Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

1/9/2015
10:35 AM
Kevin Watson
Kevin Watson
Commentary
Connect Directly
Facebook
Twitter
LinkedIn
RSS
E-Mail vvv
100%
0%

Chick-fil-A Breach: Avoiding 5 Common Security Mistakes

On the surface these suggestions may seem simplistic. But almost every major retail breach in the last 12 months failed to incorporate at least one of them.

The latest in a record year of retail industry attacks, Georgia-based fast food company Chick-fil-A confirmed recently that it is investigating a potential credit card breach. The investigation is focused on the company’s point-of-sale (POS) network at some of its restaurants, and the breach is thought to have occurred between December 2013 and September 2014. Brian Krebs, an Internet blogger who specializes in banking security, reported that one financial institution claims that the common thread among approximately 9,000 of its affected customers are purchases at Chick-fil-A restaurants.

As you all know, security breaches of this nature can be caused by a variety of issues: newly discovered software flaws, lax security from a service provider, insider fraud, weak network security, and countless other avenues. There is also the possibility that the data that has been compromised did not originate from Chick-fil-A at all. Theft can occur at numerous places along the payment chain. For example, it may be necessary to examine the bank where the electronic transactions were processed.

In one sense, it does not matter how the breach occurred. The fact that credit cards at a major corporation have once again been stolen highlights the threat that all quick-serve restaurants and retailers of every size are facing from data thieves. Businesses interested in keeping their networks and data secure should start with simple security measures that can effectively mitigate the growing problem that hackers represent. While nothing is fool proof, the following suggestions could have prevented most (if not all) of the breaches that have garnered so much attention in the past 12 months:

Suggestion 1: Protect a location’s incoming Internet traffic. The first step in stealing data is finding an avenue into the targeted business. All of a business’s data circuits and its Internet connections must be protected by a robust and adaptable firewall, protecting the business from unwanted incoming traffic.

Suggestion 2: Implement secure remote access. When permitting remote access to a network for the management of POS and other systems, it is essential that this access is restricted and secure. At a minimum, access should only be granted to individual (not shared) user accounts using 2-factor authentication and strong passwords. Remote access activities should also be logged so that an audit trail is available.

Suggestion 3: Keep anti-malware software up-to-date. It is critical to keep all anti-virus/anti-malware software up to date with the latest versions and definitions. The companies that make anti-malware software monitor threats constantly and regularly update their packages to include preventive measures and improvements to thwart malware seen in other attacks.

Suggestion 4: Update your point of sale as security patches are released. Much like anti-virus/anti-malware updates, POS manufacturers are constantly improving their software to prevent hackers from stealing data, especially if a criminal manages to bypass the built-in security. It is essential that the latest security releases and patches be installed on all POS systems.

Suggestion 5: Limit outbound Internet traffic. In addition to blocking unwanted traffic from getting into a location, it is always a good practice to selectively block outgoing traffic as well. Many modern breaches involve software that becomes resident on your network and then tries to send sensitive data to the hacker’s system via the Internet. No system can completely prevent unwanted malware or viruses, so a good last line of defense is making sure secure data doesn’t leave your network without your knowledge. The same firewall used in Step One should be configured to monitor outgoing traffic as well as incoming.

These suggestions might, on the surface, seem simplistic, but almost every major breach in the last 12 months failed to incorporate at least one of them. Of course, this list is not an all-inclusive way to prevent every type of credit card theft, but it is interesting to ponder how much theft could have been prevented if just these five elements had been implemented correctly. Remember that it costs nothing for data thieves to attempt to hack a business, so for them, every business is a worthwhile target.

Kevin Watson joined VendorSafe as CEO in November 2014, bringing considerable experience in data security, managed technology services and high-growth technology companies. VendorSafe specializes in providing state-of-the-art-data cloud-based firewall solutions tailored for ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
jamieinmontreal
50%
50%
jamieinmontreal,
User Rank: Strategist
3/18/2015 | 11:11:59 AM
Suggestion 2 - additional possibiility
Individual strong passwords for each POS system would certainly do something but if the organization is large enough (Chick-fil-A, McDs, Harvey's, Marshall's etc etc etc) the chances are those passwords won't be changed regularly and will also be shared among admins opening up a security threat.   Hackers have way more time and resources and people generally speaking will default to convenience even when it's in breach of security policies.

Proper privileged access management is the right solution for this piece.

Very much in agreement on the other items though - 2FA in particular should be a standard approach along with better access management on all systems!

 
vnewman2
50%
50%
vnewman2,
User Rank: Strategist
1/13/2015 | 3:03:21 AM
Re: Security Basics: Don't Take for Granted
Banks have been allowed to proceed with their class action lawsuit against Target Corporation over losses they incurred from the massive data breach at the retailer last year. As large-scale breaches become more prevalent, banks likely will push back against the expectation that they will cover both the costs of fraudulent charges as well as consumer remediation efforts.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
1/12/2015 | 10:11:56 AM
Re: Security Basics: Don't Take for Granted
It's always good to be reminded about the low-hanging fruit. If the security teams aren't paying attention, you  can e sure that the attackers are...
Technocrati
50%
50%
Technocrati,
User Rank: Ninja
1/11/2015 | 6:59:39 PM
Security Basics: Don't Take for Granted
These steps do seem rather rudimentary but as is mentioned at least one of these fundamentals were either not carried out or maintained. Security is difficult enough, so I don't understand why admins in the retail sector are not taking advantage of the easy tasks.

I guess everyone could be quilty of this - but security can no longer be viewed as a passive, boring chore.
For Cybersecurity to Be Proactive, Terrains Must Be Mapped
Craig Harber, Chief Technology Officer at Fidelis Cybersecurity,  10/8/2019
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
USB Drive Security Still Lags
Dark Reading Staff 10/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17537
PUBLISHED: 2019-10-13
Jiangnan Online Judge (aka jnoj) 0.8.0 has Directory Traversal for file deletion via the web/polygon/problem/deletefile?id=1&name=../ substring.
CVE-2019-17538
PUBLISHED: 2019-10-13
Jiangnan Online Judge (aka jnoj) 0.8.0 has Directory Traversal for file reading via the web/polygon/problem/viewfile?id=1&name=../ substring.
CVE-2019-17535
PUBLISHED: 2019-10-13
Gila CMS through 1.11.4 allows blog-list.php XSS, in both the gila-blog and gila-mag themes, via the search parameter, a related issue to CVE-2019-9647.
CVE-2019-17536
PUBLISHED: 2019-10-13
Gila CMS through 1.11.4 allows Unrestricted Upload of a File with a Dangerous Type via the moveAction function in core/controllers/fm.php. The attacker needs to use admin/media_upload and fm/move.
CVE-2019-17533
PUBLISHED: 2019-10-13
Mat_VarReadNextInfo4 in mat4.c in MATIO 1.5.17 omits a certain '\0' character, leading to a heap-based buffer over-read in strdup_vprintf when uninitialized memory is accessed.