Sony hack highlights importance of breach analysis
Determining the scope of a breach can be a huge challenge for enterprises without the right tools and data
Computerworld - Sony's apparent difficulty in figuring out the extent of the damage from the recent intrusion into its PlayStation Network, while frustrating for those affected by it, is not too surprising, given the bag of tricks that hackers employ to hide their tracks.
All too often, companies simply don't have the forensic tools or enough log data to be able to reliably piece together what might have happened and to determine the true scope of a breach. Sometimes it can take weeks or months to get an accurate picture, and even longer for a breached entity to entirely clean out its networks.
Sony itself has offered no reason why it waited more than six days to inform consumers that their account information, including name, address, birth date, purchase history, online ID and possibly credit card data, had been compromised.
And it has said nothing about why it's taking so long to restore the network. In all, a staggering 77 million consumer records, including those of many minors, were potentially exposed, making it one of the largest data breaches ever.
It's possible that Sony's initial silence was prompted by PR worries, a law enforcement request or both. It's also possible that the company did not have the data it needed to quickly determine the true scope the problem, IT managers and security analysts said.
That's because often the security tools that companies deploy are oriented toward discouraging and preventing data breaches, said Matt Kesner, CTO at the law firm Fenwick & West. "Most haven't focused on instruments that would create a great record if you were hacked or breached," he said.
While companies probably look at log data from their firewalls and other security devices, "it's very difficult to build a trail" without more data, he said.
"A lot of organizations keep and monitor logs from security devices [such as] firewall, antivirus, intrusion detection," said Johannes Ullrich, CTO at the SANS Internet Storm Center. "But they fail to create and collect application logs, in particular from custom applications, with the same rigor."
Custom applications, especially Web applications, are a huge target for malicious attackers, Ullrich said. Yet because companies don't often collect and maintain these logs, "a lot of intrusions are not detected and the damage can not be quantified." he said.
Another problem, especially in large companies, is that old log data often gets overwritten with fresh logs by the time an intrusion is detected, said Alex Cox, principal research analyst at NetWitness, a security vendor that was recently acquired by EMC.
Though it is relatively inexpensive for companies to store multiple years' worth of raw log data if they want to, many don't. As a result, log data that might have revealed critical data related to a break-in might get overwritten by fresh data over a period of time.
"If you are lucky, you can get to a point where you find some piece of information you need to put the puzzle together, and sometimes you don't find it," Cox said.
In addition to log data, companies also need to have the right host- and network-based forensic tools to be able quickly sift through and correlate event data to figure out what might have happened.
- Goodwill Industries probes possible payment card breach
- Aloha point-of-sale terminal, sold on eBay, yields security surprises
- The biggest data breaches of 2014 (so far)
- Blue Shield discloses 18,000 doctors' Social Security numbers
- PF Chang's says breach was 'highly sophisticated criminal operation'
- Breaches exposed 1 in 7 US debit cards in 2013
- New malware program targets banking data
- How to protect yourself against privileged user abuse
- Montana data breach exposes 1.3 million personal records
- Hacker puts 'full redundancy' code-hosting firm out of business
- 3 Big Data Security Analytics Techniques You Can Apply Now to Catch Advanced Persistent Threats This technical white paper demonstrates how to use Big Data security analytics techniques to detect advanced persistent threat (APT) cyber attacks, and it...
- IT Security by the Numbers: Calculating the Total Cost of Protection Humorist Franklin P. Jones may have said it best: "When you get something for nothing, you just haven't been billed for it yet."...
- SBIC: Transforming Information Security This report combines perspectives on technologies with experience in strategy to help security teams navigate complex decisions regarding technology deployments while maximizing investments.
- HP ArcSight ESM Solution Helps Finansbank to Combat Fraud and Increase Customer Satisfaction In this report, learn how one organization was able to use HP ArcSight ESM to reduce false positives by 90% and the time...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- It's not too late...Get Your Mobile Questions Answered Live! How can IT provide seamless and secure mobile communications and collaboration for all? Join this live Webcast as IDG asks an expert panel... All Data Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!