Remote ATM Vulnerability – JACKPOT!

At the BlackHat 2010 USA conference in Las Vegas this week, Barnaby Jack, Director of Security Testing at IOActive, was able to demonstrate remotely gaining control of not one, but two ATM machines that he purchased – causing both of them to empty their cash contents onto the stage.

During the session, entitled “Jackpotting Automated Teller Machines Redux”, Jack described the attack methods available on an ATM, including card skimmers, physical ram-raids, shoulder surfing, safe cutting via frontal attacks, data breaches, and even explosives. The most prevalent attacks on ATMs, however, typically involve the use of card skimmers, or the physical theft of the machines themselves, as these are both physically and technically less challenging. Jack noted that it is rare to see any targeted attacks on the underlying software. But, Jack was about to show the audience something rare.

By design, there is a limited attack surface to exploit on an ATM machine; the card reader, the keypad, the network or dial-up service, or the internal motherboard via USB or SD/CF card slot. There are basically two ways to conduct the attack, either through physically or remote means.

For the physical, ‘walk-up’ attack, one can simply identify the brand of the ATM, search online for the key that opens the outer shell of the ATM (used to expose the internal computer system and safe), and install their customized software (aka, rootkit) via the available SD/CF or USB slots. Bingo! Access is granted. Of course, as the method describes, this requires physical access to the machine that could easily lead to the thief being caught and exposed as one of those dumb criminals seen on TV.

The alternative, a remote attack, gives the attacker complete control of the ATM from a remote location. In order to gain remote access, the attacker must first exploit a vulnerability in the ATM machine’s authorization process located in the remote control software, which happens to be ‘On’ by default for most ATMs, Jack said.

In Jack’s first demonstration of a remote attack, once access has been established through the remote management exploit, Jack then executed an update command which allowed him to install his customized rootkit. After an ATM reboot, and with the rootkit installed, Jack can now query the machine for its network settings and its physical location. Walking over to the compromised machine, and by inserting a custom credit card (or by entering a special key sequence), Jack is granted access to the custom menu he built. From this menu, Jack is able to select any of the menu options available to him, four of which allow him to empty each of the four cash containers. Jack selected one of the containers, and out came the money. Jackpot!

In Jack’s second demonstration, a similar exploit was performed. But in this case, Jack emptied one of the containers remotely – giving the unsuspecting passersby a Jackpot of their own. In this case, the jackpot included IOActive cash, granting the bearer access to an IOActive event to be held later during the conference.

With all of the cash extracted, one might think that remote control over the ATM is no longer valuable. This is so not the case. Jack demonstrated how his customized ATM control software could trace each and every ATM card that is inserted into the ATM, remotely downloading the log file that contained this recorded information, saving it to his laptop. Of course, this information could be sold on the black market.

While there have been a number of ATM breaches, such as in 2008 when several Citibank-branded ATMs located in 7-Eleven convenience stores were compromised to extract account numbers and PINs, Jack’s demonstration certainly brought a sense of Vegas-worthy drama to the problem the ATM manufacturers, clients, and consumers face.

Black Hat 10 - How PayPal Minimizes Risk

Alex Hutton, Principal in Research & Risk Intelligence with Verizon Business, says implementing a GRC program without any measurement is governance and compliance via superstition. Learn why risk management without metrics will hamper your enterprise's governance, risk and compliance efforts. By collecting information from a wide and complete set of systems, organizations can begin to analyze data to uncover trends. This information can also be used to identify patterns, which in turn could be used to assess risk, detect security incidents and suggest the likelihood of a pending attack. With an information-driven risk management program, decisions can be made based on evidence as opposed to speculation.

Read the full article at CIO Insight.

Article by: Sean Martin, CISSP

Information Security - Connecting The Dots

Is there a clear path to end-to-end information security in our future? Cisco's recent announcement of partnerships with security industry vendors is a step in the right direction. It is one of several ways that enterprises can expedite what has been, to date, a time-consuming a la carte processes for choosing information security solutions. This is an important milestone for the information security industry. CIOs & CSOs alike should take note of this collaborative move. Upon a successful delivery of a validated set of integrated systems by Cisco and their supporting partners, CIOs can finally develop a comprehensive information security program that can actually be implemented without vendor-chasing and technology-juggling. By following the solution guidelines and related implementation guides, information chiefs and their staff will be able to connect the dots that are appropriate for their environment, their business, and their operational risk.

It appears we are moving toward a clear path to achieve end-to-end security. Is this a path you'll be looking to take?

Read the full article at CIO Insight.

Article by: Sean Martin, CISSP

One in five managed security service programs fail?

There are many factors involved in making the decision to outsource some or all of your security operations. As with any project, the first step toward being successful is to identify the problem you are trying to solve and tying that to the desired outcome. This initial step does not change - nor get eliminated - simply because there are alternate paths available. Deflecting the problem and giving it to someone else to manage does not let you off the hook. Define the wrong outcome, the wrong plan, or make the wrong decision on which service provider to use, and your organization could find itself alongside the other nearly 20 percent of managed security services programs that fail. The typical causes of failure include improper implementations, a lack of communication, and various cultural differences (country, language, or corporate).

So, should we be surprised that roughly one in five managed security service programs fail?

Read the full article at SC Magazine.

Article by: Sean Martin, CISSP

NHS Laptop Stolen

An NHS laptop holding information on 5,123 patients was stolen from a hospital in Dudley. Sean Martin, CISSP, and vice president of marketing, was not surprised that data leaks are becoming a regular occurrence in the UK and said most companies are "sitting ducks". "Despite the availability of suitable IT security solutions, companies are still not putting the necessary security measures into place. The presence of huge databases, private information stored on personal computers, and the use of mobile devices such as USB keys and laptops, have significantly increased the risks of data leakage,” said Martin.

The trust added that it has invested £135,000 into data security, which includes the roll out of data encryption software onto all its laptops and mobile devices, such as PDAs and memory sticks. However, the recently stolen device was not protected with this software.

Read the full article at Computer World UK.

Article included quotes from: Sean Martin, CISSP

Simmer Down or Boil Over

The pressure to keep expenses and resource costs down continues to build. The risk to our business has not disappeared by any stretch of the imagination. There are external, internal, and socially-driven threats, constant changes to how business is conducted, a multitude of technologies available for securing systems and data, various regulations and laws describing how to protect systems and data, and never-ending audits to ensure that some level of action is being taken – all flying at us from every angle at break-neck speeds.

How and where does an organization begin to secure their systems and data? What does success look like; how can it accurately and confidently state that it conducts its business securely? More importantly -- what’s the risk for it not knowing either end of this spectrum?

Read the full article at Computer Technology Review.

Article by: Sean Martin, CISSP

Thumb Drives, Thumbs Down?

Ought thumb drives be given the thumbs down? Today's small, portable USB thumb drives can store significant amounts of data and be easily slipped into a pocket without anyone noticing, and the question may answer itself. This makes it possible for someone to copy data from a network, walk out the company door, and transfer the same data onto another PC. If that data happens to be valuable company information that makes its way into the hands of a competitor, your company could be in serious trouble. The same applies when someone simply loses the device. Either way, you put your company at risk by allowing employees to access data through USB ports on your company network.

Read the full article at IT World.

Article by: Sean Martin, CISSP

New Economy, New Corruption?

While companies struggle to hang on to their business and are watching very closely their bottom line, what do they think their employees are doing? Chances are, the same thing; only on a personal level, and quite possibly, with little regard for their employer.

Of course, some companies do have some security measures in place to account for this potential risk of data theft –- but not all companies. And, not all companies keep tabs on what is actually happening. Oftentimes, companies take a passive and somewhat understandably trusting position for their security technologies, adopting the blind faith that the product is doing what they think it was set to do.

Read the full article at SC Magazine.

Article by: Sean Martin, CISSP

Data Security Avoidance = Big Trouble

Data leakage cases have stirred discussions surrounding personal liability and harsh penalties. Up until recently, avoidance of the problem may have been the only real option given the effectiveness of solutions available and the lack of consequences associated with failure to take action. With the significant increase in laptop loss and data theft incidents that have resulted in the compromise of private client data, the endpoint has easily taken the title of being the “weakest link” in protecting an organizations’ sensitive data.

This article is NO LONGER AVAILABLE at Windows in Financial Services. Click the image below to preview and download a copy.

Article by: Don Canning with contributions from Sean Martin, CISSP

Who was "most innovative" at RSA?

A group of security start-ups from around the world shared their cutting-edge technologies during the "Most Innovative Company at RSA Conference 2010" contest.A top-10 group of security start-ups from around the world joined in serious, yet friendly, competition as they shared their cutting-edge technologies on Monday with hundreds of RSA attendees in hopes of winning the "Most Innovative Company at RSA Conference 2010" contest as part of the event's annual Innovation Sandbox session.

See all the finalists in the full article at SC Magazine.

Article by: Sean Martin, CISSP