Bullseye
Breach
ANATOMY OF AN ELECTRONIC BREAK-IN
Greg Scott
Copyright 2015 by Greg Scott
All rights reserved. No part of this book may be reproduced by any mechanical, photographic,or electronic process, or in the form of a phonographic recording, nor may it be stored in a retrieval system, transmitted, or otherwise be copied for public or private use, other than forfair use as brief quotations embodied in articles and reviews without prior written permission of the publisher.
ISBN 13: 978-1-59298-877-8
Library of Congress Catalog Number: 2015903779
Printed in the United States of America
First Printing: 2015
19 18 17 16 15 5 4 3 2 1
Edited by Steve LeBeau, Lily Coyle, and Alicia Ester
Cover and interior design by Laura Drew.
Cover photography shutterstock.
Beavers Pond Press
7108 Ohms Lane
Edina, MN 554392129
952-829-8818
www.beaverspondpress.com
Dedicated to the unsung heroes on the front lines in bank fraud departments across the United States. Especially to Kim, with the real-world US Bank Fraud Department, who saved my butt when she helped me track down at least $14,773.92 in attempted fraudulent transactions on my own credit card on Dec. 1, 2011.
And to the IT security professionals in the trenches who work hard to keep us safe on the Internet. May everyone who reads this book heed their warnings.
Ripped from recent headlines, this gripping cyber-attack tale has all the elements of an international thriller, including a floating corpse in the Gulf of Finland. Meet an underground criminal supply chain, its innocent victims, and an unlikely midwestern IT group with an ingenious way to fight back against the theft of millions of credit-card numbers. If data breaches were not routine by now, this story would be unbelievable. Instead, its a snapshot of life in todays interconnected world, and an unforgettable Internet safety education. IT security has never been so riveting!
A Michael Crichton-like whirlwind story thats very hard to put down once you pick it up. Part mystery, part suspense, part education, part technology, and all entertainment.
Ken Steinhardt, computer scientist and retired former VP, EMC Corporation
A perfect foray into how things can go terribly wwrrroonnggg... And all it took to get started was One Thoughtless .
Winn Schwartau, CEO of The Security Awareness Company and author of Information Warfare and Pearl Harbor Dot Com (Die Hard IV)
After reading the book, I actually have a better idea of how a multi-vector compromise happens, and how the little signs that should have been caught were missed. Hits the nail squarely.
Al Gillen, program VP, Servers and System Software, IDC
Greg Scott is a veteran of the tumultuous IT industry, and the founder of Infrasupport Corporation, with a laser focus on infrastructure and security. In the 1990s, he was a popular columnist for magazines ENT and Enterprise Linux . He currently lives in the Twin Cities with his wife, daughter, and two grandchildren.
Contents
Prologue: Why Yet Another Book on IT Security?
Several years ago, I visited a potential customer and showed her how her business was vulnerable to cyberattacks. But I made a mistakeI used a computer and computer screens to illustrate the threats she faced. It was a short meeting. As I tried to explain subjects such as malware and phishing and open TCP ports and IP addresses and NAT, and the threats she faced, she told me she already had somebody who could reset passwords and showed me the door.
Another time, I met with an executive at a bank who also wanted me to go away. In an effort to show he already had all the security he needed, he confidently handed me a folder with the results from a security study he paid somebody else to do. I looked over the report, and then said, This looks good. They did a good job describing the issues around your website. Wheres the part about your internal network right here at the bank?
His reply was quick. Thanks for coming by. Theres the door and have a nice day.
Another time, I ran a virus scan on the store computer at a small retailer and found hundreds of compromised files. When I tried explaining that sharing her public Wi-Fi service with her private store network was like walking into a closed room full of contagious people, she called her bookkeeper and decided it wasnt worth her time or money to fix it. It was another short meeting.
Ive seen countless scenarios play out in hundreds of organizations over the years and they all have one common attributea decision maker either unable or unwilling to believe IT security issues are relevant.
And after all these years, maybe I finally get it. IT concepts are abstract and business decision makers dont deal in the abstract. They deal in the here and now. Security practitioners need to adjust how we present this stuff.
So this book tells a fictional story, inspired by recent headlines, about a large scale attack. Youll meet some bad guys, the clueless, a few victims, and some good guys who come up with a creative way to fight back.
Take away three real-world lessons:
- Youre right; you probably dont have any secrets anyone cares about. But youre not the target; youre part of the path to the target. Maybe somebody fooled you into running the wrong program and now he or she wants you to pay a ransom to unscramble all your company documents. Or maybe somebody is using you to steal somebody elses secrets. Either way, the fallout will be bad for your business. Just ask Max Rousseau. Or Frank Wright. Or even better, Franks son.
- The Internet criminal industry is well funded, resourceful, and smart. The bad guys have an entire value chain, including raw material suppliers, manufacturers, logistics, and end user customers. Its an arms race and the good guys are outnumbered and outgunned.
- Your security practices have real-world consequences, some of them far beyond your company walls. Read about Regina Lopez, who represents millions of real-world innocent victims ensnared by the poor security practices of one large retailer.
The threats are real and the scenarios presented in this book are adapted from real life. Dont bury your head in the sand and pretend your IT systems are not important just because you dont understand them. The Internet is here to stay and you need to protect the confidentiality, integrity, and availability of your data. The future of your company depends on it.
I hope you enjoy reading this story as much as I enjoyed getting to know the characters and writing it.
One more note to keep me out of hot water: although inspired by real life events, the story in this book is straight out of my imagination. Its fiction. I made it up. All characters appearing in this work are fictitious. Any resemblance to real persons, living or dead, is purely coincidental.
All warfare is based on deception.
Sun Tzu , Chinese strategist (544 - 496 BC)
Cybercrime Seminar
Beneath every inch of the Internet superhighway is a vast sewer system, the underground home of cybercriminals who
Jerry Barkley abruptly paused in the middle of his speech on cybercrime, because he suddenly realized he was the only man in the room not wearing a suit. He gazed across the audience at the Retail Council monthly luncheon tucked in a second floor conference room in the Minneapolis Convention Center. These executives and their staffs represented the entire gamut of retail stores in Minneapolis, from Fortune 500 companies to small businesses. Some wore custom-tailored Italian silks, some wore off-the-rack polyester, but they all wore suits. Jerry didnt feel inferior as much as he just felt out of place. Most of his friends were people in low places, regular folks who valued him for his independent spirit and practical knowledge of computers and networking. They didnt care that he wore tennis shoes and slightly faded khakis. Besides, for this lunchtime talk he wore his very best sweater, the one with all the swirly colors that reminded him of modern art. As far as Jerry was concerned, he was plenty dressed up for the occasion.
Next page