Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • Networking

    The Forensic Felons: The Next Generation of Cyber Thieves

    Written by

    Evan Schuman
    Published April 13, 2007
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      For years, retailers have been told that if they merely abide by common sense security procedures—dont permit obvious passwords, check audit logs regularly and patch software immediately—theyd be in good security shape.

      Although there is no doubt that is still sound counsel, security consultants are describing a new breed of professional cyber thieves out there, crooks who know as much about sophisticated forensic investigations as the good guys do.

      An oversimplification would be to compare the old thieves to burglars who make serious attempts to be very quiet when breaking into a house and to leave as little evidence as possible. The new thieves care less about quiet entrances because they intend to meticulously clean the crime scene before they leave. Theyre not just covering their tracks—theyre erasing them.

      The reason for this change is that its a response to how the industry, especially banks, have responded to the first wave of attacks. The reason were hearing about such huge numbers of cards impacted by these attacks—the TJX breach reportedly accessed the records of 46 million consumers—is that the thieves know how few of them will be active by the time they try to use them.

      In other words, because the banks are getting so good at shutting down impacted accounts quickly, the thieves must grab tens of millions of account per attack in order to have a reasonable number of active accounts to use.

      /zimages/4/28571.gifRead more here about the massive TJX data breach.

      Javelin Strategy & Research, for example, estimates that in any large-scale attack, 99.2 percent of the numbers accessed will not be usable to the thieves.

      “Were seeing only 0.8 percent of data breaches resulting in fraud,” said Javelin analyst Mary Monahan. “Banks are closing these accounts rapidly. Theyre getting a lot better at reacting rapidly.”

      Bryan Sartin, a vice president of investigative response for Cybertrust, said the new breed of cyber thief will delete their tracks and often purposely soil the crime scene, by perhaps using their own encryption to make transaction logs unreadable.

      One data thief Sartin was tracking would, upon entry into a system, immediately set the system clock back one year and then bring it forward two months. At the end of the session, the clock would be returned to the correct time.

      This made it less likely his efforts would be discovered because no one would have likely gone back to examine two-month old entries. “It would throw us off the trail. Any file access modification would not leave a distinctive track,” he said.

      They tracked his movements by leaving two tracking packages in the system, figuring that once he found one, he might not look so hard to find a second.

      In another case, a retailer suffered a wireless breach in Florida. They had an inventory management system on the same network as their POS and the breach grabbed almost three years worth of data. What turned out to be that stores weak link? The culprit had learned the retailers wireless SSID (service set identifier). How? Someone on the IT staff had written the SSID right on the antennae in a public area of the store, for all consumers to see.

      “Our investigator just typed their SSID into Google and it was like the second hit,” Sartin said. Information about it had been posted.

      They watched the speed of file downloads and concluded the thief was within about 60-70 feet of the store and was not likely sitting in a car given the long durations—often six to eight hours—of access, Sartin said. They zeroed in on a Kinkos next door, where the customer had bypassed Kinkos wireless network and was using the nearby retailers instead.

      One key problem he found: “Most of their servers had open and unfettered Interenet access. They should have a reason for that server to FTP data to Russia at 2 oclock every morning. Its far too easy to get data out of these companies.”

      Retail Center Editor Evan Schuman can be reached at Evan_Schuman@ziffdavis.com.

      /zimages/4/28571.gifCheck out eWEEK.coms for the latest news, views and analysis on technologys impact on retail.

      Evan Schuman
      Evan Schuman
      Evan Schuman is the editor of CIOInsight.com's Retail industry center. He has covered retail technology issues since 1988 for Ziff-Davis, CMP Media, IDG, Penton, Lebhar-Friedman, VNU, BusinessWeek, Business 2.0 and United Press International, among others.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×