toll-free hotline available around-the-clock every day to answer questions on the breach and settlement. Oil Express Special Report | 9737 Washingtonian Blvd, Ste 200, Gaithersburg, MD 20878-7364 | 888.301.2645 | www.opisnet.com 5
  • 6. Beware of Scams Like One That Targeted Kroger Kroger was reported to have been the recent target of a phishing scam. The bogus email, supposedly from the company’s help desk, was an attempt to get employees of the large fuel retailer and grocer to click on a link leading to a website that would allow crooks to obtain tax information. The Kroger email thanked the addressee for “choosing to receive your Kroger employee U.S. tax statements electronically.” It provided a link to a website and said that due to a change in privacy policy, employees must enter the site to get tax information with their user ID and password. The “tax statements” could be viewed or saved to the employee’s computer or printed from the website, the email said. The message said the tax statements would be available for viewing and downloading through Oct. 15, 2017. After that time, the employee would have to pay a “replacement fee” to access the information. Kroger did not respond to a request for comment on the phishing attempt. Further investigation showed the email did not come from Kroger. The W-2 scam uses a corporate officer’s name to request employee W-2 forms from company payroll or human resources departments. The scam is just one of several new variations of targeted phishing scams that have appeared in the past year that focus on the large-scale thefts of sensitive tax information from tax preparers, businesses and payroll companies, the IRS says. Oil Express Special Report | 9737 Washingtonian Blvd, Ste 200, Gaithersburg, MD 20878-7364 | 888.301.2645 | www.opisnet.com 6
  • 7. FBIWarnsAgainstCyberRansom The FBI recently posted an alert concerning the growing cyber-threat from ransomware, a type of malware installed on a computer or server that encrypts the files, making them inaccessible until a specified ransom is paid. Ransomware typically is installed when a user clicks on a malicious link, opens a file in an email that installs the malware, or through drive-by downloads from a compromised website. Drive-by downloads do not require user initiation. Recent variants have targeted and compromised vulnerable business servers to identify and target hosts, multiplying the number of potential infected servers and devices on a network. The crooks are also charging ransoms based on the number of hosts or servers infected. Recent victims infected with this type of ransomware variant have not been provided the decryption keys for all their files after paying the ransom and some have been extorted for even more money after payment. The result: Victims could have to pay more to get their decryption keys, a prolonged recovery time and the possibility victims will not obtain full decryption of their files, the agency said. The FBI does not support paying a ransom and recommends reporting infections to a local FBI office or to the Internet Crime Complaint Center at www.IC3.gov. Victims should provide: Date of infection, ransomware variant (identified on the ransom page or by the encrypted file extension), company information (industry, business size, etc.), how the infection happened (such as a link in email or internet browsing), requested ransom amount, actor’s bitcoin wallet address (may be listed on ransom page), ransom amount paid, overall losses tied to the infection and victim impact statement. In a Tech Support scam, the subject claims to be a corporate employee or an affiliate of a major computer software or security company offering technical support. From Jan. 1 to April 30, 2016, the Internet Crime Complaint Center received 3,668 such complaints with adjusted losses of $2,268,982. Oil Express Special Report | 9737 Washingtonian Blvd, Ste 200, Gaithersburg, MD 20878-7364 | 888.301.2645 | www.opisnet.com 7
  • 8. LatestScam:ThievesGetSocial As more and more entrepreneurs promote their businesses on social media, fraudsters are following them. The Federal Trade Commission (FTC) said it has received complaints from small business owners that fraudsters have reached out to them through Facebook messages. The scammers are telling businesses they are eligible for or have won a business grant from the government. The same fraudulent pitch also has recently gone out via email and online ads and could be attractive to business owners interested in federal assistance. For example, it may appeal to oil marketers seeking to diversify into alternative fuels. The FTC also reports that social media scams designed to steal information and hack your accounts appear to be from a “friend.” The scammers can spoof social media messages to make them appear to be from a business contact. The fraudster could be trying to get your cellphone number, for example. Be sure to warn employees of this form of fraud, especially those responsible for handling your Facebook page, website and other social media accounts. The “Business Email Compromise,” or BEC scam, cost some 14,032 U.S. companies nearly $1 billion from October 2013 to May 2016. The scam involves fraudsters assuming the identity of the CEO, a company attorney or a trusted vendor and making an urgent request for money. TheFTCsaystowatchfortheseredflags: –– The government will not contact you through social media, email or text message to offer funds. –– Real government grants do not require you pay first, so avoid offers that require payment to get the assistance. –– The government will not request your passwords before providing a grant. If you get such a request, it is just a thief trying to hack into your accounts to steal your money or to impersonate you to defraud others. Keep up with the latest news on cyber attacks, data breaches, and everything else impacting the petroleum marketing industry — sign up for a free 2 week trial to Oil Express. Visit try.opisnet.com/oe17008 to get started. Oil Express Special Report | 9737 Washingtonian Blvd, Ste 200, Gaithersburg, MD 20878-7364 | 888.301.2645 | www.opisnet.com 8