The 6 Data Breaches that Defined 2016

As the year comes to a close, we take a look back at six data breaches that dominated the headlines and defined the state of cyber security in 2016.

It could be said that 2016 was the “Year of the Hacker.” From healthcare to politics to adult entertainment, no industry was spared the wrath of cyber criminals. Here, we reflect on six of this year’s most infamous data breaches.

As the year comes to a close, we take a look back at six data breaches that dominated the headlines and defined the state of cyber security in 2016.

1. The SWIFT Network Attacks

It was a plot that sounded like it came straight out of a Bond movie: A band of international bank robbers stole nearly $100 million from a bank in Bangladesh, spooking finance executives around the world and leaving them wondering where the thieves would strike next. But these robbers didn’t hand a note to a teller or dynamite their way into a vault; they breached the victimized banks’ networks and accessed their accounts on the SWIFT network, a proprietary messaging system that few people outside the finance industry have ever heard of. Once inside SWIFT, they were able to remotely send billions of dollars in fraudulent money transfer requests. Most of these were caught and flagged, but $81 million went through, and the hackers remain at large. These data breaches sent shockwaves through the finance world and threw into question the integrity of what was once thought to be one of the world’s safest networks.

2. The Yahoo Data Breach

The Yahoo data breach, which compromised 500 million user accounts, resulted in at least 23 lawsuits, and put the company’s planned acquisition by Verizon at risk, didn’t happen out of nowhere. It was the result of years of the company putting cyber security on the back burner in the name of not compromising “the user experience.” Other companies should look to Yahoo as an example of what can happen – in fact, what is bound to eventually happen – when information security is not taken seriously. While it’s true that end users of software products can be fickle and impatient, it is far better to risk annoying customers with product security measures than to leave their personal information open to data breaches.

3. The DNC Hack

Cyber security took center stage early on in this year’s contentious U.S. presidential election, and the Democratic National Committee became the poster child for embarrassing email data breaches. In June, WikiLeaks released a number of damaging emails stolen from the DNC’s email server. Among the “highlights” were what appeared to be messages written by high-ranking party officials plotting to smear candidate Bernie Sanders and planning to reward high-dollar DNC donors with federal appointments in an anticipated Hillary Clinton administration. As if that weren’t bad enough, some of the emails compromised these same donors’ private data, with one email attachment containing an un-redacted image of a six-figure check, complete with the donor’s routing and bank account numbers. The hack was so scandalous that the DNC’s chairperson, CEO, and communications director were forced to resign.

4. The FriendFinder Data Breaches

Apparently, last year’s Ashley Madison data breach didn’t teach companies that store sensitive information to be adults about data security. In October, news broke that six sites owned by FriendFinder Networks, Inc., owners of some of the world’s largest adult entertainment sites, had been hacked. Over 412 million user accounts were compromised, most of which came from a site called AdultFriendFinder, which bills itself as the “World’s Largest Sex and Swinger Community.” In addition to users’ email addresses and passwords – which had been stored as plain text or hashed and converted to all lower-case, making them far easier to compromise – hackers also got hold of the company’s source code and private/public key pairs. As of this writing, the FriendFinder hack is set to win the “award” for the largest data breach of 2016.

5. The Wendy’s POS Hack

Where’s the cyber security? Around the same time fast-food chain Wendy’s announced it would be switching from human clerks to automated ordering kiosks, the company was forced to admit that it had been victimized by a massive breach of its existing POS systems, which exposed customer credit card information captured at 1,000 of its locations in the U.S. Rather than taking responsibility for the data breaches, Wendy’s decided to pass the buck, insisting that “only” independently owned franchises, not company-owned locations, had been breached, and further claiming that the breaches were the fault of third-party POS service providers hired by its franchisees. This spin-doctoring didn’t dissuade dozens of credit unions from joining a class-action lawsuit against the chain, alleging that Wendy’s knew that its POS systems were not secure but did nothing to address the problems.

6. The Hollywood Presbyterian Medical Center Ransomware Attack

While it was not technically a data breach, we felt we would be remiss if we did not mention the infamous Hollywood Presbyterian ransomware attack, which happened early in the year and was a harbinger of things to come for the healthcare industry. Hackers managed to lock down the hospital’s entire network, including its electronic health records (EHR) system. Hollywood Presbyterian ended up forking over $17,000 in Bitcoin to get back in – an act which, unfortunately, emboldened hackers, who now knew they could easily extort big paydays from healthcare facilities. A spate of similar attacks hit medical facilities across the U.S., Canada, and even the U.K. As of this writing, Intel estimates that hospitals have paid various hackers nearly $1,000,000 in ransom this year.

Here’s hoping that 2017 is the year the “good guys” finally get the upper hand in the fight against data breaches, ransomware, and other cyber crimes.

The cyber security experts at Lazarus Alliance have deep knowledge of the cyber security field, are continually monitoring the latest information security threats, and are committed to protecting organizations of all sizes from security breaches. We offer full-service risk assessment services and Continuum GRC software to protect companies from data breaches, ransomware attacks, and other cyber threats.

Lazarus Alliance is proactive cyber security®. Call 1-888-896-7580 to discuss your organization’s cyber security needs and find out how we can help your organization secure your systems.

Yahoo Hack Was the Result of Years of Poor Cyber Security Practices

For Years, Yahoo Put Usability Ahead of Cyber Security

The massive Yahoo data breach, which compromised 500 million user accounts and has put its planned acquisition by Verizon at risk, happened because the company repeatedly put product user experience ahead of security, the New York Times reports:

Six years ago, Yahoo’s computer systems and customer email accounts were penetrated by Chinese military hackers. Google and a number of other technology companies were also hit.

The Google co-founder Sergey Brin regarded the attack on his company’s systems as a personal affront and responded by making security a top corporate priority. Google hired hundreds of security engineers with six-figure signing bonuses, invested hundreds of millions of dollars in security infrastructure and adopted a new internal motto, “Never again,” to signal that it would never again allow anyone — be they spies or criminals — to hack into Google customers’ accounts.

Yahoo, on the other hand, was slower to invest in the kinds of defenses necessary to thwart sophisticated hackers that are now considered standard in Silicon Valley, according to half a dozen current and former company employees who participated in security discussions but agreed to describe them only on the condition of anonymity.

For Years, Yahoo Put Usability Ahead of Cyber Security

The Times goes on to describe how CEO Marissa Mayer, after having taken over the troubled search engine in 2012, decided to focus Yahoo’s efforts on developing new products and creating better user experiences for existing products such as Yahoo Mail. Even though Mayer was aware of multiple information security issues, those took a back seat. Yahoo’s internal security staff, including former CISO Alex Stamos, warned Mayer about security vulnerabilities but found their efforts stymied due to “concerns that the inconvenience of added protection would make people stop using the company’s products.” Mayer cut the team’s budget and refused to approve the proactive cyber security initiatives Stamos pushed for, including end-to-end encryption, intrusion-detection mechanisms, and automatic resets of passwords on accounts that had been compromised. Even now, Mayer is still declining automatic password resets for the accounts compromised during this most recent breach – again, all in the name of not inconveniencing users.

Cyber Security vs. the User Experience

It’s common for tech companies to worry about how information security measures will affect the user experience. Often, developers must sacrifice speed and ease of use for a more secure product, and, while the majority of Americans claim to be highly concerned about data breaches, fickle customers may resist or become frustrated over security measures. A recent study found that one-third of Americans engage in risky behaviors to remember online passwords, and an ethnographic study of healthcare workers found widespread, flagrant disregard of cyber security practices in hospital settings.

While these are valid concerns, the answer is not to simply release unsecured products and hope for the best, as Yahoo apparently did. The burden of protecting customer data does not lie solely on software developers and data storage companies, and it cannot. The overwhelming majority of data breaches occur not as the result of external hacking but because hackers obtain legitimate login credentials, usually through social engineering schemes such as phishing. Manufacturers must build proactive security measures, such as multi-factor authentication, into their products, and get their customers accustomed to using them, even if the features are inconvenient or frustrating. The cost of a data breach is much higher than the cost of customer frustration, to both the breached company and the compromised customers.

The cyber security experts at Lazarus Alliance have deep knowledge of the cyber security field, are continually monitoring the latest information security threats, and are committed to protecting organizations of all sizes from security breaches. We offer full-service risk assessment services and Continuum GRC software to protect companies from data breaches, ransomware attacks, and other cyber threats.

Lazarus Alliance is proactive cyber security®. Call 1-888-896-7580 to discuss your organization’s cyber security needs and find out how we can help your organization secure your systems.

The Cybervisors Are Here Vigorously Addressing Global One Million Cyber Security Job Shortage

A recent report revealed that “More than 209,000 cyber security job postings in the U.S. are unfilled, and postings are up 74% over the past five years.”

Lazarus Alliance Cybervisor’s are the front line for the global business community bridging this critical cyber security job talent shortage.

Cybervisor cyber security job

Steve Morgan, a professional acquaintance who writes about cyber security for Forbes published One Million Cyber security Job Openings In 2016 and revealed some jaw-dropping statistics concerning the growing deficit in hiring qualified cyber security employees. To make matters worse, this chasm is exacerbated by the explosion of corporate breaches impacting and even decimating businesses in financials, education, business, government and especially healthcare.

A recent report revealed that “More than 209,000 cyber security jobs in the U.S. are unfilled, and postings are up 74% over the past five years, according to a Peninsula Press (a project of the Stanford University Journalism Program) 2015 analysis of numbers from the Bureau of Labor Statistics.” It is pretty clear that while there currently is not enough talent to go around; this is only getting exponentially worse.

Another report included “A report from Cisco puts the global figure at one million cyber security job openings. The demand for the (cybersecurity) workforce is expected to rise to 6 million (globally) by 2019, with a projected shortfall of 1.5 million” stated Michael Brown, CEO at Symantec, the world’s largest security software vendor.” This only turns up the anxiety level on companies who are scrambling to avoid being the “breach du jour”.

Compounding matters are that there is a significant increase in regulatory and compliance requirements across all industries. Every compliance framework out there went through major overhauls in 2015. In some cases as is the case for the SSAE 16; doubled in complexity. The situation just got more expensive and complex.

The only clear answers for businesses who want to remain viable in the global cyber threatscape come in the form of increased efficiencies and leveraged resources. Two of the best solutions that have emerged to address these challenges are:

Retain a Cybervisor®:

Retaining the help from dedicated and verifiable cyber security experts costs less than the expense of hiring just one (1) cyber security employee. And yes, that was a plural not singular expert. With professional Cybervisor services companies get the expertise of many seasoned experts who collaborate and stand together to support their clients.

 

 

Automation is Your Friend:

It’s time to work smarter and not harder! By utilizing automated cyber security and GRC tools, we have discovered that employees are so much more efficient and effective. In fact utilizing a tool like ITAM consistently makes the cyber security, GRC assessments and reporting processes a whopping 180% more efficient on average. When time is money, ITAM is like getting three (3) dedicated cyber security employees for less than the cost of one (1).

Learn more about Lazarus Alliance and why Lazarus Alliance is Proactive Cyber Security™.