Page 12 - GS170701
P. 12

NewsBriefs





        bus financial reform package passed in response to the 2008 financial melt-  of traffic to exploit kit landing pages,
        down and ensuing major recession. In addition to revamping the CFPB, the   Trustwave  found.  An  exploit  kit  is
        report calls for better overall coordination among financial regulatory agen-  software designed to locate system
        cies, easing restrictions on bank trading operations, scaling back banks' annual   vulnerabilities. Trustwave forensics
        stress tests, and simplifying regulation of small banks and credit unions.  discovered an alleged undisclosed
                                                                                   Windows zero-day vulnerability and
        Global cybersecurity trends a mixed bag                                    exploit code for sale in 2016 at an ini-
        New data from Trustwave Holdings Inc. forensics investigations indicates that   tial price of $95,000; a zero-day vul-
        despite efforts to increase POS data security following the U.S. EMV (Europay,   nerability is a hole in software code
        Mastercard and Visa) mandate in 2015, adoption has been slow, and payment   undetected by the vendor.
        card data remained a target in 63 percent of the data incidents perpetrated   New malware targets IoT routers
        globally in 2016. As of November 2016, only 38 percent of U.S. transactions used
        EMV technologies, Trustwave noted.                                         Security analysts are warning early
                                                                                   Internet  of  Things  (IoT)  adopters  to
        According to the 92-page  2017 Trustwave Global Security Report, the North   enhance  the  security  of  Universal
        American region and the retail sector accounted for 49 percent and 22 percent   Plug and Play (UPnP) routers and
        of total breaches, respectively. Next in line regionally were Asia-Pacific (21   hubs  in  their  connected  homes  due
        percent); Africa, Europe and Middle East (20 percent); and Latin America (10   to recently detected malware attacks.
        percent). Just behind the retail sector, the food and beverage industry was   The malware, known as Pinkslipbot,
        targeted in nearly 20 percent of data breaches committed globally.         is a variation of a known malware
                                                                                   scheme designed to attack firewalls,
        Trustwave determined that progress has been made in breach detection and   lock out system users and disrupt en-
        containment; detection time dropped from 80.5 days to 49 days year-over-year.   terprise directories, analysts stated.
        The time from detection to containment dropped from 13 days to 2.5 days.
        However, median time from cyber intrusion to containment remained stable at   Don Duncan, Sales Engineer - East-
        62 days versus 63 days in 2015. Malicious advertising remained the top source   ern at NuData Security, said the
                                                                                   malware is a derivative of QakBot, a
                                                                                   form of malicious code that has been
                                                                                   actively infecting networks for more
              Let                Be Your EMV Expert!                               than 10 years.


                       Your EMV Eco-System Made Affordable!                        "Pinkslipbot is extremely persistent,
                                                                                   and essentially, anyone with fast In-
           eProcessing Network has the secure, payment solutions to help you stay current with the   ternet and open ports on an Internet
           technologies that  keep your  merchants connected. And  with real-time EMV  capabilities,   gateway device using UPnP is vul-
           retailers can not only process contact and contactless payments, Apple Pay and Android Pay,   nerable to it," he  said.  "Pinkslipbot
           they’re able to manage their inventory as well as balance their books via QuickBooks Online.  detects available ports, infects ma-
                                                                                   chines  behind  the  firewall,  and  re-
                                                                                   lays information to C&C [Command
                                                                                   and Control] servers. In the short
                                                                                   term, it's important that  'local port-
                                                                                   forwarding rules' be monitored, and
                       is EMV-Certified                                            UPnP should be turned off if the user
                                                                                   doesn't need it."

                                                                                   Duncan urged network operators
                                                                                   to implement behavioral biometrics
                                                                                   to create additional barriers around
                                                                                   UPnP routers and hubs.
                                                                                   International cooperation leads
                                                                                   to arrest of 73 cyber-criminals

                                                                                   Fraudsters are relentless and ever
                                                                                   more sophisticated in their attacks on
                                                                                   the world's financial networks. How-
                                                                                   ever, security experts are also relent-
                   1(800) 296-4810                                                 less and ever more sophisticated in
                                                © eProcessing Network, LLC. All Rights Reserved.
              eProcessingNetwork.com          All trademarks are the property of their respective holders.  their work to protect our systems.
        12
   7   8   9   10   11   12   13   14   15   16   17