Attacks/Breaches

6/23/2014
11:15 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
100%
0%

P.F. Chang's Breach Went Undetected For Months

Early reports indicate that the compromise involved a large number of restaurant locations and dates as far back as September 2013.

On June 13, restaurateur P.F. Chang’s notified customers via email of a security breach, stating credit and debit card data had been stolen and the company only recently became aware of the breach -- on June 10, 2014. According to a dedicated website for communicating with the public, P.F. Chang’s officials said they learned of the breach from the US Secret Service and are currently working with PCI Forensics Investigators (PFI) to determine its scope.

Although it will take time for investigators to complete the investigation, Brian Krebs reports having a copy of a seemingly related alert sent by the card brands to banks indicating the compromise goes back at least as far as September 18, 2013. These alerts are sent by card brands as they receive fraud reports and look through transaction history to identify a common point of purchase (CPP) from which the cards were likely to have been stolen.

Additionally, Krebs notes that all P.F. Chang’s locations began using old-fashioned “knuckle busters” where a physical imprint of the card is made instead of relying on electronic payment processing. In my experience handling merchant breaches, switching to knuckle busters or standalone terminals where they’re not connected to the point of sale (POS) network is standard practice to continue credit card acceptance without disturbing the POS environment.

Between the information provided by P.F. Chang’s and the information received by Krebs, it’s likely that most, if not all, locations are affected. P.F. Chang’s is privately owned, which means it has control over the IT infrastructure at all locations. That makes this breach very similar to those at Neiman Marcus and Target in terms of potential scope. In all likelihood, a large percentage of its locations were indeed affected.

Who’s to blame?
First and foremost, let me make it clear that the criminals are to blame. P.F. Chang’s is a victim. Based on experience dealing with card data breaches of this magnitude, it’s likely that P.F. Chang’s or a third-party IT services provider overlooked one or more security controls when hardening its network. There could even be a shared responsibility between P.F. Chang’s and an IT services provider, depending on the dynamic of that relationship.

As the intrusion was in progress, it’s also possible that alerts went unnoticed or dismissed as understaffed and underequipped security teams were forced to pick and choose which alerts warranted action. Only in hindsight during the investigation will those alerts stand out. Finally, it could come to light that a seemingly unrelated third party was involved, as was the case in the Target breach where its HVAC service provider was compromised and used to gain initial access.

When seeking to point fingers, keep in mind that complex systems fail usually as a result of multiple points of failure. It’s a fool’s errand to seek out a single cause. Even if an initial entry point were better secured or alerts were investigated, determined and skilled attackers are smart enough to dodge and weave their way to their ultimate goal.

How did this breach unfold?
The public will never know. At best, one or two points of failure will be selectively disclosed as scapegoats. Speaking from first-hand experience, I can provide general information on the attack lifecycle true of most incidents.

The attackers first find an initial point of entry into the victim network such as SQL injection against a web server, remote access using stolen employee credentials, or backdoor access through common droppers or backdoors that made their way to employee systems. Those backdoors could have been deliberately planted by the attackers, or they could be from different opportunistic attackers that sell access on the black market. From that starting point, attackers focus on privilege escalation to get administrative access, lateral movement using built-in system commands to map out the environment, and additional backdoors to ensure access in the event they get busted. Then they locate pivot points into the card data environment (CDE).

Once in the CDE, attackers harvest card data for a long time using specially crafted malware that snags it from memory, LAN traffic, or through keystroke recording. Sometimes they can simply compromise encryption keys and query POS databases. The final step is periodically transmitting the stolen data out undetected. Common methods involve creating an encrypted archive, which bypasses systems designed to identify card data, then sending it out in small chunks to avoid systems monitoring for spikes in network traffic.

What are the lessons learned?
My advice to consumers and businesses continues to be the same. Consumers should monitor financial accounts for unauthorized transactions so they can report them quickly and avoid being held liable. They should prefer credit over other payment options because of laws protecting them from losses. My advice to businesses concerned with security incidents of any kind is to engage security staff in a discussion focused on risk. That will provide the data points needed to make an informed decision on budgeting and prioritization.

With budget and authority in hand, security teams should seek out ways to more effectively manage existing security investments and reduce the noise. Common approaches are fine-tuning current products and automating as much as possible. Next, they should look to improve rapid detection and response capabilities to stay on top of things and ensure that attacks are identified and thwarted before damage is done.

Lucas Zaichkowsky is the Enterprise Defense Architect at AccessData, responsible for providing expert guidance on the topic of cyber security. Prior to joining AccessData, Lucas was a technical engineer at Mandiant where he worked with Fortune 500 organizations, the Defense ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
lucabranzi
50%
50%
lucabranzi,
User Rank: Apprentice
7/23/2014 | 1:55:39 PM
Interesting
Interesting, companies should do a penetration test like www.stockpairitalia.com
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
6/23/2014 | 7:02:30 PM
Re: Apprecaited
To me the issue of the security team is what I would like to know more about.  I have been hearing that PF Changs may not have had adequate security controls or personnel in place in the first place.  I would like more concrete infromation on the security posture of PF Changs pre-breach.
ShahA411
50%
50%
ShahA411,
User Rank: Apprentice
6/23/2014 | 1:18:16 PM
Apprecaited
The security team should take the resposibilities to make the situation calm and quit. It is tru that public do not have adequate concern regarding the issue what happened there. This essay service reviews help to understand more about this
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
6/23/2014 | 12:42:53 PM
Hindsight is always 20/20
True, the  public may never know all the details about how this breach unfolded. But it sure will be instructive for securiy teams to learn about P.D. Chang's  errors and failed strategies so they can apply them to their own detection and response capabilities in the future. 
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Are you sure this is how we get our data into the cloud?
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17437
PUBLISHED: 2018-09-24
Memory leak in the H5O_dtype_decode_helper() function in H5Odtype.c in the HDF HDF5 through 1.10.3 library allows attackers to cause a denial of service (memory consumption) via a crafted HDF5 file.
CVE-2018-17438
PUBLISHED: 2018-09-24
A SIGFPE signal is raised in the function H5D__select_io() of H5Dselect.c in the HDF HDF5 through 1.10.3 library during an attempted parse of a crafted HDF file, because of incorrect protection against division by zero. It could allow a remote denial of service attack.
CVE-2018-17439
PUBLISHED: 2018-09-24
An issue was discovered in the HDF HDF5 1.10.3 library. There is a stack-based buffer overflow in the function H5S_extent_get_dims() in H5S.c. Specifically, this issue occurs while converting an HDF5 file to a GIF file.
CVE-2018-17432
PUBLISHED: 2018-09-24
A NULL pointer dereference in H5O_sdspace_encode() in H5Osdspace.c in the HDF HDF5 through 1.10.3 library allows attackers to cause a denial of service via a crafted HDF5 file.
CVE-2018-17433
PUBLISHED: 2018-09-24
A heap-based buffer overflow in ReadGifImageDesc() in gifread.c in the HDF HDF5 through 1.10.3 library allows attackers to cause a denial of service via a crafted HDF5 file. This issue was triggered while converting a GIF file to an HDF file.