See the step-by-step ways the average hacker looks for valuable data.
By: David EllisBusiness owners who have suffered a data breach at the hands of some hacker often say, “Why me? Why did the hacker choose our business?” Many people think hackers selectively pick each business they hack. However, I suspect that in 90% or more of the businesses that are hacked, it all began based with the random discovery of a hackable vulnerability. Hackers typically begin a data breach scenario by conducting port scans across large ranges of IP addresses, specifically looking for certain open ports that may provide them a place to start digging. Let me take you through a typical hacking scenario.1) Scan for open ports
The hacker starts by running a port scan to probe a large range of IP addresses, and then he heads off to bed and lets the scan run all night. The goal is to find particular open ports to exploit a known or potential vulnerability. In the morning the hacker peruses the results of last night’s port scan, looking for certain ports that are actively “listening” (meaning they’re open). He likely has some automation at work that gives him a list of IP addresses with port numbers, 20, 21, 23, 513, 3389, 5631, 5632, and so on. He’s interested in these exact ports (and a handful of others) because they all relate to some form of remote access into their networks. For example, if a hacker sees ports 5631 and 5632 are open, he knows the remote access application pcAnywhere is installed and active. Or if he sees port 3389 is open, he knows Windows Remote Desktop is likely configured. If he can hack the remote access credentials, he doesn’t have to worry at all about complex firewall configurations or other perimeter protections.If the remote access application was not configured to require two-factor authentication, he can probably guess the username and crack the password, and once he’s done that, he’s in. Everything on your system that you can see, he can see as well.SEE ALSO: Infographic: Cybercriminals Love When You Use Remote Access2) Try out default passwordsMany users fail to change or delete the default username or password that was configured with their remote access product when it was first installed. So, the hacker merely begins by trying the known pcAnywhere (or Windows Remote Desktop, or VNC, or FTP or whatever other remote tool) default username and password. At this point, does the hacker know that he’s attacking Acme Hardware? No. And he doesn’t care. He’s simply attacking a potential vulnerability via port 5631. The IP address might be for a business or it could be my grandmother’s ten-year-old PC. If the default password was left on the system, the attacker has now successfully gained access to the system. If the default password tactic doesn’t work, it’s just a minor inconvenience. Password cracking tools are plentiful and are getting more powerful all the time. At this point, the hacker runs his password-cracking tool and takes off for lunch while the tool does the heavy lifting. When he returns in an hour, or a couple of days, his tools have often detected the needed password, and he’s in.SEE ALSO: Two Factor Authentication – Security Beyond PasswordsThere are other, even less technical ways to breach perimeter security like imbedding malware in online games or other legitimate website activities and waiting for users to inadvertently download a RAT to their system. (RATS are remote access trojans, and can be purchased online for just $40. They give the hacker covert remote access and establish persistent backdoor access to your system.) These types of malware can also be accidentally installed by the user through an email phishing scam.Follow for more data security articles like this3) Once he has controlWhether the hacker cracked your remote access credentials or you opened a malicious email link, you’re now in the hacker’s clutches and he begins prospecting. Up to this point the hacker still doesn’t know if he’s hacked a business or a personal computer. Now, he looks for evidence that the system holds information of value, such as credit card account numbers, banking, real estate, or healthcare records (since these often contain social security numbers or other data that he can turn into a payday). To discover the nature of the environment where he has landed, the hacker will often run keyword searches. For example, if his keyword searches discover the system he’s hacked is a Micros system, he knows he’s in a business that accepts credit cards. (Micros is a provider of POS hardware and software used by many hotels, restaurants and other small businesses.) He will probably try Micros default passwords to try to get into their server. 4) Install malwareIf the hacker is successful in breaching a commerce environment, he will attempt to install data-capturing malware on the POS system. His malware will seek to detect credit card data, capture it, and export it out of the system. He then either reproduces the stolen credit cards or sells the stolen account data on the black market. Depending on the malware installed, from the point of malware installation through the moment that the breach is detected and eradicated, every single customer credit card transaction made on that computer (and perhaps on the entire network) would be at risk.5) Search for affiliated IP addresses
By now, the hacker has probably sifted through enough company data to realize he’s hacked Acme Hardware. The hacker realizes he’s hit a potential jackpot, because Acme Hardware is a national chain (in this scenario). Since the hacker doesn’t know the IP addresses of the other chain locations, hacking them could be difficult. However, if he finds remnant data on the system that includes the other IP addresses, or connections to the corporate servers, Acme Hardware could be in some serious trouble (we’ve seen many cases where the breach of a single locale lead the hacker to the corporate environment and all of the stores in the chain). Remnant data left on systems does occur. In a forensic investigation we conducted, a POS installer inadvertently left a partial client list on a POS system that contained the names and IP addresses of 28 other clients. All 28 were also hacked because of a careless installer. 6) Leave no traceAt this point, the hacker has a couple of choices: he can leave the malware in place and harvest customer credit card data until the breach is discovered and/or the vulnerability is closed (the most common alternative in commerce breaches), or he can choose to clean up his tracks and get out of the hacked system (seen in cases of corporate espionage or theft of corporate secrets). Most attackers cover their tracks to avoid detection. They encrypt card data before transferring it out of a system, erase or modify security logs, run malware from RAM instead of the hard drive, which often goes undetected by most antivirus software, and employ many other “anti-forensic” tactics in order to escape unseen. SEE ALSO: How do Hackers Hack?Hackers don’t care who you are. They just care how rich you can make them.Now that you understand hackers don’t pick and choose their hacking victims out of the phone book, you should also understand the flaw in the common belief held by small businesses, “I’m too small for a hacker to care about me!”A hacker doesn’t care if you’re small. He just cares if you have data from which he can profit.
TweetSo it’s more crucial than ever to implement data security! Need help securing your data? Talk to one of our consultants! David Ellis (GCIH, QSA, PFI, CISSP) is Director of Forensic Investigations at SecurityMetrics with over 25 years of law enforcement and investigative experience. Check out his other blog posts.
Why we do what we do and not what we don’t do
Why do we do what we do?
Why do we choose a certain behaviour/action over other options?
What rules govern our decision-making?
Why do we become indecisive at times?
Answers to all these questions is contained in a terminology that we’ve borrowed from economics, namely ‘cost/benefit…
see more at www.psychmechanics.com
PAVE the Way to Success in the New Year
If you’re like many people then you’ll be making New Year’s resolutions in a few days and if you’re like most people you’ll break your resolutions within a few days. According to one study, more than half the people who make resolutions are confident of achieving them, yet barely more than 10% do so. That’s amazing because most resolutions are good! Here are a some of the most popular New Year’s resolutions: Spend more time with familyLose weightBegin exercisingQuit smokingQuit drinkingGet organizedGet out of debtThe list is admirable so why are these goals so difficult to achieve for 9 out of 10 people? There are probably as many reasons as there are resolutions and dwelling on those reasons would not be as beneficial as giving you scientifically proven ideas that can help make 2016 a year of positive change for you. Around this time every year I share an influence technique that can help readers PAVE the way to success in the New Year.In the study of persuasion there’s a powerful motivator of behavior known as the principle of consistency. This proven rule tells us people feel internal and external psychological pressure to act in ways that are consistent with their prior actions, words, deeds, beliefs and values. When we act in consistent ways we feel better about ourselves and other people perceive us in a more favorable light.There are four simple things you can tap into in order to strengthen the power of consistency in your life. These simple ideas will help you PAVE the way to success because they’ll dramatically increase the odds that you’ll follow through on your New Year’s resolutions.Public – Whenever you make a public statement, whether verbally or in writing, you’re putting yourself and your reputation on the line. The mere fact that another person knows your intention and might ask you how you’re doing is often enough motivation for you to follow through.Recommendation #1 – Share your New Year’s resolution with another person, or group of people, and ask them to hold you accountable.Active – You have to actively do something. Merely thinking about a resolution, just keeping it to yourself as some sort of secret, will lead to the same results as people who don’t make any resolutions. In other words, nothing will change. This came to light in a study with a group of students who wanted to improve their college grades. One group was asked to write their goals down, one group kept their goals in their heads, and the last group had no specific goal whatsoever. As you can imagine, the group with the written goals succeeded, with nearly 90% of students increasing their grades by a full letter grade! With the other two groups the results were identical and poor. In each group fewer than 1 in 6 students improved a full letter grade. It’s worth noting, they were all given the same study materials so they all had the same opportunity to better their GPA. Recommendation #2 – Make sure you have to take some active steps. It could be as simple as buying a book to help you learn more about the changes you’re hoping to make or writing them down. Voluntary – This has to be YOUR goal, not someone else’s goal for you. If you’re trying to do something – quit smoking, lose weight, get in shape – it’s not likely your motivation will last if someone told you that you have to do it. The goal has to come from you because if it’s forced on you it’s not likely your willpower will last long. Samuel Butler said it best when he wrote, “He who complies against his will is of the same opinion still.” Recommendation #3 – Make sure it’s something you really want to do of your own free choice. Effort – It was already noted that you have to actively do something. In other words, making the commitment should require some effort on your part. The more effort you expend setting up your goal, the more likely you are to succeed. Something as simple as writing down your resolution can make a difference, even if you don’t share it with anyone. But, taking the time to share it also fulfills the public requirement, which gives you more bang for the buck! Robert Cialdini puts it this way, “People live up to what they write down.” Recommendation #4 – A little more effort, like committing pen to paper, will increase your chance for success significantly. So to recap the four recommendations: Public – Share your resolutions with others. Active – Make sure to take some active steps.Voluntary – Make it your goal and own it. Effort – Commit pen to paper. None of what I just shared is new but I’m guessing many of you haven’t tried to PAVE the way to success before. If you’ve failed at your resolutions in the past then give this approach a try. If you fail again you’re no worse off but this different approach might just be your key to success in 2016. Good luck and Happy New Year’s!
Brian Ahearn, CMCT® Chief Influence OfficerinfluencePEOPLE Helping You Learn to Hear “Yes”.
- « Previous Page
- 1
- …
- 167
- 168
- 169
- 170
- 171
- …
- 561
- Next Page »