Lessons from Japan Pension System Hack
John Humphreys, CMO and co-founder of managed security service provider Proficio, told us this attack and the recent IRS data breach make it clear that government systems are increasingly at risk of being targeted by cybercriminals who want to steal and monetize personal identity data. In late May, the IRS revealed that fraudsters had accessed the archived federal tax filings of 100,000 taxpayers.
His best advice: “Agencies collecting and storing personal identifying information should review their security systems and controls to address this threat.”
Philip Lieberman, president of cyberdefense firm Lieberman Software, told us the APAC region -- and Japan in particular -- has been a region that has resisted adopting modern security technologies.
“The breach at Sony is typical of a culture that does not recognize the risks they are taking in world of Internet connected systems,” he said. “As a company we see the APAC region as an especially attractive region for criminals to exploit based on their wealth as well as lack of security.”
Bad Anniversary Breaches
We turned to Igor Baikalov, chief scientist at security analytics firm Securonix, to get a broader view of the security incident. He told us it seems like a round of anniversary breaches.
Heartland on Monday celebrated the seventh anniversary of the worst breach in the history of the connected world that took place back in 2008 -- when 130 million credit and debit cards were compromised -- by announcing a new incident that involves payroll information.
On top of that, Japan Pension Service celebrated the eighth anniversary of the pension-records scandal that cost Primer Minister Abe an election in 2007 by announcing this recent computer breach that exposed some 1.25 million files containing personal information.
What We Can Learn
What can we learn from these repeat incidents? Baikalov said past failures didn’t seem to improve future security in either organization.
“Download of infected e-mail, execution of the malicious attachment, account compromise, remote access, and subsequent data exfiltration are the most likely steps in the pension system hack that were either not detected or not connected together into the kill chain of the attack,” Baikalov said.
“Apparently, both antivirus control and data loss prevention failed in this scenario, and there were no user behavior analytics or anomaly detection engine employed that could detect account misuse and suspicious data movement,” he added. “As in the Heartland scenario, sensitive data was not encrypted and can inflict substantial damage if used for identity theft or financial fraud .”