Preventing many data breaches at retail via basic controls seems so easy, it’s almost embarrassing.
Verizon’s 2014 Data Breach Investigations Report noted that 94 percent of all security incidents in 2013 can be traced to nine basic attack patterns that vary from one industry to another. Often a simple control such as some form of password protection can deter many security incidents. So, too, is having a limit on the number of access attempts before a site becomes locked out.
Verizon’s security team has compiled 10 years of data-breach analytics. This is the seventh year that the team has published its data findings.
According to Suzanne Widup, managing principal and senior analyst on Verizon’s Security Services team, the latest survey includes data from 50 data-sharing partners. That’s up from the 18 who contributed in 2013 and just five in 2012. As for other metrics, the most recent report analyzes 1,367 confirmed data breaches and 63,437 reported security incidents. Over the 10-year period, there have been more than 3,800 confirmed breaches across all types of industries.
In retail, the most common attack patterns are point-of-sale intrusions, Web application attacks and payment card skimmers, Widup said.
The Verizon study noted that there were 467 security incidents last year in the retail industry, with 148 of those incidents resulting in confirmed data loss.
In general, last year POS intrusions accounted for just 14 percent of incidents, compared with Web application attacks at 35 percent. That’s compared with POS intrusions at 31 percent during the years 2011 to 2013 and Web application attacks at 21 percent. Card-skimmer breaches were down to 9 percent last year versus the 14 percent level between 2011 and 2013. That makes Web application attacks the new “hot spot” for the retail industry. Other threat patterns less common in retail include crimeware, the forms of malware aimed at gaining control of systems; insider-privilege misuse, such as access to passwords; cyberespionage; physical theft-loss; denial-of-service attacks that compromise a network, and miscellaneous errors, such as sending an e-mail to the wrong person.
Widup noted that deterring breaches include use of passwords that are hard to guess, double password access, limits on the number of attempts at access to a password-protected site, remote access restriction and having a plan in place in the event of an attack as well as the testing of that response plan. Using antivirus software to guard against malware also helps.
“A lot of times, criminals go after the easy stuff, where basic controls just aren’t in place,” Widup said.
Nowhere is that more evident than in POS retail breaches — including brick-and-mortar, accommodation and food services — where card-present purchases are made.
In many instances, perpetrators have easy access due to no password protection, or use of weak or default passwords. In some cases where franchisees of the same vendor were breached, stolen vendor credentials impacted all groups managed by the same vendor system since they all used the same password. In other instances, the POS intrusion was on a nondedicated machine that was open to the entire Internet, including social-media sites and corporate e-mail accounts.
While last year’s retail data breaches include attacks on the systems at Neiman Marcus Group and Target Corp. — where at least 40 million to as many as 70 million consumers who shopped at the discounter between Black Friday and Dec. 15 had their personal data stolen — the number of POS intrusions has been trending down, Widup said.
“We’ve been seeing fewer incidents. Some of the incidents that happened include a high number of cards being compromised, but the actual number is trending down,” said Widup, who explained that there actually have been fewer attacks involving small businesses or franchises.
In 2013, there were nearly 200 incidents involving POS intrusions, with RAM-scraping malware used 85 percent of the time as the primary tool to capture data. According to the Verizon report, RAM scrapers allow payment card information to be grabbed while being processed in memory, where it is unencrypted, versus being stored on a disk, or processed in transit across a network where encryption is presumed to be in place.
In the case of Web application attacks, the primary aim when the retail industry is targeted is payment-card information. These attacks occur when someone is accessing the site and its data without proper credentials. While validating inputs is one way to deter hacks, enforcing lockout policies and monitoring outbound connections also can help. The survey noted that if a server has no reason to send data to a particular geographic location, such as Eastern Europe, then the business should lock down the Web server’s ability to do so.
While payment-card skimmers still rely on physically implanted devices to read magnetic strips on cards, the criminals no longer have to retrieve the physical devices to collect the data. That’s now being retrieved via Bluetooth and other cellular means. Moreover, skimming devices with built-in SIM cards that allow for remote configuration, as well as remote uploading of data, can be bought online, the survey noted.
Widup said businesses can decrease the chances of success by criminals via the purchase of tamper-resistant terminals, using tamper-evident controls such as an alert sent out when there is tampering or the visual monitoring of the devices, and monitoring by businesses for signs of tampering.
Exclusive: @britneyspears is continuing to expand her brand. The pop icon, who appears in @kenzo ’s latest campaign, is partnering with Epic Rights to launch a line of branded merchandise. Read @hernameislex ‘s story, link in bio. #wwdnews #britneyspears
The Duchess of Cambridge channeled Princess Diana’s look upon giving birth to Prince Harry, when she and the Duke of Cambridge departed the hospital with the new baby Prince this afternoon in London. #wwdeye #princeofcambridge
The new Prince of Cambridge has arrived! The Duke and Duchess of Cambridge posed with the 8-pound newborn. She wore a look from one of her go-to designers, @jennypackham. Tap link in bio for more. #wwdeye #princeofcambridge
Jewelry label @alisonlou has made a name for itself with fine jewelry that speaks to the Millennial market. Now @twallz21 reports that the label is bringing those playful ideas to a new affordable line of lucite hoops with the launch of Loucite by Alison Lou. Here’s a look from the line modeled by @emrata. #wwdaccessories
@sarahjessicaparker and @gilt are teaming up on a bridal ready-to-wear line. Tomorrow, Parker will launch SJP by Sarah Jessica Parker Bridal — and as part of the launch, Gilt will offer 15 exclusive styles from the SJP by Sarah Jessica Parker footwear collection that were designed to complement the new line. Made out of 10 styles, the line is designed for a variety of occasions, from bridal showers to receptions. Get more details on WWD.com #wwdfashion
A grooming moment between @tanfrance and @antoni last night at the The LGBT Community Center Trailblazer Awards honoring Anna Wintour, Ricky Martin and more. See more photos at WWD.com #wwdeye (📷: @lexieblacklock)
“It was a very surreal feeling. It wasn’t like we were in the studio together coming up with it — it’s more like he discovered it and loved it. I didn’t let myself get my hopes up, but then it happened it was very exciting,” said singer-songwriter @nombe on discovering that @pharrell would be using his song, “Cant Catch Me” on his HBO documentary series “Outpost.” The German-born singer — named Noah MacBeth — talked to WWD about feminism, using art as a platform for political expression and personal style. Read more on WWD.com #wwdeye (📷: @jilliansollazzo)
This season, denim is going west – in influence. Brands like @fathersdaughterla (pictured here), @tommyhilfiger Jeans, @levis and more are opting for raw, top-stitching styles. (Styled by @thealexbadia; 📷: @ryanplett)