Information Security News
Further to the recent story on Memory Trolling for PCI data, I was able to spend one more day fishing in memory, I dug a bit deeper and come up with more fun Credit Card / Memory goodness with our friend the Point of Sale application.
First of all, just searching for credit card numbers returns a lot of duplicates, as indicated in yesterday's story.Â In the station and POS application I was working with, it turns out that if you search for the card number string plus the word "Approved", a single line was returned per transaction, with the credit card and PIN.Â For instance, to find all Visa card transactions (one record per transaction):
strings memdump.img | grep VISA | grep -i APPROVEDÂ | wc -lÂ Â Â Â Â Â Â Â Â
Â Â Â Â 323 Â Â Â Â Â Â
In addition, I was able to find several hundred debit card numbers, simply by using those same search concept, but using the term "INTERAC" instead.Â Note that this search gets you both the approved and not approved transactions.
strings memdump.img | grep INTERAC | grep -i APPROVED | wc -l
Â Â Â Â 200
With that done, I started looking at the duplicate data, and realized that some of the duplicate "records" I was tossing out looked interesting - sort of XML-like.Â Â Upon closer inspection, it turns out that they were fully formed MS SQL posts (and no, just as the credit card numbers themselves, I won't be sharing the text of any of those)
Interestingly, the SQL post formatted the credit card numbers as 123456******1234, such that the first 6 and last 4 digits are in clear text,but the middle digits are masked out. Â
This lines right up with the PCI 2.0 spec, section 3.3, which indicates that if you mask a PAN (Primary Account Number) that way, it is no longer considered sensitive. (https://www.pcisecuritystandards.org/documents/pci_dss_v2.pdf).Â I'm not sure how keen I am on 3.3 -Â - I can see that storing this info allows the merchant to use that as a "pseudo customer number", so that they can track repeat purchases and so on, but I'm not sure that the benefits outweigh the risks in this case.Â Â I'd much prefer encrypting on the reader itself, so that the merchant and POS software never sees the card number at all - it's encrypted right from the reader to the payment processor (or gateway).
As I said when I started this, I'm not the expert memory carver that some of our readers are - please, use our comment section and tell us what interesting things you've found in a memory image!
by Sean Gallagher
In a restricted intelligence document distributed to police, public safety, and security organizations in July, the Department of Homeland Security warned of a “malicious activity” that could expose secrets and security vulnerabilities in organizations’ information systems. The name of that activity: “Google dorking.”
“Malicious cyber actors are using advanced search techniques, referred to as ‘Google dorking,’ to locate information that organizations may not have intended to be discoverable by the public or to find website vulnerabilities for use in subsequent cyber attacks,” the for-official-use-only Roll Call Release warned. “By searching for specific file types and keywords, malicious cyber actors can locate information such as usernames and passwords, e-mail lists, sensitive documents, bank account details, and website vulnerabilities.”
That’s right, if you’re using advanced operators for search on Google, such as “site:arstechnica.com” or “filetype:xls,” you’re behaving like a “malicious cyber actor.” Some organizations will react to you accessing information they thought was hidden as if you were a cybercriminal, as reporters at Scripps found out last year. Those individuals were accused of “hacking” the website of free cellphone provider TerraCom after discovering sensitive customer data openly accessible from the Internet via a Google search and an “automated “ hacking tool: GNU’s Wget.
Posted by InfoSec News on Aug 27http://www.csoonline.com/article/2597936/security-leadership/the-black-hat-evolution.html
Posted by InfoSec News on Aug 27http://www.healthcareitnews.com/news/new-hipaa-breach-details-remain-vague
Posted by InfoSec News on Aug 27http://www.computerworld.com/article/2597937/security0/tesla-recruits-hackers-to-boost-vehicle-security.html
Posted by InfoSec News on Aug 27http://www.wired.com/2014/08/federal-cybersecurity-director-guilty-child-porn-charges/
Posted by InfoSec News on Aug 27http://www.marketplace.org/topics/tech/want-learn-cybersecurity-head-def-con
Why physical security (and InfoSec!) still matter
In the current era of mega-(should I say giga-?) breaches with tens to hundreds of millions of lost customer records and the hacking-of-everything, it is safe to assume that the logical security of devices becomes almost more important than the ...
by Robert Lemos
More than a year after former National Security Agency contractor Edward Snowden leaked secret documents describing the breadth and depth of US surveillance, policy makers continue to debate the legal framework for such monitoring.
Yet a number of technology startups are blazing ahead to create a range of products that promise to restore people's privacy online. Silent Circle, WhisperSystems, and Wickr offer a variety of services, from private instant messaging to secure data storage to encrypted phone calls. Other companies, such as Blackphone, have focused on creating a secure smartphone for the privacy-conscious.
And even newer ideas are in the offing. A small Silicon Valley technology firm, for example, has designed a plug-in black box for smartphones that can encrypt a voice call on the fly and is seeking funding on Kickstarter. Called JackPair, the box can be connected between a smartphone and the user's headphones and encrypt conversations with another JackPair user, said Jeffrey Chang, founder of AWIT Systems, the firm behind the product.