Pod Slurping An easy technique for stealing data

Similar documents
Installing GFI FAXmaker version 12

GFI FAXmaker for Exchange/SMTP 12: An introduction to the architecture and deployment options

Patch management with GFI LANguard N.S.S. & Microsoft SUS

How to detect hackers on your web server

Why Bayesian filtering is the most effective anti-spam technology

Network fax technology A primer

Patch management with GFI LANguard and Microsoft WSUS

Security survey in the United States

CSG & Cyberoam Endpoint Data Protection. Ubiquitous USBs - Leaving Millions on the Table

Patch management with GFI LANguard N.S.S. & Microsoft WSUS

Deploying GFI LANguard S.E.L.M.

Network Fax Technology

How to perform network-wide security event log monitoring

The threats posed by portable storage devices

How To Block Ndr Spam

Part 14: USB Port Security 2015

Internet security: Shutting the doors to keep hackers off your network

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE

GFI Product Manual. GFI MailArchiver Evaluation Guide

Managing IT Security with Penetration Testing

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

DeviceLock for SOX Compliance

Government Worker Privacy Survey. Improper Exposure of Official Use, Sensitive, and Classified Materials

Securing Endpoints without a Security Expert

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

Patch management with GFI LanGuard and Microsoft WSUS

Easy Guide to Comprehensive IT Security Strategies for SMBs

How-To Guide: Cyber Security. Content Provided by

How To Secure Your System From Cyber Attacks

Security - A Holistic Approach to SMBs

Secure Passage through a World of Technological Threats

Beyond the Hype: Advanced Persistent Threats

Wireless (In)Security Trends in the Enterprise

GFI Product Guide. GFI Archiver Evaluation Guide

Proven LANDesk Solutions

The need for effective event management

GFI White Paper. Vulnerability scanning Your company s personal virtual security consultant

Endpoint Security Management

Global IT Security Risks: 2012

Attachment spam the latest trend

OIG Fraud Alert Phishing

Failure to comply: What s the worst that can happen?

GFI MailSecurity deployment strategies

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

INSTANT MESSAGING SECURITY

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem

Don't Be The Next Data Loss Story

Reducing the Cost and Complexity of Web Vulnerability Management


Managing Security Risks in Modern IT Networks

Security Practices for Online Collaboration and Social Media

Small businesses: What you need to know about cyber security

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Top Five Ways to Protect Your Network. A MainNerve Whitepaper

DeltaV System Cyber-Security

Vulnerability management: Key questions you should be asking

case study Core Security Technologies Summary Introductory Overview ORGANIZATION: PROJECT NAME:

The importance of an Acceptable Use Policy

Stay ahead of insiderthreats with predictive,intelligent security

Plugging the Leaks: Best Practices in Endpoint Security

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Driving Company Security is Challenging. Centralized Management Makes it Simple.

The Business Case for Security Information Management

IBM Data Security Services for endpoint data protection endpoint encryption solution

How To Protect Your Data From Being Hacked

Targeted attacks: Tools and techniques

Protecting Your Roaming Workforce With Cloud-Based Security

Computer Security at Columbia College. Barak Zahavy April 2010

Corporate Spying An Overview

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Top tips for improved network security

A Case for Managed Security

Vulnerability Assessment & Compliance

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Top five strategies for combating modern threats Is anti-virus dead?

How to keep spam off your network

How To Manage A System Vulnerability Management Program

Small businesses: What you need to know about cyber security

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

10 Top Tips for Data Protection in the New Workplace

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

How To Use Network Integrated Faxing

In-House Vs. Hosted Security. 10 Reasons Why Your is More Secure in a Hosted Environment

How To Implement Data Loss Prevention

Data Loss Prevention Program

BYOD and multivendor networks raise the vulnerability ante: 10 ways to fight back!

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Guide to Vulnerability Management for Small Companies

Managed Security Services

GFI White Paper: GFI FaxMaker and HIPAA compliance

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS

HP Security Solutions for Microsoft

AUTOMATED PENETRATION TESTING PRODUCTS

INFORMATION SECURITY AND PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY COVERAGE. I. GENERAL INFORMATION Full Name:

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover

Getting a Secure Intranet

Transcription:

Pod Slurping An easy technique for stealing data The problem with uncontrolled use of ipods, USB sticks and flash drives on your network A common misconception is that perimeter security measures such as firewalls and anti-virus software are enough to secure corporate data residing on the corporate network. In this white paper, we explore how the uncontrolled use of portable storage devices such as ipods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as pod slurping, can lead to major security breaches.

Pod Slurping An easy technique for stealing data 2 Introduction Our dependency on technology has never ceased to grow. Increased portability, ease of use, stylish looks and a good dose of marketing hype are the perfect cocktail to entice the population at large! Suppliers of consumer electronics are registering an ever increasing demand for portable consumer electronics. Apple s ipod for example, is one of the most successful electronic gadgets in the world. Since the ipod launch in 2001, Apple have sold almost 60 million units (CNNMoney.com, 2006). ipod has become a universally appealing source of audio entertainment the eponym for MP3 players. Projections show that the demand for ipods and other MP3 flash-memory music players will continue on a positive trend and will surge to nearly 124 million units in 2009 (Kevorkian, 2005). IDC Market Analysis Shipments of ipods and other MP3 flash memory music players will surge nearly 124 million units in 2009. As the popularity of ipods continues to grow, an alarming army of white earphones is slowly taking over the workplace. In fact, these MP3 players have become as common in any workplace as they are on public transport. But what is so alarming about having ipods and MP3 players at work? Introduction...2 Pod slurping: How can insiders steal your data?...2 Pod slurping: An easy technique for stealing data...3 Insider information theft is a real problem...4 Why would insiders want to slurp information?...4 How can corporations mitigate the risks of information theft?...5 Conclusion...6 About GFI EndPointSecurity...6 About GFI...6 References...7 Pod slurping: How can insiders steal your data? Developments in portable device and data storage technology are escalating. The latest versions of MP3 players and flash memory devices have huge storage capabilities; yet these gadgets are small enough to easily conceal and sneak in behind the corporate line of defence. Further to this, easy connectivity and high speed data transfer has become increasingly more widespread a user may simply plug the device into a USB or FireWire port and they are up and running no drivers or configuration required! In practice, this means that a data thief can get away with even more precious data, and a negligent employee can dump more viruses onto

Pod Slurping An easy technique for stealing data 3 the corporate network even when connecting for only a short time. ipod is just one example of such portable contraptions. At a glance it is an innocent-looking portable audio device. However under the hood it boasts up to 60 GB of portable storage space; practically large enough to store all the data found in a typical workstation. This means that a malicious insider can use an ipod to covertly take out (i.e. steal ) proprietary data and millions of financial, consumer or otherwise sensitive corporate records at one go! 2006 Identity Fraud Survey In 2005, the costs and damages caused by identity theft reached $56.6 billion." Gartner analysts Contu and Girard (2004) warned of the security risks associated with the uncontrolled use of portable storage devices within corporations. Today, information theft has become a plague on modern society; data leakage, data ciphering, and data disclosure incidents are all but some of the terms used by security experts to refer to information theft. However, the most original term so far is probably the term pod slurping that was coined by US security expert Abe Usher (2005). Pod slurping: An easy technique for stealing data Usher uses the term pod slurping to describe how MP3 players such as ipods and other USB mass storage devices can be easily used to steal sensitive corporate data. There are dishonest people in the world, says Usher, many of them work at many companies - and these USB devices make it rather trivial to steal huge amounts of data" (Schick, 2006). To demonstrate the vulnerability of corporate security, Usher developed a proof of concept software application that can automatically search corporate networks and copy (or slurp ) business critical data on to an ipod. This software application runs directly from an ipod and when connected to a computer it can slurp (copy) large volumes of corporate data on to an ipod within minutes. What s more is that slurping is not limited to ipods and MP3 players alone. All portable storage devices can be used to slurp information; digital cameras, PDAs, thumb drives, mobile phones and any other plug-and-play devices which have storage capabilities! Data slurping is a very simple automated process and does not require any technical expertise; a user may plug in the portable storage device to a corporate workstation and by the time it takes to listen to an MP3, all the sensitive corporate data on that workstation is copied to the portable storage device. Pod Slurping Blog in 2 minutes, it's possible to extract about 100 MB of Word, Excel, PDF files -basically anything which might contain business data "

Pod Slurping An easy technique for stealing data 4 Insider information theft is a real problem Information theft has now become a major concern for every organization and thus data leakage prevention is slowly taking up a bigger portion of the IT budget. This drive is attributed to two factors: The wave of malevolent threats that is hitting every industry and the increase in regulatory requirements which demand more protection and tighter controls over client records and other confidential information. More stringent controls and severe penalties are forcing organizations to address regulatory compliance more seriously. In January 2006, the Federal Trade Commission charged commercial data broker ChoicePoint Inc. a settlement fee of 15 million dollars for leaking consumer data and violating consumer privacy rights (Federal Trade Commission, 2006). A misconception shared by many organizations is that security threats mostly originate from outside the corporation. In fact, countless dollars are being spent every year on firewalls and other solutions that secure the corporate perimeter from external threats. However statistics show that internal security breaches are growing faster than external attacks and at least half of security breaches originate from behind the corporate firewall. Unfortunately, corporate insiders are the first and easiest route to evade perimeter security. The trusted position of corporate employees and their constant exposure to corporate data makes detecting and stopping of data theft an enormous challenge especially in environments where corporate data is largely distributed! Gartner Group 70% of unauthorized access to information systems is committed by employees. Why would insiders want to slurp information? Corporate data can be profitable in various ways; blueprints, engineering plans, tenders, pricelists, source code, database schemas, sound files, lyrics and much more all this valuable intellectual property may be exploited by individuals or corporations to gain economical and business advantage over their competitors. The 2006 CSI/FBI survey indicates theft of intellectual property as having the fourth highest economical effect over organizations (Gordon et al., 2006). Malicious perpetrators may also steal sensitive consumer information such as medical and financial records from a company and divulge it to the public. This would damage the company s reputation as well as make it liable to legal prosecution for violating consumer privacy rights. In a nutshell, malicious intent, monetary gain and curiosity are probably the major motives behind information theft. Anyone is an enemy for a price and thus perpetrators can be various. Disgruntled employees that believe they are disrespected or exploited by their employers may take advantage of their trusted position and sell corporate plans and other sensitive information to direct competitors. Former employees who feel they have been unfairly dismissed may use

Pod Slurping An easy technique for stealing data 5 their inside knowledge or exploit internal relationships to access, steal and publicly expose consumer information and damage the company. Trusted insiders can also turn into paid informers and engage in industrial espionage, data warfare or other extensive fraudulent activities such as identity theft. The term identity theft refers to crimes in which someone obtains and uses the personal details of another person (e.g. social security or credit card number) to commit criminal acts, usually for financial gain. To date it is the fastest growing crime in the United States. It was estimated that identity theft victims amounted to around nine million adults in the U.S. in 2005 (Johannes, 2006). 2005 Identity Theft Summit In Sacramento a perpetrator managed to buy $17,000 worth of goods using the name and social security number of celebrity golf player Tiger Woods! How can corporations mitigate the risks of information theft? The key advantage of ipods and similar portable storage devices is easy access. In theory, this may be of great advantage for corporations. However, it is a well-reported fact that access and security are at opposite ends of the security continuum. The reason is that you never know what users may be doing with their portable devices. An employee might appear to be listening to music on his ipod, but actually he or she might be uploading malicious files or slurping gigabytes of valuable corporate data. A possible solution to avoid information theft is to implement a corporate-wide portable storage control policy. To mitigate the security risks, some experts and researchers suggest conventional courses of action such as the physical blocking of ports, stringent supervision as well as drastic actions such as the total ban of ipods and similar devices from the workplace. However, this is not the best practical approach. Portable storage devices can be beneficial tools for the corporate workforce and a blanket ban would be counter-productive. In addition good practice dictates that you must never rely on voluntary compliance. Pod Slurping Blog The cost of being proactive is less than the cost of reacting to an incident! The ideal way to ensure complete control over portable storage devices is by introducing technological barriers such as GFI EndPointSecurity. GFI EndPointSecurity is a software solution that allows total control over data transfers, to and from portable storage devices on a user by user basis throughout the network.

Pod Slurping An easy technique for stealing data 6 Conclusion Companies are constantly at risk of losing sensitive corporate data. In this whitepaper we have explored how the uncontrolled use of portable storage devices within corporations poses major security risks including information theft. This is mostly attributed to the fact that firms tend to focus more on perimeter security and widely ignore the enemy within, making it easier for trusted insiders to steal valuable corporate data. In order to secure corporate data and prevent data slurping, administrators must have a way to technologically control the use of portable storage devices, solutions such as GFI EndPointSecurity give administrators the power to control and report on such device usage throughout their network. About GFI EndPointSecurity GFI EndPointSecurity allows you control entry and exit of data via portable storage devices, allowing you to prevent users from taking confidential data or introducing viruses and trojans to your network. GFI EndPointSecurity allows you to actively manage user access to media players (including ipod and Creative Zen), USB sticks, CompactFlash, memory cards, PDAs, Blackberries, mobile phones, CDs, floppies and more. To read more and download a trial version, visit http://www.gfi.com/endpointsecurity/. About GFI GFI is a leading provider of network security, content security and messaging software. Key products include the GFI FAXmaker fax connector for Exchange and SMTP mail servers; GFI MailSecurity email content/exploit checking and anti-virus software; GFI MailEssentials serverbased anti-spam software; GFI MailArchiver an email archiving solution; GFI LANguard Network Security Scanner (N.S.S.) security scanning and patch management software; GFI Network Server Monitor that automatically sends alerts, and corrects network and server issues; GFI LANguard Security Event Log Monitor (S.E.L.M.) that performs event log based intrusion detection and network-wide event log management; GFI EndPointSecurity that enables network-wide control of removable media and GFI WebMonitor, HTTP/FTP monitoring and anti-virus software for ISA Server. Clients include Microsoft, Telstra, Time Warner Cable, NASA, DHL, Caterpillar, BMW, the US IRS, and the USAF. GFI has offices in the US, the UK, Germany, Cyprus, Romania, Australia and Malta, and operates through a worldwide network of distributors. GFI is a Microsoft Gold Certified Partner and has won the Microsoft Fusion (GEM) Packaged Application Partner of the Year award. For more information about GFI, visit http://www.gfi.com.

Pod Slurping An easy technique for stealing data 7 References CNNMoney.com (2006) ipod, Mac Sales Boost Apple Profit Almost 48% available from: http://money.cnn.com/services/tickerheadlines/for5/200607191714dowjonesdjonline001 233_FORTUNE5.htm (last cited 27 July 2006). Contu R. and Girard J. (2004) Put Security Policies in Place for Portable Storage Devices, Gartner. Federal Trade Commission (2006) ChoicePoint Settles Data Security Breach Charges; to Pay $10 Million in Civil Penalties, $5 Million for Consumer Redress available from http://www.ftc.gov/opa/2006/01/choicepoint.htm (last cited 27 July 2006). Gordon L.A., Loeb M.P., Lucyshyn W. and Richardson R. (2006) 2006 CSI/FBI Computer Crime and Security Survey, Computer Security Institute. Hunter R. (2003) Enterprises and Employees: The Growth of Distrust, Gartner available from: http://www.csoonline.com/analyst/report3317.html (last cited 27 July 2006). Johannes R. (2006) 2006 Identity Fraud Survey Report, Javelin Strategy & Research. Kevorkian S. (2005) Worldwide and U.S. Compressed Audio Player 2005-2009 Forecast and Analysis: MP3 All Over the Place, IDC. Schick S. (2006) Be afraid of the file-slurping ipod, globeandmail.com available from: http://www.theglobeandmail.com/servlet/story/rtgam.20060209.wpodslurping09/bnstory/ (last cited 27 July 2006). Scully J. (2005) Summit on Identity Theft Solutions: Locking Up the Evil Twin available from: http://www.da.saccounty.net/main/idtheft2005.htm (last cited 27 July 2006). Usher A. (2005) Pod slurping, Sharp Ideas LLC available from: http://www.sharpideas.net/pod_slurping.php (last cited 27 July 2006). 2006 GFI Software Ltd. All rights reserved. The information contained in this document represents the current view of GFI on the issues discussed as of the date of publication. Because GFI must respond to changing market conditions, it should not be interpreted to be a commitment on the part of GFI, and GFI cannot guarantee the accuracy of any information presented after the date of publication. This White Paper is for informational purposes only. GFI MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. GFI, GFI EndPointSecurity, GFI FAXmaker, GFI MailEssentials, GFI MailSecurity, GFI MailArchiver, GFI LANguard, GFI Network Server Monitor, GFI WebMonitor and their product logos are either registered trademarks or trademarks of GFI Software Ltd. in the United States and/or other countries. All product or company names mentioned herein may be the trademarks of their respective owners.