More Breaches More Trouble at the Home Depot and eBay

Page created by Ana Armstrong
 
CONTINUE READING
SecurityScorecard

More Breaches More Trouble at the
Home Depot and eBay
ThreatScape Analysis of Recent Retail Breaches at Home Depot

Overview
During the second half of CY 2014 several large retail corporations in the United States experienced data
breaches. This SecurityScoreacrd ThreatScape Analysis examines available intelligence surrounding two
major retailers that announced breaches within several months of each other, Home Depot and eBay. Home
Depot is a big box home improvement chain that conducts the majority of its business in brick and mortar
stores nationwide. In September 2014, Home Depot announced a breach of its credit card data. The stolen
data consisted of magnetic stripes that allow for cloning of credit cards for fraudulent use. According to
media reports, it is estimated that more than 60 million customers were impacted and fraud losses have to
potential to total in excess of $2 billion.

Earlier in the year, eBay announced a breach of proprietary user data. eBay is a multi­faceted e­commerce
website. The exfiltrated data included usernames, emails, encrypted passwords and other bits of personal
identity information. The theft was reported to have occurred over a period of months. The data could be used
for auction fraud and any other type of fraud connected to a user’s online identity. ebay didn’t specifically
reveal how many accounts were exposed. A spokeswoman said the breach affected “a large number of
accounts.”
The way the two retailers conduct business is as different, as the data that was exfiltrated. However, both
incidents have unique resell value in the underground. More importantly, and both breaches were seemingly
predictable through the analysis and visualization of certain aspects of intelligence feeds that indicated
trouble before the public announcement.

Home Depot
SecurityScorecard found Home Depot’s security health to be poor (Fig. 1).

  Fig.1 ­SecurityScorecard for Home Depot, September 2014

Between May 2014 and September 2014, there was a noticeable increase in malware on the Home Depots
network (Fig. 2). The breach announcement was made September 2014.

Leveraging public intelligence, SecurityScorecard showed a spike occurred in early May and continued for
months. This information could have been an early warning indicator that something was very wrong within
Home Depot’s corporate network infrastructure.

SecurityScorecard Always Know.                                                                                  1
Fig 2 ­Detected public malware presence on Home Depot network, from March – September 2014

As is seen after such intrusions, the Home Depot stock price (NYSE: HD), dropped during the announcement
of the breach (Fig. 3). While the stock of most publicly­held companies experience a rebound in the months
following the announcement of a breach, retailers must contend with reputational damage the is often not so
easily repaired, producing negative consequences on business performance over time.

  Fig 3 ­Home Depot stock price (3 month ticker) shows share price drop following breach announcement

eBay
Like Home Depot, SecurityScorecard found that eBay had poor enterprise network health. eBay achieved
a low grade in endpoint security as well as a mediocre score in network defense security. These conditions
could have allowed for a successful breach and exfiltration.

  Fig.4 ­SecurityScorecard for Ebay.com ­September 2014

SecurityScorecard Always Know.                                                                                2
A noticeable boost in malware infections occurred between May 2014 and September 2014 (Fig. 5) on eBay’s
network; almost identical to the Home Depot infection timeline. Unlike Home Depot, eBay announced the
breach in early in May.

  Fig 5 ­Detected public malware presence on eBay network from March–September 2014

The infection intelligence information could have been an early warning indicator that something was awry
within the corporate network infrastructure, possibly prompting the breach announcement.
The predictable drop in stock price (Fig. 6) was experienced by eBay when it the breach after discovery, but
have subsequently recovered from the decline in price.

  Fig 6 ­Stock movement for eBay surrounding breach announcement (3 month)

SecurityScorecard Always Know.                                                                                 3
Reasons for Malware Infection
Poor endpoint security and mediocre defenses allowed for a persistent malware infection of both retailers’
websites. Outdated browsers were detected as being used in both enterprise environments, which likely made
way the observed malware infections possible. Analysis of detected malware trends indicated a majority of
infection emanating from both corporations was AdWare which often comes from “Loader” style malware.
Loaders are able to download and execute virtually any type of executable file stealthily. They are also used in
spam campaigns and as targeted data theft campaigns.

The reason this malware was able to function and extract the data successfully is possibly a result of poor
network security that may not have been configured to detect the exfiltration of data until it was too late. For
companies that are or could face this crisis, detecting this type of malicious activity is done through the use
of an IDS/IPS, log analysis, alerting systems and updated antivirus solutions on both the client machine and
server.

The Need to Heed Hacker Chatter
ebay account credentials have long been sought by individuals who want to perpetuate auction fraud. They
seek to either make purchases using compromised accounts or create fake listings using an aged account to
dupe an unsuspecting users into parting ways with their money.

SecurityScorecard chatter sensors are able to detect discussion about the use of compromised eBay
credentials (Fig. 7).

  Fig 7 ­Individual seeking purchase hacked Ebay/Paypal credentials

Just as ecommerce logins are of value so too are stolen credit cards. The cards come in two forms primarily,
“dumps” and “cvvs.” “Dumps” consist of magnetic stripe data that can be encoded onto blank credit cards.
CVVs consist of the numeric information along with the billing address needed to make online purchases
with the card. The realm in which hacker chatter occurs is a virtual bazaar for the sale and resale of stolen
credit card data. SecurityScorecard sensors identify discussion about the sale and resale of stolen credit card
card data (Fig. 8).

  Fig 8 ­Cards for sale identified

SecurityScorecard Always Know.                                                                                     4
Conclusion
The availability, analysis, and visualization of public intelligence related to malware infection, network
security posture, underground chatter and other key risk vectors allows for the collection and profiling of the
danger posed to the Internet presence of enterprise organizations. Both Home Depot and eBay experienced
increases in malware infections. The rise in detected infections prior to breach announcement can serve
as an early indicator for future breaches of targeted industry verticals. Chatter can then be analyzed to see
what types of stolen data is being monetized by the underground and businesses can better understand what
assets are being targeted after a successful breach. Of course, this insight can allow an enterprise to be better
prepared to curtail a breach or, short of that, contain the damage.

Glossary
Adware Malicious software that displays unwanted advertisements, often used by ‘Loader’
		 features to monetize Botnets.
  Botnet ­ Network of infected computers under the control of an administrator
 Chatter ­ Public discussion about topics of interest
    CVV ­	 Credit card number along with 3 digit code and billing address. Used for online purchases.
  Dumps ­ Magnetic stripe data contained on a credit card. Uses for in store fraud.
  Loader ­	 Malware feature that allows the remote download and execution of additional malicious software

About SecurityScorecard
SecurityScorecard, Inc. helps organizations in today’s increasingly interconnected world better manage all key
risks their information systems and those of their partners face every second of every day.

Security Scorecard is the only fully­automated security grading service that looks at all the key potential risks. It
gives deeper insight into malware activity, social engineering, website vulnerabilities, network exploits, leaked
corporate credentials, breach history reports, and more.

Security Scorecard Inc. is privately­held with headquarters in New York, NY. Founded in 2013,
Security Scorecard investors include Evolution Equity, /bold/start and Atlas Ventures, among others.
For further information, please visit www.securityscorecard.com.

SecurityScorecard Always Know.                                                                                          5
You can also read