Why Database Monitoring?

Hoping other people detect your breach before you lose millions is not a good strategy

Adrian Lane, Contributor

May 17, 2013

2 Min Read

Why should you monitor database activity? This is why! Hackers stole $45 million from ATMs -- a theft made possible by breaching several bank databases and make simple alterations that allowed thieves to siphon of cash.

Do you understand how hard it is to take $45 million from ATM machines in $2,000 increments? Do you realize that's more than 20,000 withdrawals? What's more troubling is this was the second attack. The first, committed several months before, successfully netted $5 million. Police caught up with some of the attackers on the second attack only after they had managed to steal another $40 million, but not by being nabbed at ATMs or tracked back to the source. Rather, one of the "money mules" got greedy, killed one of the ringleaders, and police stumbled on the theft ring as part of a murder investigation.

The sad thing is that the easiest point of detection should have been through the database. The entire attack is predicated on breaching the database of ATM/gift cards, finding the card numbers, and altering the withdrawal limits of those cards. For you database experts out there, you know that this takes about three or four SQL statements to do. It's also a dead simple attack to detect, and one of the types of attacks that database activity monitoring systems were designed for.

The simplest way to stop the thieves would have been to detect the alterations and then lock the card numbers or limits so they could not be used. Or they could have detected the attack and then coordinated with law enforcement to catch the thieves as they started taking out money. They would have had lots of opportunities to catch them -- about 20,000 or so.

And if you read the Verizon Data Breach Report, you noticed that 69 percent of the breaches were not detected by the company; rather, they were detected by outsiders. So what sounds easier, faster, and cheaper? Hoping someone outside of your company detects the data breach for you before $45 million is stolen, or detecting the first phase of the attack while it happens?

Sure, this is one of the more costly attacks in the past decade, but the point should be clear: Monitor databases that hold financial information!

Adrian Lane is an analyst/CTO with Securosis LLC, an independent security consulting practice. Special to Dark Reading.

About the Author(s)

Adrian Lane

Contributor

Adrian Lane is a Security Strategist and brings over 25 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and secure software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on "the other side" as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his "network hair" and propensity to wear loud colors.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights