Losing control

Access & Identity Management Handbook 2012 Access Control & Identity Management

Evolving corporate cybercrime and escalating losses points to a loss of control in IT security.

Regulatory compliance has compelled many organisations to consider and counter the risks of having customer data stolen. But compliance in this area may have created a dangerous blind spot when it comes to recognising the more damaging consequences caused by the cyber theft of corporate secrets.

Theft of custodial data, such as the 100 million customer records stolen from Sony in May 2011, attracts far more attention than the theft of intellectual capital or secrets. It is highly newsworthy because it potentially affects so many individuals, the people whose data has been stolen and who may be vulnerable to identity-based fraud.

But this heightened awareness perhaps creates even more pressure to protect custodial data, shifting the focus even further away from protecting secrets.

Mark Eardley
Mark Eardley

Corporate secrets are now the jackpot

Commenting in June on the findings of Verizon’s 2011 Data Breach Investigations Report, (DBIR) Dave Ostertag, global investigations manager at Verizon Business, said, “I think what we are seeing is that there is a big change in the type of data that criminals are going after.

“There is a glut of personal data out there now and there really is not a great market for it. The value of intellectual property, on the other hand, is much higher. Criminals are finding that they can make as much money from stealing a smaller number of highly sensitive records as they can from stealing a big database of customer information.”

Ostertag’s comments carry significant authority: now in its seventh year, the DBIR’s findings are based on investigations into over 1700 data breaches and the report is probably the world’s leading examination of corporate cybercrime. The last two reports have combined research into cybercrimes by both Verizon and the US Secret Service – an agency tasked with protecting America’s financial infrastructure and payment systems as well as guarding the president.

This message about the changing focus of cybercrime was reinforced in February this year by a UK government report which estimated that the cyber theft of corporate secrets cost UK companies £16,8 billion to R185 billion – and accounted for almost 60% of all the country’s cybercrime losses in 2010. The UK report shows that losses from the cyber theft of secrets are over four times higher than the £4 billion lost to high-profile cybercrimes involving identity theft, online fraud and theft of customer data.

The growing threat to corporate secrets was also highlighted by a March 2011 report from McAfee, which stated that, “While it remains a profitable enterprise to buy and sell stolen credit cards, lately, intellectual capital has become the new source of large and easy pay-outs.”

And there is plenty of evidence to illustrate the realities of the cyber threat to intellectual assets. During 2009 and 2010, the corporate secrets of hundreds of organisations were the focus for two sets of serial cyber attacks now known as Operation Aurora and Night Dragon. High profile corporate targets of Aurora included Google, Northrop Grumman, Morgan Stanley, Dow Chemical, Yahoo and Adobe. McAfee’s report says that the Night Dragon series of cyber attacks were specifically focused on stealing secrets from oil and gas companies around the world and that highly sensitive information including project financing and bidding documents was stolen over a period of several months.

Knowledge represents financial value

Ocean Tomo, a US merchant bank, estimated that in 2009 the implied intangible asset value of the S&P 500 reached 81%, an all-time high since the firm began charting such values in 1975.

James E. Malackowski, Ocean Tomo’s chairman, explains that, “Within the last quarter century, the market value of the S&P 500 companies has deviated greatly from their book value. This value gap indicates that physical and financial accountable assets reflected on a company’s balance sheet comprises less than 20% of the true value of the average firm.”

But intellectual assets such as those that can be patented or similarly protected represent only part of the information that organisations need to hold securely.

The overall knowledge base of confidential information is multifaceted and might include production processes, R&D findings, source code, formulae, M&A activity, partnerships and alliances, product rollouts, financing arrangements, contract bids and deal negotiations, pricing structures, legal activities, financial forecasts and results, and strategic plans.

From a South African perspective, the UK government report on cybercrime says that mining companies headquartered in the UK lost £1,6 billion – some R18 billion – through the cyber theft of corporate secrets in 2010.

The report suggests that this was due to the ‘increasing market value of raw minerals and the high level of mergers in this sector at present’. It also suggests that mining companies are particularly vulnerable to the theft of corporate information as opposed to operational information. The difference perhaps being not how you dig, but where you are planning to dig and who is going to be digging with you.

Creating huge vulnerabilities

The abuse of traditional IT access credentials like cards, PINs and passwords lies at the heart of most corporate cybercrime – even the most sophisticated ones.

The term advanced persistent threat, or APT, is increasingly used to categorise cyber theft that is sophisticated, organised and determined. The other defining characteristic of an APT is its specific purpose: stealing corporate secrets.

A March 2011 analysis by IBM of cybercrime trends and risks says that a common denominator within APTs is ‘that the attacker attempts to use legitimate protocols and masquerade as a legitimate user whenever possible’.

In 2010, Ernst & Young and Deloitte both published commentaries on the increasing cyber threat to corporate secrets posed by APTs and emphasised the vulnerabilities created by traditional credentials. Deloitte said: “In many cases, cyber criminals have obtained credentials and accessed systems as if they were actual employees and customers. Thus, the integrity of the endpoint that is being granted access to the organisation’s systems and data must be a primary concern.

“Authorised users can access and travel throughout a system, remove or change data in the system, and conduct transactions. When cyber criminals employ such users as unwitting accomplices … they can operate as if they were users. They can acquire the same, or even greater ability to navigate pathways, copy data, execute transactions and monitor keystrokes.”

Ernst and Young’s comments support this opinion concerning the risks exposed by conventional IT access credentials: “A common characteristic of APT malware is that it seeks to steal the credentials of valid users so that it can execute as a legitimate user and better evade detection.”

These vulnerabilities were also highlighted by Verizon’s 2010 DBIR, which says: “The use of stolen access credentials was the number one hacking type in the data breaches that were investigated by Verizon and the Secret Service. It might be hard to believe, but stolen IT access credentials were the commonest way attackers gained access to enterprise systems.”

But the credentials were rarely stolen using methods such as key logging, social engineering or phishing. According to Bryan Sartin, Verizon’s director of investigative response, “Most of what we saw was simple exploitation of guessable passwords. These were not very sophisticated hacks at all.

“Stolen credentials offer an attacker many advantages, not the least of which is the ability to disguise himself as a legitimate user. Authenticated activity is much less likely to trigger IDS (intrusion detection systems) alerts or be noticed by other detection mechanisms.”

We all know that cards, PINs and passwords are all routinely lost, forgotten and shared. Even American presidents have mislaid their ‘biscuit’, a card that holds numbers which open a briefcase – known as the ‘football’ – containing US nuclear launch codes. Bill Clinton apparently lost his for several weeks and Jimmy Carter is said to have sent his to be dry cleaned with a suit.

The advent of so-called strong passwords, smartcards and one-time PINs does nothing to alter the fact that anyone can use your credentials and you can use theirs. They are inherently insecure. Even the security of EMV compliant Chip & PIN payment cards has been shown to be fundamentally flawed and was demonstrated to be so by a Cambridge research team on BBC’s Newsnight in 2010.

IT access credentials are now a target

Aside from being repeatedly lost, shared and forgotten, IT access credentials are increasingly being stolen. Bryan Sartin, director of investigative response at Verizon, said in April this year that with prices reaching $30 000 per account, usernames and passwords are the most common type of records traded on the cyber black market and have the highest per-record value.

The realities of Sartin’s comments were exemplified by a recent cyber theft at RSA, the security solutions division of IT giant EMC.

In March 2011, RSA announced that cyber villains had stolen secrets about SecurID, a two-factor authentication product based on static and one-time PINs that manages IT access for some 40 million employees at over 30 000 companies worldwide.

If not immediately obvious, the reasons why cyber villains would want to steal secrets about SecurID became clear a few months later. The incident at RSA appears to have led directly to an attempted cyber theft at Lockheed Martin in May.

Describing this attack as ‘significant and tenacious’, Lockheed said it would be replacing its SecurID tokens and was instructing all employees to change their passwords. As the world’s largest defence contractor, it is obvious that Lockheed was not targeted for its custodial data.

The cyber theft at RSA was based on the exploitation of employees’ access credentials. RSA says that the cyber theft began with a spear phishing attack on targeted employees that led to one of them opening a malware-loaded Excel file entitled ‘2011Recruitment plan xls’. The malware opened a backdoor on the target’s computer, enabling the villains to control it remotely. Using the target’s access rights, the villains then climbed RSA’s internal authorisations ladder, stealing more credentials and increasing the privileges associated with them in user, domain admin and service accounts.

It seems that RSA employees were not using SecurID to authorise themselves within their own systems and that usernames and passwords were yet again at the very heart of yet another collapse in IT security.

The Aurora thefts were executed in much the same way as the theft at RSA. Earlier this year, Heather Adkins, Google’s information security manager, said their exposure to Aurora started with a spear phishing campaign targeting a small number of employees.

Just as in RSA’s case, information on these targets was apparently gathered from social media networks. Spear mails sent to the targets were designed to motivate visits to a photo Website set up by the people behind Aurora. One of the Google targets clicked on a link to the Website, triggering the backdoor process and subsequent credential exploitations within Google’s IT systems.

Mega losses in the real world

The damage caused to RSA by the cyber theft of its secrets is known to be substantial. Several of their competitors have offered to replace SecurID products with their own security solutions. For example, within days of RSA’s announcing the cyber theft, Computer Associates said it would step into the breach and swap SecurID tokens with its own IT authentication product – for free – and throw in a three-year enterprise licence.

Following the attempted cyber theft at Lockheed, RSA announced their own free replacement programme for SecurID tokens. In a Reuter’s interview at the end of June, the company said that in order to implement this programme it intended to increase production of SecurID tokens into millions per month from a baseline of a few hundred thousand.

This was in addition to mounting a massive customer outreach initiative in April that involved supplying over 60 000 customers with security info and advice; making 15 000 customer phone calls; conducting conference calls with another 5000 of them and holding hundreds of face-to-face meetings. And in July 2011, RSA announced that it was allocating $66 million (R462 million) to fund their response to the theft – a figure that excludes costs arising from possible legal actions against them and the company’s inevitable loss of customers and credibility.

In response to the world’s largest theft of custodial data, Sony has said it is spending $171 million – R1,2 billion – in remedial activities such as increasing IT security and providing identity protection and apology freebies to its customer base.

To put that $171 million into perspective and to illustrate the changing nature of crime, it is worth noting that in 2005, a Brazilian bank experienced one of the biggest cash robberies of all time – about $70 million in used banknotes went missing down a tunnel dug into the vault. The cyber theft at Sony will cost the company at least $100 million more than that old-fashioned heist. And even though Sony’s R1,2 billion is a massive allocation it apparently does not include costs for any customer-based legal actions against them or fines that may be imposed for inadequate data protection.

But R1,2 billion seems almost like small change in comparison to the R16,1 billion ($2,3 billion) that Swiss bank UBS has recently lost as a result of unauthorised trading by a London-based employee. In the week of September 2011 that the loss was reported, the Financial Times cited poor risk management as possibly being a key contributor in a trading deception that dates back to 2008.

Poor risk management was certainly a factor that led to the really mega loss of €4,9 billion (R52 billion) at the second largest bank in France. During a three-year period from 2005 to 2008, Jerome Kerviel of Societe General conducted over €50 billion in unauthorised futures trades. Kerviel is known to have used colleagues’ passwords as a means to carry out and cover-up his illicit and prolonged trading.

It should surprise nobody if it transpires that the abuse of outmoded access credentials also enabled the long-term unauthorised trading at UBS.

Cyber villains are smart villains

For American bank, Citigroup, the May 2011 cyber theft of details on over 360 000 card holders led to the company issuing over 217 000 new credit cards at the beginning of June as well as reinforcing its IT security and account monitoring measures. But the reinforcements at Citigroup have not been entirely successful. The bank disclosed at the end of June that some $2,7 million had already been lost to fraudulent payments on over 3400 of the affected cards.

And yet when it first announced the cyber theft, Citigroup said that the stolen data was insufficient to enable transactions – customers were not at risk since Social Security numbers, birth dates, card security codes and expiry dates were not taken. It now seems that card numbers, addresses, holders’ names and e-mail details were an effective starting point for the cyber villains and that $2,7 million is sufficient incentive to leverage such limited data.

The message here is clear: give the cyber villains an inch and they will take a mile.

A June 2011 report by Cisco Systems on the evolving nature of cybercrime says that the volume of spray-and-pray malicious spam has declined by more than half in the past year. At the same time, highly personalised, focused e-mail based attacks have tripled because they offer far better ROI to the cyber villains.

The report divides these focused e-mail campaigns into two categories: spear phishing and targeted attacks. Spear phishing covers activities that are aimed at groups of potential victims who share a common feature – for example, corporate customers of a specific bank.

Cisco estimates a spear phishing attack costs five times that of a mass attack. The villains’ investment might include list acquisition, leasing a botnet, e-mail generation tools, malware purchases, Website creation, campaign administration tools, order processing and fulfilment infrastructure, and background research on targets.

The report says that the return on such an investment for a single spear phishing campaign can be more than 10 times that of a mass attack.

The content and format of both spear phishing e-mails and of the Websites to which they commonly direct victims are often sufficiently convincing in their attempt to establish legitimacy. In an attack on a group of banking customers, the typical objective will be to deceive victims into supplying usernames and passwords, enabling illicit transactions on the victim’s account.

Focusing on much lower numbers of victims, Cisco defines targeted attacks as being “directed at a specific user or group of users, typically for intellectual property theft”. The report says: “Targeted attackers often build a dossier of sorts on intended victims, gleaning information from social networks, press releases, and public company correspondence.”

Allied to highly targeted spear e-mails, Cisco says these attacks, “generally employ some form of malware in order to gain initial entry to the system and to harvest desired data over a period of time.”

As to the returns from a targeted attack, these are harder to quantify simply because corporate secrets do not have a book value. For example, who knows the going rate for M&A information that might be held by a merchant bank or accountancy practice?

The most critical, sensitive or secret information is obviously the most attractive to the smartest, best resourced cyber villains. The IBM report on cybercrime refers to APTs as ‘low and slow coordinated attacks’ that are ‘often an indicator of highly cohesive and organised groups of attackers who use a variety of sophisticated attack techniques to inch their way into the enterprise’.

Should governance alarm bells be ringing in the boardroom?

At the highest executive level, the losses caused by cybercrime should certainly serve to highlight the routinely damaging consequences of lax IT security. What should add to alarm in the boardroom is the fact that, typically, the Sony and Citigroup breaches both appear to have been based on elementary exploits – an underlying feature of most corporate cybercrime.

Perhaps we need to recognise that data governance – statutory or not – should be receiving the same diligence as, say, corporate brand management and financial reporting. And this diligence is increasingly required as cyber villains shift their focus from custodial data to corporate secrets. As ever more custodial data flows onto the cyber black market, its value keeps on falling and the villains are looking elsewhere for more lucrative sources of cyber revenue.

The evolving nature of cybercrime means that managing all types of sensitive data is now one of the priorities for senior executives. Protecting such information with nothing more than passwords or PINs must surely raise deep concerns.

Speaking at the launch of the UK government’s cybercrime study in February this year, the then minister for security said that many companies do not know what the normal functioning of their IT systems looks like because they do not actually know enough about their own systems. In other words, organisations are not doing enough to protect themselves from the cyber threat and the villains are running rings round IT security.

Protecting sensitive data means winning back far more control over who can access that data. The evidence is overwhelming that the status quo in user authentication just is not working. If cards, PINs and passwords are no longer an effective barrier to the cyber-theft of secrets, is it perhaps time for us to break our reliance on them?

In South Africa, the world of physical security decided long ago that cards, PINs and passwords are no longer an effective way to identify people and manage their access rights. Consequently, thousands of local organisations have replaced cards, PINs and passwords with biometrics: there are now over 65 000 Morpho fingerprint readers deployed across southern Africa controlling the physical access for some 2.5 million people in environments ranging from mines to residential estates. And that is only the figures from one biometrics brand.

The business case for such widespread and extensive use of the technology is disarmingly simple: competent biometrics pay for themselves by cutting the recurring losses caused by unauthorised access and activity.

Is that not just what IT security needs, too?

The theft of corporate secrets and its consequences

Information in this article has been drawn from the following sources:

* Underground Economies: Intellectual Capital & Sensitive Corporate Data Now the Latest Cybercrime Currency, March 2011. McAffee

* The Cost of Cyber Crime, Feb 2011. Detica & The Office of Cyber Security & Information Assurance, UK Government Cabinet Office http://www.cabinetoffice.gov.uk/sites/default/files/resources/the-cost-of-cyber-crime-full-report.pdf

* Insights on IT risk. April 2010. Ernst & Young http://www.ey.com/Publication/vwLUAssets/Insights_on_IT_risk_-_04_2010_-_Countering_cyber_attacks/$FILE/EY_Insights_on_IT_risk_04_2010_-_Countering_cyber_attacks.pdf

* Cyber crime: a clear and present danger. Sep 2010. Deloitte http://www.deloitte.com/assets/Dcom-UnitedStates/Local%20Assets/Documents/AERS/us_aers_Deloitte%20Cyber%20Crime%20POV%20Jan252010.pdf

* The Value of Corporate Secrets, March 2010. Forrester Consulting for RSA (EMC) & Microsoft http://www.rsa.com/products/DLP/ar/10844_5415_The_Value_of_Corporate_Secrets.pdf

* 2010 & 2011 Verizon Data Breach Investigations Report. Verizon & US Secret Service www.verizonbusiness.com/.../rp_2010-data-breach-report_en_xg.pdf

* SearchSecurity.com. April 2011. Podcast interview with Bryan Sartin, director of investigative response, Verizon http://itknowledgeexchange.techtarget.com/security-wire-weekly/the-2011-verizon-data-breach-report/

* Chip & PIN is broken. 2010: University of Cambridge Computer Laboratory http://www.cl.cam.ac.uk/research/security/banking/nopin/oakland10chipbroken.pdf

* Chip and PIN is broken. BBC Newsnight, Feb 2010 http://www.youtube.com/watch?v=JPAX32lgkrw&feature=player_embedded

* US nuclear codes: key terms explained. The Telegraph, October 2010 http://www.telegraph.co.uk/news/worldnews/northamerica/usa/8077870/US-nuclear-codes-key-terms-explained.html

* Email Attacks: This Time It’s Personal, June 2011. Cisco Systems http://www.cisco.com/en/US/prod/collateral/vpndevc/ps10128/ps10339/ps10354/targeted_attacks.pdf

* IBM X-Force 2010. Trend and Risk Report. March 2011 http://public.dhe.ibm.com/common/ssi/ecm/en/wgl03007usen/WGL03007USEN.PDF

For more information contact Supervision Biometric Systems, +27 (0)82 463 3060, www.supervision.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Bespoke access for prime office space
Paxton Access Control & Identity Management Residential Estate (Industry)
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...
Next-generation facial recognition access control system
Enkulu Technologies Products & Solutions Access Control & Identity Management Residential Estate (Industry)
With a modern and innovative design, iDFace is the ideal device for monitoring and controlling people entering and exiting a building using facial recognition technology, including liveness detection, for enhanced security.

Read more...
Long-distance vehicle identification
STid Security Products & Solutions Access Control & Identity Management Residential Estate (Industry)
The STid SPECTRE reader can identify vehicles up to 14 metres away, across four traffic lanes, ensuring secure access to an estate without disrupting the traffic flow.

Read more...