Categories: SecurityWorkspace

Retailers, Hotels Hit By Majority Of Cyber-Crime

Hotels, restaurants and shops may get five-star ratings from tourists, but many are likely to only receive a single star for security.

An analysis of breach data for 2012 found that retailers and the hospitality industry continued to command the most interest from cyber-criminals, accounting for 78 percent of the breaches documented by security services firm Trustwave.

Easy targets

The businesses are typically easy targets, having outsourced the administration of important servers and business data to firms that focus more on keeping the systems functioning than on security, says Christopher Pogue, director of digital forensics and incident response for Trustwave’s SpiderLabs.

“An integrator may have 1,000 customers and may do remote administration for all of them using, not 1,000 passwords, but maybe two or three,” Pogue said. “That leaves a vulnerability that can be exploited by attackers.”

Almost one-third of all victims had critical systems administered by a third party.

Attackers had no trouble exploiting that weakness, with vulnerable remote-access systems accounting for the method of entry in 47 percent of the cases, according to the Trustwave report.

In most cases, users – not software vulnerabilities – were to blame: Almost 90 percent of systems had weak or easily guessable passwords, with “Password1” continuing to be the most common, according to Trustwave’s report.

The report underscored that attackers continued to focus on what works, not necessarily on new techniques.

Web flaws targeted

In addition to targeting poorly secured remote-access applications, attackers also focused on exploiting flaws in websites to gain access to the backend databases, typically known as a SQL injection attack and which accounted for more than a quarter of all attacks.

“From a criminal perspective, why should I get creative when I commit my crimes, when I don’t have to,” Pogue said.

Focused on stealing credit card and customer data, cyber-criminals compromised point-of-sale servers in nearly half of attacks and targeted websites for the other half. Only 5 percent of attacks focused on other infrastructure.

Because the victims were not prepared to deal with security incidents, they detected breaches in less than a quarter of the cases. Moreover, the average time to detect a breach rose to 210 days in 2012, an increase of more than a month compared with 2011.

The attackers used a variety of exploit kits, yet nearly 70 percent of all attacks used the Blackhole exploit kit. By the end of 2012, however, the Cool exploit kit was increasingly being used.

Trustwave analysed some 450 cases investigated by the company’s incident responders and found 40 different variants of malware used by six distinct criminal groups. Further analysis suggests that only three criminal teams cause the majority of point-of-sale breaches in major nations worldwide.

Russian data dumps

While attacks typically came from the US, Russia and Taiwan, the criminals used data dump sites in Russia, the Ukraine and Romania.

The service provider recommended that companies hold their third-party service providers to a higher level of security.

Alternatively, companies can outsource their credit-card processing to prevent the sensitive data from ever being stored on their servers.

Are you a security pro? Try our quiz!

Originally published on eWeek.

Robert Lemos

Robert Lemos covers cyber security for TechWeekEurope and eWeek

Recent Posts

Raimondo Downplays Huawei Smartphone Chip

US Commerce Secretary Gina Raimondo says Huawei's flagship smartphone chip 'years behind' US technology, shows…

23 hours ago

Cloud Companies Reject Broadcom VMware Pricing Changes

Cloud companies, business user groups say Broadcom price changes do not address their concerns, as…

23 hours ago

UK Lawsuit Claims Grindr Shared HIV Status

Dating app Grindr sued over claims it shared sensitive user data, including HIV status, with…

24 hours ago

Meta Opens Quest VR OS To Third Party Gadget Makers

Meta Platforms opens operating system behind Quest virtual reality headsets to third parties amidst competition…

1 day ago

EU Prepares Action Against ‘Addictive’ TikTok Lite Features

European Commission may ban rewards feature in recently launched TikTok Lite that it calls 'toxic…

1 day ago

TikTok Says New US Ban Effort Would ‘Trample Free Speech’

US House of Representatives passes new bill combining TikTok measures with foreign aid, may face…

2 days ago