Finance - Tagged - Security Boulevard The Home of the Security Bloggers Network Fri, 21 Jul 2023 15:46:14 +0000 en-US hourly 1 https://wordpress.org/?v=6.2.2 https://securityboulevard.com/wp-content/uploads/2021/10/android-chrome-256x256-1-32x32.png Finance - Tagged - Security Boulevard 32 32 133346385 Software Supply Chain Attackers Targeting Banks, Checkmarx Says https://securityboulevard.com/2023/07/software-supply-chain-attackers-targeting-banks-checkmarx-says/ Fri, 21 Jul 2023 15:46:14 +0000 https://securityboulevard.com/?p=1982335 supply chain SMB Cowbell Cyber cyberattack colonial ransomware insurance attacks access

Two banks earlier this year were the targets of open source supply chain attacks, the first of their kind in the industry.

The post Software Supply Chain Attackers Targeting Banks, Checkmarx Says appeared first on Security Boulevard.

]]>
1982335
Elevate Cybersecurity Resilience With PCI-DSS 4.0 https://securityboulevard.com/2023/03/elevate-cybersecurity-resilience-with-pci-dss-4-0/ Wed, 22 Mar 2023 13:00:07 +0000 https://securityboulevard.com/?p=1969164 PCI-DSS PayPal Visa AI digital payments Security the Price of Convenience in Supply Chain Payments

Earlier this year, the PCI Security Standards Council revealed version 4.0 of their payment card industry data security standard (PCI-DSS). While organizations won’t need to be fully compliant with 4.0 until March 2025, this update is their most transformative to date and will require most businesses to assess (and likely upgrade) complex security processes and..

The post Elevate Cybersecurity Resilience With PCI-DSS 4.0 appeared first on Security Boulevard.

]]>
1969164
Phishing for Financial Fears https://securityboulevard.com/2023/03/phishing-for-financial-fears/ Wed, 15 Mar 2023 22:04:27 +0000 https://www.guidepointsecurity.com/?p=19710
Over the last 4 days (as of the writing of this blog) the federal government has seized the assets of […]

The post Phishing for Financial Fears appeared first on Security Boulevard.

]]>
1968604
Global Bank Uplifts Insider Risk Maturity Through Contextual Visibility at Scale https://securityboulevard.com/2023/03/global-bank-uplifts-insider-risk-maturity-through-contextual-visibility-at-scale/ Thu, 02 Mar 2023 00:24:35 +0000 https://www.dtexsystems.com/?p=9083 The financial services sector is prone to insider abuse and data misuse, including fraud. For global banks and other financial institutions, the cost of a security incident can quickly add up to the millions or even billions of dollars, particularly if the regulators are involved. Security leaders are cognizant that cyber breaches are increasingly attributed … Continued

The post Global Bank Uplifts Insider Risk Maturity Through Contextual Visibility at Scale appeared first on DTEX Systems Inc.

The post Global Bank Uplifts Insider Risk Maturity Through Contextual Visibility at Scale appeared first on Security Boulevard.

]]>
1966422
The Optus Breach: How Bad Code Keeps Happening to Good Companies https://securityboulevard.com/2022/09/the-optus-breach-how-bad-code-keeps-happening-to-good-companies/ Mon, 26 Sep 2022 13:32:29 +0000 https://medium.com/p/189bb11bcf42

First, let me be clear that I have no insider knowledge. This is my best guess at what occurred, based on publicly available information here and others indicated in references section below.

On Thursday this week, Australia’s second-largest telecom company, Optus, announced it had suffered a major data breach that had compromised sensitive customer information.

Jeremy Kirk of The Ransomware Files has been progressively uncovering details associated to this incident.

Jeremy Kirk on Twitter: "Someone is claiming to have the stolen Optus account data for 11.2 million users. They want $1 million in the Monero cryptocurrency from Optus to not sell the data to other people. Otherwise, they say they will sell it in parcels. #optus #auspol #infosec #OptusHack pic.twitter.com/1eCINue2oZ / Twitter"

Someone is claiming to have the stolen Optus account data for 11.2 million users. They want $1 million in the Monero cryptocurrency from Optus to not sell the data to other people. Otherwise, they say they will sell it in parcels. #optus #auspol #infosec #OptusHack pic.twitter.com/1eCINue2oZ

As details are still emerging, let’s examine the attacker’s tactics, techniques and procedures.

This attack bears close resemblance to Citibank, Molina Health and Signet/Jared Jewelers documented in detail below

Case Files: Attack like its 1999 (Citibank) in 2012 (Signet/Jared jewelers, Molina Health)

What happened?

  1. Information suggests that the data was exfiltrated through an unauthenticated REST API endpoint at http://api.www.optus.com.au (which has since been shut down)
  2. Essentially anyone in public domain is allowed to send a request asking the server “fetch contact details for Optus customer with contactid=XXXXXXXXX”.
  3. Even worse than that, the parameter in question sounds like it was a directly referenced contactid (with predictable sequence) and that it was included in the URL of the request rather than securely placed within the body in a POST request.
  4. As a consequence, the attacker was able to enumerate and exfiltrate 11.2 million Optus customers and their personal information which the server duly returned.

What data was exposed?

  1. 11.2 million Optus customers have been impacted by this incident
  2. As indicated here, the information which has been exposed is their customer’s name, date of birth, email, and the number of the ID document you provided such as drivers license or passport number. No copies of photo IDs have been affected.

Why did this happen?

  1. Lack of authorization checks for every user request. Web portals have several channels of communication like the browser, mobile apps, API services, embedded links in an email that trackback to the portal. Are all these paths following uniform authenticated and authorized controls?
  2. Even if authorized, are referential integrity checks performed to ensure that the authorized user is checking his/her data within their tenancy control? Let alone the hacker, it seems like there wasn’t any AAA checks to ensure that customers across tenancy domains in a SaaS environment could access or have visibility across all tenants
  3. Using direct object references (predictable sequences) : Contact Numbers are retrieved from databases and they obviously have a primary key id that uniquely identifies each of them. Rather than directly passing the contact number into the response object, one can create a transient and random contact-id and cache map to the real contact-id in the scope of an active request. This fundamentally breaks the predictable sequence which further on could have prevented repeated enumeration by attacker.
  4. Sending sensitive information in the URL of a request: When in doubt, send parameters within the body of a POST request. This won’t protect you from this type of attack but it makes the flaw slightly less obvious.
  5. Lack of API gateway controls, tenancy validation, rate-limiting and request throttling configuration for every API endpoint that directly/in-directly touches sensitive information. If this request was initiated 11.2 million times, there weren’t any controls in place to raise alerts indicating anomalous behavior.

Ironically, this is one of those types of flaws that’s all but impossible for an automated web application vulnerability scanner to find but incredibly easy for even a savvy 10-year-old to discover.

How can such flaws be identified and thereafter avoided?

Is there a human-assisted expert system available to check your specific application belonging to a specific business domain for design flaws that can be exploited?

Yes, such a system does exist. ShiftLeft’s CORE is a platform built over the foundational Code Property Graph that is uniquely positioned to deliver a specification model to query for vulnerable conditions, business logic flaws and insider attacks that might exist in your application’s codebase.

To request a free trial and demo, please signup at https://www.shiftleft.io/request-demo/


The Optus Breach: How Bad Code Keeps Happening to Good Companies was originally published in ShiftLeft Blog on Medium, where people are continuing the conversation by highlighting and responding to this story.

The post The Optus Breach: How Bad Code Keeps Happening to Good Companies appeared first on Security Boulevard.

]]>
1939476
5 tips for spotting and avoiding Pig butchering scams https://securityboulevard.com/2022/08/5-tips-for-spotting-and-avoiding-pig-butchering-scams/ Mon, 15 Aug 2022 03:00:00 +0000 https://www.tripwire.com/state-of-security/?p=62393 A new type of scam, called “pig butchering” is gaining momentum. Pig butchering is a unique scam which uses a romance scam script, but with an investment spin on it, where victims are groomed to invest large sums of money, often on fake crypto apps. Behind the scenes of these scams are scam centers run […]… Read More

The post 5 tips for spotting and avoiding Pig butchering scams appeared first on The State of Security.

The post 5 tips for spotting and avoiding Pig butchering scams appeared first on Security Boulevard.

]]>
1934469
Cybersecurity for Startups with Josh Feinblum from Stavvy https://securityboulevard.com/2022/05/cybersecurity-for-startups-with-josh-feinblum-from-stavvy/ Mon, 09 May 2022 04:00:24 +0000 https://sharedsecurity.net/?p=101048 Josh Feinblum is the co-founder of Stavvy, a Boston-based fully integrated digital mortgage platform, where he leads product, engineering, people, and finance. He also serves as a venture partner at F-Prime Capital, where he evaluates and advises startups of all stages across multiple verticals. Josh talks to us about his journey through cybersecurity including his […]

The post Cybersecurity for Startups with Josh Feinblum from Stavvy appeared first on The Shared Security Show.

The post Cybersecurity for Startups with Josh Feinblum from Stavvy appeared first on Security Boulevard.

]]>
1923324
What Does it Mean to Be Zero-Day? https://securityboulevard.com/2022/03/what-does-it-mean-to-be-zero-day/ Tue, 29 Mar 2022 14:00:34 +0000 https://securityboulevard.com/?p=1916777 zero-day zero-trust app hardware zero-trust prepare

A zero-day vulnerability is an as-yet-unknown computer software vulnerability, that attacks in stealth mode before security teams are aware of its presence.  Zero-day is an amorphous concept; it refers to the period of time between the introduction of the software defect and the availability of a fix. This creates a unique security posture situation rife..

The post What Does it Mean to Be Zero-Day? appeared first on Security Boulevard.

]]>
1916777
Get and Keep Money: Startup Tips https://securityboulevard.com/2021/10/get-and-keep-money-startup-tips/ Thu, 07 Oct 2021 13:56:00 +0000 http://simonedwards.com/?p=79 How to raise funds for your new business. And keep as much of it as possible. These business startup tips are based on my personal experience. I’ve tried to make them as generic as possible without falling into the same…

Read More

The post Get and Keep Money: Startup Tips appeared first on HACK by Simon PG Edwards.

The post Get and Keep Money: Startup Tips appeared first on Security Boulevard.

]]>
1925755
Instant Justice: WeLeakInfo Hacked with a Ex-domain Reuse Attack https://securityboulevard.com/2021/04/instant-justice-weleakinfo-hacked-with-a-ex-domain-reuse-attack/ Wed, 07 Apr 2021 09:37:27 +0000 https://www.reflectiz.com/?p=4499 Expired domains (ex-domains) have always been easy targets for hackers and cybercriminal groups. The bad news is that this trend is not going away anytime soon. In a bizarre turn of events, WeLeakInfo, the FBI-seized illegal information vendor, has been […]

The post Instant Justice: WeLeakInfo Hacked with a Ex-domain Reuse Attack appeared first on Reflectiz.

The post Instant Justice: WeLeakInfo Hacked with a Ex-domain Reuse Attack appeared first on Security Boulevard.

]]>
1877893