Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

1/17/2018
10:30 AM
Justin Fier
Justin Fier
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
0%
100%

How AI Would Have Caught the Forever 21 Breach

Companies must realize that the days of the desktop/server model are over and focus on "nontraditional" devices.

After discovering that multiple point-of-sale (POS) devices were breached nationwide, retailer Forever 21 joined the list of big-name corporations that suffered a cyberattack in 2017. And because the investigation is still ongoing, it is likely that we won't know the full impact of the incident — including how many people are affected — for months.

However, as the initial details of the breach emerge, the headlines tell a familiar story. Many of the breaches of the past few years share a common theme: abnormal activity had occurred on the network, missed by the organization and having bypassed all of its security tools. How can we proactively identify and tackle these threats as we move into 2018?

As a first step, we must recognize that the days of the desktop/server model are over. In the case of Forever 21, the POS devices served as ground zero — not a laptop, a server, or even a corporate printer. In the age of the Internet of Things, we increasingly rely on "nontraditional" devices to optimize efficiency and boost productivity. But what constitutes a nontraditional device, and how do we look for it? Is it a device without a monitor? A device without a keyboard?

Today a nontraditional device could be anything from heating and cooling systems to Internet-connected coffee machines to a rogue Raspberry Pi hidden underneath the floorboards. Protecting registered corporate devices is not enough — criminals will look for the weakest link. As our businesses grow in digital complexity, we have to monitor the entire infrastructure, including the physical network, virtual and cloud environments, and nontraditional IT, to ensure we can spot irregularities as they emerge.

A subtle irregularity in device behavior is almost always the first sign of an emerging cyber attack — but these early indicators are consistently missed by tools that are rigidly programmed to spot known vulnerabilities and malicious behaviors.

With Forever 21, the encryption technology on the POS devices had failed, but only on some devices. Artificial intelligence (AI) would spot this type of anomaly, even if it had never seen it before, because it learns what normal behavior is over time, using this understanding to recognize suspicious shifts in activity when they arise. In contrast, tools that scan known devices, looking for known viruses or published indicators of compromise, would have missed it.

No matter how large our team is, as security professionals we all face the challenge of finding the evasive needle in an ever-expanding haystack. AI's promise is to make subtle connections and correlations behind the scenes, and constantly build up an understanding of our digital environments over time — with this knowledge getting better and better.

Furthermore, an AI system today can be up and running in minutes, meaning that it can very quickly deliver results. This doesn't just mean catching new anomalous activity but also understanding if a threatening presence is already in operation in your network. How is a cluster of POS devices behaving in comparison with what the AI has learned to be normal for similar devices?

Shifting our teams away from alert-chasing and perimeter protection and toward a workflow focusing on the anomalies found by AI might help us bring a gun to the knife fight. Had Forever 21 been equipped with such technology, it would have had a very good chance of both identifying and remediating the situation before any of its data was compromised.

Indeed, the gap between the breach happening and its disclosure points to a woeful inadequacy in our ability to see and detect emerging problems. Transferring the analytic burden to machines will give human security teams the time to improve their skills and add new ones — focusing on investigating and remediating genuine threats, while also having time to dedicate to strategic initiatives. As things stand, security teams are often caught in a vicious circle: high level-changes need to be made to prevent low-level problems, but teams are so busy fighting fires that they don't have the time to make the changes necessary to break this cycle. AI would give both large and small security teams the ability to break out of this cycle.

Protecting against the threats we know of in advance is no longer sufficient. AI offers the best chance to catch breaches like the one that affected Forever 21, because it looks at all activity, irrespective of whether it pertains to a cash register or a data server, and isn't biased to find threats that it knows already. AI is forever learning — something Forever 21 should bear in mind as it revises its security strategy. 

Related Content:

Justin Fier is the Director for Cyber Intelligence & Analytics at Darktrace, based in Washington, DC. With over 10 years of experience in cyber defense, Fier has supported various elements in the US intelligence community, holding mission-critical security roles with Lockheed ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7227
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
CVE-2019-15625
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
CVE-2019-19696
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
CVE-2019-19697
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
CVE-2019-20357
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.