Cyber - Security and Investigations. Ingrid Beierly August 18, 2008



Similar documents
Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

Payment Card Industry Security Standards PCI DSS, PCI-PTS and PA-DSS

Global Partner Management Notice

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

Franchise Data Compromise Trends and Cardholder. December, 2010

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Josiah Wilkinson Internal Security Assessor. Nationwide

What To Do if Compromised. Visa USA Fraud Investigations and Incident Management Procedures

Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer

Encryption and Tokenization: Protecting Customer Data. Your Payments Universally Amplified. Tia D. Ilori Sue Zloth September 18, 2013

MITIGATING LARGE MERCHANT DATA BREACHES

Your Compliance Classification Level and What it Means

Data Security Basics for Small Merchants

What To Do if Compromised. Visa USA Fraud Investigations and Incident Management Procedures

MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.

Data Security for the Hospitality

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire

Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008

Frequently Asked Questions

8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year

PAYMENT CARD INDUSTRY (PCI) COMPLIANCE HISTORY & OVERVIEW

Visa global Compromised Account

A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS)

Project Title slide Project: PCI. Are You At Risk?

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

Payment Card Industry Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS) Frequently Asked Questions

Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013

Becoming PCI Compliant

Why Is Compliance with PCI DSS Important?

University of Sunderland Business Assurance PCI Security Policy

Cyber Security: Secure Credit Card Payment Process Payment Card Industry Standard Compliance

PCI DSS Overview. By Kishor Vaswani CEO, ControlCase

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

PCI Compliance Overview

Need to be PCI DSS compliant and reduce the risk of fraud?

Achieving Compliance with the PCI Data Security Standard

What To Do If Compromised

This appendix is a supplement to the Local Government Information Security: Getting Started Guide, a non-technical reference essential for elected

PCI Compliance. Top 10 Questions & Answers

PCI Compliance: How to ensure customer cardholder data is handled with care

GFI White Paper PCI-DSS compliance and GFI Software products

How To Protect Your Credit Card Information From Being Stolen

PCI Compliance Top 10 Questions and Answers

PCI Security Standards Council

How To Protect Your Business From A Hacker Attack

PCI DSS. CollectorSolutions, Incorporated

WHITE PAPER. PCI Basics: What it Takes to Be Compliant

Introduction to PCI DSS Compliance. May 18, :15 p.m. 2:15 p.m.

PCI-DSS: A Step-by-Step Payment Card Security Approach. Amy Mushahwar & Mason Weisz

University of Dayton Credit / Debit Card Acceptance Policy September 1, 2009

Payment Card Industry Data Security Standard

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

How To Protect Visa Account Information

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

Effectively Managing Data Breaches

PCI PA - DSS. Point BKX Implementation Guide. Version Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

V ISA SECURITY ALERT 13 November 2015

How To Protect Your Data From Being Stolen

PCI PA - DSS. Point ipos Implementation Guide. Version VeriFone Vx820 using the Point ipos Payment Core

Data Security, Fraud Prevention, and Cost Control. Mike Dorland, CPP Regional Marketing Representative Michigan Retailers Association

Payment Card Security

PCI DATA SECURITY STANDARD OVERVIEW

PCI Data Security Standards

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices

Qualified Integrators and Resellers (QIR) Implementation Statement

Worldpay s guide to the Payment Card Industry Data Security Standard (PCI DSS)

Template for PFI Final Incident Report for Remote Investigations

CREDIT CARD PROCESSING POLICY AND PROCEDURES

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report. Template for PFI Final Incident Report. Version 1.0.

Two Approaches to PCI-DSS Compliance

This policy applies to all GPC units that process, transmit, or handle cardholder information in a physical or electronic format.

Technical breakout session

Payment Card Industry - Data Security Standard (PCI-DSS) Security Policy

1/18/10. Walt Conway. PCI DSS in Context. Some History The Digital Dozen Key Players Cardholder Data Outsourcing Conclusions. PCI in Higher Education

La règlementation VisaCard, MasterCard PCI-DSS

WHITEPAPER. Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI

It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe

PCI Compliance: Protection Against Data Breaches

Adyen PCI DSS 3.0 Compliance Guide

HOW TO PROTECT YOUR BUSINESS AND YOUR CUSTOMERS FROM DATA FRAUD

SecurityMetrics Introduction to PCI Compliance

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

Your Single Source. for credit, debit and pre-paid services. Fraud Risk and Mitigation

PCI Security Compliance

North Carolina Office of the State Controller Technology Meeting

Payment Card Industry Data Security Standards.

Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report. Template for PFI Final Incident Report. Version 1.1.

Transcription:

Cyber - Security and Investigations Ingrid Beierly August 18, 2008

Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities Visa s What To Do If Compromised procedures Payment Card Industry Data Security Standards ( PCI DSS ) Questions and Answers Information Classification as Needed Presentation Identifier.2 2

Visa Cyber - Security and Investigations Provide fraud control support, direction and assistance External and internal stakeholders Publish fraud alerts and best practices Identify and actively investigate fraud incidents Intake / triage point for all reported fraud incidents Other activities Investigate global fraud affecting multiple members Share intelligence across all Visa regions Collaborate with high-tech private / public fraud groups Represent U.S. on regional fraud working groups Gather carder intelligence from various sources 3

Visa Cyber - Security and Investigations Ensure immediate containment of external Visa cardholder account security breaches Coordinate appropriate forensic response globally Provide technical support to Investigations, Incident Management and CISP / PCI DSS teams Review forensic reports Identify and communicate vulnerabilities exposing Visa data Oversee remediation of high-risk vulnerabilities 4

Law Enforcement Support Act as liaison with all federal, state and local law enforcement agencies Coordinate compromise investigations Provide critical fraud loss information to support criminal indictments Gather carder intelligence from law enforcement Participate in United States Secret Service ( USSS ) Electronic Crime Task Forces Provide education and training to prosecutors Provide law enforcement investigative support on a global basis Coordinate research and response to law enforcement subpoenas 5

Today's Targets Hackers are attacking: Brick-and-mortar merchants Issuers E-commerce merchants Processors and Agents Hackers are looking for: Software that stores sensitive cardholder data Personal information to perpetrate identity theft Track data and payment account numbers PINs Malware customized to steal cardholder data 6

Other Target Areas of Interest Log in credentials for online banking and networks Vulnerable public facing websites (SQL attacks) Targeted phishing or spearing attacks against issuers Fraudulent purchase of gift cards with counterfeits ATM skimming on the increase Automated Fuel Dispenser ( AFD ) skimming 7

Recent Attack Patterns Based on high-profile compromises YTD, Cyber - Security and Investigations has identified the following malware: BP0.exe is a remote command shell backdoor. It allows remote attackers use of the windows command shell to run commands and interact with the compromised server. Malware is hard-coded with a fixed IP address. A new version of BP0.exe has been identified with a new IP address Wiadebyls.dll is a password collector that gathers credentials as they are used. It then transmits them to a hard-coded IP address using the HTTP protocol Sp.exe extracts and runs the wiadebyls.dll malware. It uses a technique known as process injection to cause the winlogon process to forcibly load the DLL Information Classification as Needed Presentation Identifier.8 8

Recent Attack Patterns Wininet.exe is a packet sniffing program which can be configured to capture payment data on the network Wuauclt.exe is a key logger program and can be configured to capture keystrokes and payment data on the Point-of-Sale ( POS ) terminal Note: Visa shares new malware with security product vendors to ensure vendors develop signature files to detect malware Information Classification as Needed Presentation Identifier.9 9

Top 5 Merchant Vulnerabilities 1. Storage of Track Data 2. Insecure Remote Access 3. Insecure POS Systems 4. Vendor - Supplied Default Settings and Passwords 5. Insecure Network Configuration Information Classification as Needed Presentation Identifier.10

Top 5 Merchant Vulnerabilities Storage of Track Data Mitigation Strategy Contact your POS vendor or reseller to validate whether the applications and versions in use are storing full track data or other sensitive information Perform a secure delete of sensitive cardholder from the POS system Merchants must use a payment application that has been validated against PCI Payment Application Data Security Standards ( PA-DSS ) Insecure Remote Access Mitigation Strategy Contact your POS vendor, reseller, or IT staff to ensure secure configuration of remote access. For example: Enable remote access port only when needed Upgrade to latest version of remote access management Allow connection from trusted IP addresses Enable strong encryption Enforce use of strong password Information Classification as Needed Presentation Identifier.11

Top 5 Merchant Vulnerabilities Insecure POS Systems Mitigation Strategy Use latest operating system Install critical patches Disable unnecessary ports and services Disable Internet access (inbound and outbound) Use POS system only for business purposes (e.g., do not allow personal use, such as email, browsing the Internet, downloading music) All users must have a unique ID and password to access the POS system Implement anti-virus software with latest signature files If POS system is running a database server (such as SQL or MySQL), protect the Administrator account by issuing a strong password and remove unnecessary stored procedures Enforce use of strong password Enable logging for forensic purposes Information Classification as Needed Presentation Identifier.12

Top 5 Merchant Vulnerabilities Vendor - Supplied Default Settings and Passwords Mitigation Strategy Change default or blank settings and passwords prior to deployment. This includes operating systems, firewall devices, routers, wireless access points, etc. Insecure Network Configuration Mitigation Strategy Implement a stateful inspection firewall Direct Internet access to the POS system should not exist. This can be addressed using a firewall device separating the Internet and the POS system Enable logging on remote access and firewall Monitor logs periodically to detect unknown activity Implement network segmentation to separate payment processing systems from non-critical systems. Separation is key to limiting the extent of a compromise that may originate in another segment of the network Any wireless network must be segmented from the wired network where the POS system resides Information Classification as Needed Presentation Identifier.13

Visa s What To Do If Compromised Procedures Compromised entities must: Immediately contain and limit the exposure Notify their merchant bank Notify law enforcement Work with Visa on forensic investigation Provide compromised Visa, Interlink, and Plus accounts to your merchant bank Provide an incident report to your merchant bank For more info go to www.visa.com/cisp Information Classification as Needed Presentation Identifier.14

Visa s What To Do If Compromised Procedures Continued Acquirers must: Ensure compromised entity cooperates with Visa on the investigation Perform an initial investigation and provide documentation to Visa If Visa deems necessary, an independent forensic investigation must be conducted by a Qualified Incident Response Assessor ( QIRA ) Information Classification as Needed Presentation Identifier.15

Visa s What To Do If Compromised Procedures Continued Acquirers must: Perform a PIN security assessment (If PINs are at risk) Provide forensic report to Visa Provide at-risk account numbers to Visa Ensure the compromised entity has contained the incident Ensure the compromised entity achieves PCI compliance For more info, please refer to the What To Do If Compromised document available at www.visa.com/cisp Information Classification as Needed Presentation Identifier.16

Industry Collaboration PCI Security Standards Council ( SSC ), launched in September 2006, is a global forum for the ongoing development and enhancement of security standards for account data protection Security standards managed by the council include the PCI Data Security Standard ( DSS ), Payment Application Data Security Standard ( PA-DSS ) and PIN Entry Device ( PED ) program Visa, Amex, Discover, JCB and MasterCard are founding members Payment card industry stakeholders are invited to join as Participating Organizations and can be elected to an Advisory Board Participating organizations are invited to attend community meetings, comment on DSS revisions and future security standards and participate in implementation "best practice" discussions 17

PCI DSS PCI DSS is based on fundamental data security practices Build and Maintain a Secure Network Protect Cardholder Data Maintain a Vulnerability Management Program Implement Strong Access Control Measures Regularly Monitor and Test Networks Maintain an Information Security Policy 1. Install and maintain a firewall configuration to protect data 2. Do not use vendor - supplied defaults for system passwords and other security parameters 3. Protect stored data 4. Encrypt transmission of cardholder data and sensitive information across public networks 5. Use and regularly update anti-virus software 6. Develop and maintain secure systems and applications 7. Restrict access to data by business need-to-know 8. Assign a unique ID to each person with computer access 9. Restrict physical access to cardholder data 10. Track and monitor all access to network resources and cardholder data 11. Regularly test security systems and processes 12. Maintain a policy that addresses information security 18

Visa Merchant Compliance Validation Level Validation Action Scope Validated By 1 Annual On-site Security Audit Quarterly Network Scan Authorization and Settlement Systems Internet Facing Perimeter Systems Qualified Security Assessor or Internal Audit if signed by Officer of the company Approved Scan Vendor 2 and 3 Annual Self - Assessment Questionnaire Quarterly Network Scan Any system storing, processing, or transmitting Visa cardholder data Internet Facing Perimeter Systems Merchant Approved Scan Vendor 4 Annual Self - Assessment Questionnaire Recommended Network Scan Recommended Any system storing, processing, or transmitting Visa cardholder data Internet Facing Perimeter Systems Merchant Approved Scan Vendor 19

Level 4 Small Merchant Initiatives Executing a plan to address small merchants in the U.S. Level 4 merchants account for more than 85% of all compromises identified since 2005, but less than 5% of potentially exposed accounts Most small merchant compromises involve vulnerable payment applications Outreach to all active acquirers to promote small merchant security Education and awareness campaign including a webinar series, regular data security alerts and bulletins Publish list of vulnerable payment applications quarterly and promote use of PA-DSS validated applications 100% of 231 acquirers provided Visa with Level 4 compliance plans Updated progress reports due from acquirers by June 30, 2008 20

Payment Application Security Drive the adoption of secure payment applications that do not store prohibited data Visa PABP published in 2005 Provide vendors guidance to develop products that facilitate PCI DSS compliance Minimize compromises caused by insecure payment applications with emphasis on track data storage List of validated payment applications published monthly since January 2006 348 products across 157 vendors independently validated by a Qualified Security Assessor List of validated applications published on www.visa.com/cisp List of vulnerable payment applications published quarterly since February 2007 PABP adopted by PCI SSC as an industry standard, Payment Application Data Security Standard ( PA-DSS ) in April 2008 www.visa.com/pabp 21

Level 4 Merchant Security Best Practices Understand PCI DSS Requirements: Use online resources The PCI SSC website contains the standards and other supporting documentation (e.g. self - assessment questionnaires) www.pcisecuritystandards.org The Visa website has an array of helpful security and compliance information www.visa.com/cisp Partner with your merchant bank Utilize resources offered by your merchant bank such as alerts, bulletins and training Understand the compliance validation required by your merchant bank Understand PCI PIN Security Requirements: The www.visa.com/pin website has an array of helpful PIN security and compliance information for Interlink accepting entities The PCI SSC website contains the Approved PIN Entry Devices list and other supporting documentation www.pcisecuritystandards.org/pin 22

Level 4 Merchant Security Best Practices Adopt Payment Application Best Practices: Vet Point-Of-Sale ( POS ) applications with Visa s list of validated payment applications List available at www.visa.com/pabp Confer with payment application vendors (or reseller / integrator) to ensure their software does not store prohibited data (e.g., magneticstripe, CVV2 or PIN data) Partner with merchant bank to obtain a list of vulnerable payment applications If payment application deficiencies are identified, merchants should work with their acquirer to immediately upgrade to a compliant version In addition to upgrading the application, any historical storage of prohibited data must be securely wiped from all systems immediately! 23

Questions or Comments?

Thank You!