Posted by: Arian Eigen Heald
Admins and Auditors, Data Breaches, information security, PCI
By now I’m sure you’ve heard that Albert Gonzalez is being charged with the attacks on Hannaford, Heartland, 7-Eleven, etc. In between all the excited reporting, are some points that admins and auditors ought to pay attention to. We ought to ponder how this attack is different from attacks in the past, and why this attack was so successful.
1. Using a “team.” Most of his team have not been captured, residing as they may somewhere overseas. Using a multiple talent set across several different technical approaches increases the chances of success. This is becoming more and more common, especially with ATM break ins.
2. They used SQL-injection attacks. This isn’t new, but all of these folks were having quarterly scans from external vendors as part of PCI compliance. Why didn’t the scans catch the injection vulnerabilities? Makes you want to take another look at the scanning company you may be using, doesn’t it?
3. They broke in via wireless. Anyone still using WEP out there – it’s now trivial to crack the protocol, and someone will certainly do it if you offer it up.
4. There’s a big market for those credit cards and the people that can get to them. Over 130 million cards made him a LOT of money.
And we still don’t know “exactly” how he was caught, do we?