<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Breach Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/breach/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/breach/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 01 Aug 2024 14:54:35 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Breach Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/breach/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 056 Credential Stuffing</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-056-credential-stuffing/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 27 Nov 2020 02:15:01 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Account Compromise]]></category>
		<category><![CDATA[Account Takeover]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Credential Stuffing]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[HaveIBeenPwned]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Password Reuse]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Unique Password]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2388</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 56. This week we&#8217;re going to talk about credential stuffing. Where is this coming from? I have introduced the www.HaveIBeenPwned.com service to a number of people recently. They have gone on to the website. They have typed in their email addresses and in some cases they have found that they have&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-056-credential-stuffing/">#WeekendWisdom 056 Credential Stuffing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 56. This week we&#8217;re going to talk about credential stuffing.<span id="more-2388"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2388-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/11/WeekendWisdom-056-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/11/WeekendWisdom-056-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/11/WeekendWisdom-056-lo.mp4</a></video></div>
<h3>Where is this coming from?</h3>
<p>I have introduced the <a href="https://www.haveibeenpwned.com" target="_blank" rel="noopener noreferrer">www.HaveIBeenPwned.com</a> service to a number of people recently. They have gone on to the website. They have typed in their email addresses and in some cases they have found that they have been included in data breaches. When they&#8217;ve gone to look and see what was breached, in a number of cases they had at least their email address and password for that service were included in the data breach.</p>
<p><em>Also check out previous <a href="https://www.l2cybersecurity.com/weekendwisdom-014-have-you-been-in-a-data-breach/" target="_blank" rel="noopener noreferrer">#WeekendWisdom 014</a>, <a href="https://www.l2cybersecurity.com/weekendwisdom-015-do-you-have-a-unique-password/" target="_blank" rel="noopener noreferrer">#WeekendWisdom 015</a> and <a href="https://www.l2cybersecurity.com/weekendwisdom-016-password-best-practices/" target="_blank" rel="noopener noreferrer">#WeekendWisdom 016</a>.</em></p>
<h3>Data breaches are bad. What should they do?</h3>
<p>So they asked me &#8220;What should I do?&#8221;. The first thing of course is always, they must change their password on that service or site or whatever it was that was breached. Then I ask &#8220;Do you use that password anywhere else?&#8221; And they say &#8220;Yeah. I use it on multiple sites&#8221; or &#8220;It&#8217;s my favourite password. I use it everywhere.&#8221;</p>
<p>So I said &#8220;Well you&#8217;re going to have to change that password on all of these other platforms.&#8221;</p>
<p>They say &#8220;That&#8217;s going to be an awful lot of effort. Why should I worry?&#8221;</p>
<h3>Why did you call this post Credential Stuffing?</h3>
<p>You worry because of a thing called Credential Stuffing. What happens is that the bad guys, they take these data breaches, say from LinkedIn back in 2012. They take those email addresses and passwords that they have cracked and they try to sign into Facebook, into Twitter, into Microsoft 365, into Google G Suite, into Gmail and many, many other services. The criminals will try all of these things automatically.</p>
<p>They are stuffing credentials into services to be able to try and break in. That is what credential stuffing is all about. That is why you should not use the same password across multiple platforms and services.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-056-credential-stuffing/">#WeekendWisdom 056 Credential Stuffing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/11/WeekendWisdom-056-lo.mp4" length="29665510" type="video/mp4" />

			</item>
		<item>
		<title>Review of my 2018 predictions.</title>
		<link>https://www.l2cybersecurity.com/review-2018-predictions/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 31 Dec 2018 09:28:41 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[2018]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Predictions]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1533</guid>

					<description><![CDATA[<p>I continue not to see many people who make predictions for the coming year actually come back to review what they predicted. As I showed last year, I’m not one of those, so here is my review. I’ve included the original text below in blue, but the full article for my 2018 predictions is here. &#160; &#160;&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/review-2018-predictions/">Review of my 2018 predictions.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1053" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/crystal_ball-2018-300-150x150.png" alt="will 2018 bring" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/12/crystal_ball-2018-300-150x150.png 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/12/crystal_ball-2018-300.png 300w" sizes="(max-width: 150px) 100vw, 150px" />I continue not to see many people who make predictions for the coming year actually come back to review what they predicted. As I showed last year, I’m not one of those, so here is my review. I’ve included the original text below in blue, but the full article for my 2018 predictions is <a href="https://www.l2cybersecurity.com/will-2018-bring/" target="_blank" rel="noopener">here</a>.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><span id="more-1533"></span></p>
<h3>1. There will be another large scale incident on a similar scale to WannaCry</h3>
<p><span style="color: #0000ff;">Every year there are really large attacks using different methods to cause problems. In 2016 we saw huge floods of data <a style="color: #0000ff;" href="https://www.l2cybersecurity.com/details-emerge-of-huge-internet-attack/">attacking online services</a>. This flood was caused by poorly secured internet connected security cameras. 2017 saw Ransomware worms in <a style="color: #0000ff;" href="https://www.l2cybersecurity.com/wannacry-no-more/">WannaCry</a> and <a style="color: #0000ff;" href="https://www.l2cybersecurity.com/latest-ransomware-outbreak-petya/">Petya/NotPetya</a>. The latter of these was quite ingenious in the way it worked, as it used different methods to move around networks, once it successfully infected a machine. I’m going to guess that we’ll see something of similar complexity being used, perhaps in a more targeted way – possibly by way of altering a widely used <a style="color: #0000ff;" href="https://www.l2cybersecurity.com/draughty-backdoor-popular-application/">application’s source code</a> and lying dormant until activated.</span></p>
<p>There was one huge, record breaking event, but it didn&#8217;t feature in most of the global news as it affected a US based service provider. It was a large distributed denial of service attack, which <a href="https://www.l2cybersecurity.com/overwhelming-attack-sets-new-record/" target="_blank" rel="noopener">I reported here</a>. Earlier in the year, there was a situation where websites that used <a href="https://www.l2cybersecurity.com/websites-compromised-generate-money/" target="_blank" rel="noopener">a certain popular plug-in</a> were &#8220;mining&#8221; virtual currency for the bad guys. In September, there was number of well known websites, <a href="https://www.l2cybersecurity.com/vulnerable-shopping-carts-lead-to-credit-card-breaches/" target="_blank" rel="noopener">like Ticket Master and British Airways</a>, who had their payment pages compromised. People who used those sites had their credit card information stolen.</p>
<p>I&#8217;ll take a partial on this, as the stories above didn&#8217;t have the same kind of media frenzy or global awareness as previous incidents.</p>
<h3>2. Past Data Breaches will impact victims financially on a large scale</h3>
<p><span style="color: #0000ff;">With so many data breaches occurring throughout 2017 (and for years earlier), there is a huge amount of useful and usable data that the evil doers can, if they used some <a style="color: #0000ff;" href="https://en.wikipedia.org/wiki/Big_data">big-data methodologies</a>, mine to extract and target individuals and hit them financially. It’s not credit card numbers I’d be worried about, as the issuers are fairly good at catching fraud and protecting the card holder. It’s all of the other information that could be used to craft a very convincing e-mail/letter/WhatsApp message that will cause the victim to send money to the bad guys.</span></p>
<p>I reckon I got this one. Old passwords that were breached a long time ago (possibly from the 2012 LinkedIn breach), were used to make a <a href="https://www.l2cybersecurity.com/a-sextortion-scam/" target="_blank" rel="noopener">sextortion e-mail</a> appear more credible and a lot of people fell for it. According to <a href="https://cryptoblockwire.com/sextortion-scam-500000-bitcoin-btc/" target="_blank" rel="noopener">some reports</a>, 1,000 people paid approximately $500,000. An <a href="https://isc.sans.edu/forums/diary/Sextortion+Follow+the+Money/23922" target="_blank" rel="noopener">earlier analysis</a> of the payments showed that some people paid up to $4,900, with the average being $1,900.</p>
<h3>3. GDPR will cause a big Facebook-type company to be fined</h3>
<p><span style="color: #0000ff;">I suspect there are individuals out there waiting in the long grass for May 25th 2018 to roll around so they can launch all manner of <a style="color: #0000ff;" href="https://www.l2cybersecurity.com/gdpr-glossary/#subjectaccessrequest">subject access requests</a> on various companies and government departments that they don’t like. Just to be a nuisance. I do, however, expect that some large global corporation, that has a lot of personal data on a huge number of people, will end up being investigated and, either in 2018 or 2019, be levied a massive, multi-million Euro fine. But they will fight back and hold up the imposition of the fine for a number of years. They may even expose flaws in the GDPR legislation.</span></p>
<p>The cases are still under investigation, so I&#8217;ll take a partial on this, but it&#8217;s not a Facebook-type company that is going to be fined, but Facebook themselves. They currently have <a href="https://www.dataprotection.ie/en/news-media/press-releases/data-protection-commission-announces-statutory-inquiry-facebook" target="_blank" rel="noopener">multiple post-GDPR investigations underway</a> with the Data Protection Commission.</p>
<h3>4. Crypto-currency hack</h3>
<p><span style="color: #0000ff;">If BitCoin is still a valuable thing in 2018 (and hasn’t crashed and burned), I expect the evil doers will be doing their best to hack the BitCoin block chain in order to steal some of that sweet, sweet virtual currency.</span></p>
<p>This was a miss. I&#8217;ve not heard of any successful block chain hacks and BitCoin&#8217;s value has fallen so low, it&#8217;s probably not worth the effort to attempt to hack it any more.</p>
<h3>5. Data breaches will see a massive increase in reporting in Ireland</h3>
<p><span style="color: #0000ff;">While there have been data breaches reported in Ireland, they are few and far between. However, I fully expect that the requirement to report data breaches to the Data Protection Commissioner under the GDPR, will cause an increase in the reports of data breaches occurring. I have a useful <a style="color: #0000ff;" href="https://www.youtube.com/watch?v=w8CAmzboqxg">short video here</a> showing that there are many different types of data breach that might need to be reported.</span></p>
<p>This was a kinda easy one to predict. In 2017, there were on average 230 data breaches reported to the Data Protection Commissioner each month. Two months after the GDPR had been implemented, the Data Protection Commission (as it is now known) had received <a href="https://www.irishtimes.com/business/technology/dpc-receives-over-1-100-reports-of-data-breaches-since-start-of-gdpr-rules-1.3580240" target="_blank" rel="noopener">nearly 600 data breach notifications</a> per month.</p>
<h3>Results for my 2018 predictions</h3>
<p>2 correct, 2 partials and 1 incorrect. Not too bad.</p>
<p>I don&#8217;t plan on doing this again next year. However, if enough people ask me to do so, then I&#8217;ll reconsider. Send me an e-mail at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener">info@L2CyberSecurity.com</a> and let me know if you want to see a 2019 set of predictions.</p>
<p>Wishing you and yours a safe and secure 2019.</p>
<p>Lets be careful out there.</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/review-2018-predictions/">Review of my 2018 predictions.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Data Breaches Everywhere</title>
		<link>https://www.l2cybersecurity.com/data-breaches-everywhere/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 05 Dec 2018 16:30:02 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Amazon]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Marriott]]></category>
		<category><![CDATA[Quora]]></category>
		<category><![CDATA[VisionDirect]]></category>
		<category><![CDATA[Yahoo]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1482</guid>

					<description><![CDATA[<p>It&#8217;s beginning to look a lot like Christmas &#8230; has come early for the evil doers. There just seems to be a relentless tale of data breach after data breach in recent weeks and it has been really bad in the last week. It really does look there&#8217;s data breaches everywhere you look. The worry about&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/data-breaches-everywhere/">Data Breaches Everywhere</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1497" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Data_Breaches_Everywhere-1-150x150.jpg" alt="data breaches everywhere" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Data_Breaches_Everywhere-1-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Data_Breaches_Everywhere-1.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />It&#8217;s beginning to look a lot like Christmas &#8230; has come early for the evil doers. There just seems to be a relentless tale of data breach after data breach in recent weeks and it has been really bad in the last week. <span id="more-1482"></span>It really does look there&#8217;s data breaches everywhere you look. The worry about this, is that people may just think that this is the new normal and put up with it.</p>
<p><strong>Updated 05/12/18:</strong> To include the Dell, potential breach.</p>
<p>Last Wednesday, Dell announced a potential cybersecurity incident. This was followed on Friday when it was revealed that Marriott International Hotels had a massive 500m  records stolen. These were all forgotten by Monday for most normal people and then later on Monday Quora, an online question and answer forum had 100m records stolen. A couple of weeks ago, Amazon notified an unknown number of customers that their name and e-mail address were exposed. Earlier in the month, VisionDirect in the UK had lost payment card data for an undisclosed number of customers.</p>
<p>That&#8217;s just 5 companies that you probably <span style="text-decoration: underline;"><strong>have</strong></span> heard of. I covered the <a href="https://www.l2cybersecurity.com/nui-galway-data-breach-lessons-learned/" target="_blank" rel="noopener">NUI Galway breach</a> separately a couple of weeks ago. There were lots <a href="https://www.itgovernance.co.uk/blog/list-of-data-breaches-and-cyber-attacks-in-november-2018-251-286753-records-leaked" target="_blank" rel="noopener">more breached last month</a>. I&#8217;ll give a synopsis on each one of the five and then discuss what can happen.</p>
<h3>Quora have some questions to answer</h3>
<p>So <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Quora-Security-Update-2018-12-03.pdf" target="_blank" rel="noopener">Quora had ~100m records accessed</a> by persons unknown. They detected the issue on Friday 30th November and on Monday 3rd December they endeavoured to contain the issue. They logged out the impacted individuals and forced them to reset their passwords when they log back in. What was taken by the bad guys?</p>
<ul>
<li>
<blockquote><p>Account information, e.g. name, email address, encrypted (hashed) password, data imported from linked networks when authorized by users</p></blockquote>
</li>
<li>
<blockquote><p>Public content and actions, e.g. questions, answers, comments, upvotes</p></blockquote>
</li>
<li>
<blockquote><p>Non-public content and actions, e.g. answer requests, downvotes, direct messages</p></blockquote>
</li>
</ul>
<p>They claim not many subscribers used the direct messages features, so really the most important items lost here was the account information.</p>
<h3>Marriott reserve second place in the data breach tables</h3>
<p>I actually missed this <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Marriott-Announces-Starwood-Guest-Reservation-Database-Security-Incident-2018-11-30.pdf" target="_blank" rel="noopener">story on Friday the 30th November</a>, as I had promised a customer a security assessment report by the end of the week. So I stayed off social media for the day, while I completed it. There were a LOT of tweets to get through that night! ? This is currently the second biggest data breach in history after Yahoo!&#8217;s almost impossible to match <a href="https://www.l2cybersecurity.com/yahoo-breach-round-3/" target="_blank" rel="noopener">record breaking 3 billion accounts breach</a> as revealed in October 2017. So what did Marriott lose? The contents of the Starwood guest reservation database, going back as far as 2014, containing:</p>
<ul>
<li>
<blockquote><p>For approximately 327 million of these guests, the information includes some combination of name, mailing address, phone number, email address, passport number, Starwood Preferred Guest (“SPG”) account information, date of birth, gender, arrival and departure information, reservation date, and communication preferences.</p></blockquote>
</li>
<li>
<blockquote><p>For some, the information also includes payment card numbers and payment card expiration dates, but the payment card numbers were encrypted using Advanced Encryption Standard encryption (AES-128).  There are two components needed to decrypt the payment card numbers, and at this point, Marriott has not been able to rule out the possibility that both were taken.</p></blockquote>
</li>
<li>
<blockquote><p>For the remaining guests, the information was limited to name and sometimes other data such as mailing address, email address, or other information.</p></blockquote>
</li>
</ul>
<p>Some of the data lost is genuinely concerning. Particularly the payment card information.</p>
<h3>Bad guys try to ding dong Dell</h3>
<p>This may or may not have been a breach. <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Dell-Announces-Potential-Cybersecurity-Incident-2018-11-28.pdf" target="_blank" rel="noopener">Dell haven&#8217;t given away too much information</a>. Their security measures detected unauthorised activity that was &#8230;</p>
<blockquote><p>&#8230; attempting to extract Dell.com customer information, which was limited to names, email addresses and hashed passwords.</p></blockquote>
<p>Dell couldn&#8217;t say at this point whether these details were actually extracted from their systems by the bad guys. But even if they were unsuccessful in taking data, this just demonstrates that even massive companies like Dell can be broken into. Massive companies like &#8230; ⬇⬇⬇</p>
<h3>Prime example of poor communication from Amazon</h3>
<p>The <a href="https://www.theregister.co.uk/2018/11/21/amazon_data_breach/" target="_blank" rel="noopener">Amazon data breach</a> on 21st November doesn&#8217;t seem too bad. All that might have been compromised was name and e-mail address. However their notification to affected customers was pretty poor.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-1483 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/amazon_breach_email.png" alt="amazon breach email" width="648" height="296" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/amazon_breach_email.png 648w, https://www.l2cybersecurity.com/wp-content/uploads/2018/12/amazon_breach_email-300x137.png 300w" sizes="(max-width: 648px) 100vw, 648px" /></p>
<p>A lot of security professionals have said that this looks very &#8220;scammy&#8221;. While I would tend to agree as it&#8217;s very light on any details, there&#8217;s no suggestion that the recipient should take some urgent action. If that had been the case, I would fully agree.</p>
<h3>Is there short-sighted security in place at VisionDirect?</h3>
<p>Back on the 19th November, VisionDirect in the UK <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/12/Customer-data-theft-_-Vision-Direct-UK-2018-11-03.pdf" target="_blank" rel="noopener">issued a statement</a> about a data breach. The breach affected customers who updated their details or placed orders between the 3rd November and 8th November. What data was accessed by the evil doers?</p>
<blockquote><p>The personal information was compromised when it was being entered into the site and includes full name, billing address, email address, password, telephone number and payment card information, including card number, expiry date and CVV.</p></blockquote>
<p>In fairness to them, they were very specific about the timeframe when the website was compromised. &#8220;Between 12.11am GMT 3rd November 2018 and 12.52pm GMT 8th November 2018.&#8221; This was repeated ad nauseam.</p>
<h3>What can happen when there are data breaches everywhere?</h3>
<p>A common feature of all the above breaches are names and email addresses. While you might not think these are worth anything, 50,000 valid email addresses can be sold for up to $50 on criminal exchanges on the &#8220;dark web&#8221;. I hate that term by the way. It&#8217;s so &#8220;hackery&#8221;. Anyway, your email address has a small, but material value.</p>
<p>Payment card data is the next thing that is of immediate value, particularly where the bad guys have the CVV/3 digit security number. These can be immediately put to work purchasing vouchers which are then immediately spent. The card numbers are also valuable on their own and sell for up to $60 each. While Marriott had the credit card numbers encrypted, they were not sure if the required information to decrypt them again was also exposed. So I would assume that it was.</p>
<p>Passwords are the next concern. Quora had &#8220;hashed&#8221; passwords which is good. These are hard (but not impossible) to crack. They also forced a password reset on affected subscribers, so that&#8217;s another mitigation. With VisionDirect, the password was totally compromised. This is because it was captured when a user was signing on to the site. They forced password changes on people who were impacted. However, if the password is used on ANY other account, particularly email, banking and social media, then you must change them all.</p>
<p>The rest of the data that was breached is still incredibly useful to the criminals. In particular from the Marriott breach. They have reservation details, probably into the future. So they know the future likely movements of people. They have loyalty card information, which, along with other data points, can be used to compromise a person&#8217;s Starwood&#8217;s Preferred Guest account and re-direct the rewards elsewhere.</p>
<p>The amount of data leaked, over such a long time at Marriott is pretty bad. This can be merged with lots of other data breaches and the evil doers can build quite a profile on each individual. I&#8217;ve discussed before how <a href="https://www.l2cybersecurity.com/data-breaches-what-risk/" target="_blank" rel="noopener">breached data from multiple sources</a> can be put to evil use.</p>
<p>Data breaches everywhere indeed.</p>
<h3>How can we help?</h3>
<p>As the saying goes, preparation is half the battle. If you&#8217;ve not prepared to handle a data breach, it will be a much bigger struggle. We can help you prepare, both for a breach and handling the aftermath.</p>
<p>If you want to discuss further, please call on <span style="color: #0000ff;"><strong>087-436-2675</strong></span> or send an e-mail to <strong><a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener">info@L2CyberSecurity.com</a></strong> and somebody will get in touch. We will make it straightforward and easy for you to be ready for an incident.</p>
<p>Lets be careful out there.</p>
<p>#SecuritySimplified</p>
<p>#GDPR #SimpleGDPR</p>
<p>The post <a href="https://www.l2cybersecurity.com/data-breaches-everywhere/">Data Breaches Everywhere</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NUI Galway Data Breach &#8211; Lessons learned?</title>
		<link>https://www.l2cybersecurity.com/nui-galway-data-breach-lessons-learned/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 21 Nov 2018 10:16:35 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[DPC]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[USB]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1451</guid>

					<description><![CDATA[<p>The NUI Galway data breach that was revealed this week is concerning. Particularly the initial reports about the breach, which weren&#8217;t very clear. If you hadn&#8217;t already heard, a USB memory stick was mislaid. This memory stick may have had personal data on 5% of the student population. This 5% of an 18,000 student population&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/nui-galway-data-breach-lessons-learned/">NUI Galway Data Breach &#8211; Lessons learned?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1456" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/11/nui-galway-data-breach-150x150.jpg" alt="nui galway data breach" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/11/nui-galway-data-breach-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/11/nui-galway-data-breach.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />The NUI Galway data breach that was revealed this week is concerning. Particularly the initial reports about the breach, which weren&#8217;t very clear. <span id="more-1451"></span>If you hadn&#8217;t already heard, a USB memory stick was mislaid. This memory stick <em><strong>may</strong></em> have had personal data on 5% of the student population. This 5% of an 18,000 student population gives us approximately 900 individuals being impacted by this breach. That personal data <em><strong>may</strong></em> have included exam results, as reported <a href="https://www.independent.ie/irish-news/news/university-at-centre-of-potential-data-breach-after-usb-stick-goes-missing-37542617.html" target="_blank" rel="noopener">by the Irish Independent</a>.</p>
<blockquote><p>While the University is unclear on the contents of the portable device, it may have held a file containing names of approximately 5% of the student body, their student number and exam results.</p></blockquote>
<p>It&#8217;s the uncertainty that is most worrying to me. Also their claim that they have strict policies in place relating to portable devices is a bit disingenuous. I&#8217;ve been through <a href="http://www.nuigalway.ie/about-us/office-secretary/policies-procedures/" target="_blank" rel="noopener">the policies</a> and also looked at their <a href="http://www.nuigalway.ie/data-protection/" target="_blank" rel="noopener">data protection section</a> and found some conflicting direction with regard to data handling and USB memory sticks.</p>
<p>The <a href="http://www.nuigalway.ie/media/oifiganrunai/files/QA401-Data-Handling.pdf" target="_blank" rel="noopener">Data Handling Policy</a> states the following about &#8220;NUI Galway Highly Restricted&#8221; data:</p>
<blockquote><p>Storage of this data outside of the source system, for example on a laptop or memory stick; must be approved by the data owner. Where data is held outside the source system it must be encrypted.</p></blockquote>
<p>That seems quite sensible, as approval would mean that somebody would know exactly what data is on there and it would then be encrypted. However their <a href="http://www.nuigalway.ie/media/informationsolutionsservices/files/ictpolicies/QA409_encryption-policy.pdf" target="_blank" rel="noopener">Encryption policy</a>, has something else to say on USB memory sticks:</p>
<blockquote><p>Portable storage capability such as DVD’s, CD’s and USB flash drives should not be utilised for classified data storage or transfer, even in an encrypted format.</p></blockquote>
<p>So the handling policy says it&#8217;s fine, but the encryption policy says no. It&#8217;s obvious that the data handling policy wasn&#8217;t followed with this data breach.</p>
<p>I thought it interesting that they have plenty on their site for how to use USB memory sticks and the <a href="http://www.nuigalway.ie/information-solutions-services/servicesforstaff/pcsuites/usbstorage/" target="_blank" rel="noopener">protections they have in place</a>.</p>
<blockquote><p>ISS have <strong>disabled Autorun</strong> on the all computers in the PC Suites as a precautionary measure to prevent the spread of viruses.  When autorun is disabled, a USB memory stick or software on a CD or DVD will no longer automatically start when inserted.</p></blockquote>
<p>So that&#8217;s great &#8230; lots of protection there &#8230; or maybe not. What if the USB device impersonated a keyboard? It could inject keystrokes that open up a command line, execute a command to download dodgy software and execute it. <a href="https://www.howtogeek.com/203061/don%E2%80%99t-panic-but-all-usb-devices-have-a-massive-security-problem/" target="_blank" rel="noopener">I&#8217;m not making this up</a>. The USB stick could also fry the electronics on your computer. Again <a href="https://www.l2cybersecurity.com/usb-machine-killer/" target="_blank" rel="noopener">this is something that happens</a>.</p>
<p>These USB memory sticks are such a problem from a data breach perspective that I always recommend companies and organisations to either block them completely or put in place a solution that automatically encrypts all data on them.</p>
<p>I did dedicate <a href="https://www.l2cybersecurity.com/ix-never-insert-a-strange-usb-memory-stick/" target="_blank" rel="noopener">an entire commandment</a> to USB memory sticks. So you can get my deeply held views in there.</p>
<p>The NUI Galway data breach was an embarrassment for the University. I don&#8217;t think the exam results could be classified as sensitive personal data (special category). But I&#8217;m sure students wouldn&#8217;t like these been released publicly. As long as the powers that be learn a lesson from this sorry situation and implement more rigorous technical solutions, then it will hopefully prevent future, larger and more sanction-worthy breaches.</p>
<p>Lets be careful out there.</p>
<p>#SecuritySimplified #GDPR #SimpleGDPR</p>
<p>The post <a href="https://www.l2cybersecurity.com/nui-galway-data-breach-lessons-learned/">NUI Galway Data Breach &#8211; Lessons learned?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>GDPR hasn&#8217;t gone away.</title>
		<link>https://www.l2cybersecurity.com/gdpr-hasnt-gone-away/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 18 Oct 2018 13:17:21 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[DPC]]></category>
		<category><![CDATA[Fines]]></category>
		<category><![CDATA[GDPR]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1434</guid>

					<description><![CDATA[<p>Something I&#8217;ve noticed since the summer holidays came to an end, interest in GDPR related training and discussions have dropped away. I&#8217;ve asked around why this might be. The most common type of response is &#8220;Sure that GDPR thing was a pile of scare mongering. Nothing has happened. It&#8217;s like that Y2K nonsense we had&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gdpr-hasnt-gone-away/">GDPR hasn&#8217;t gone away.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-large wp-image-1437" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/10/GDPR-hasnt-gone-away-2-364x1024.jpg" alt="GDPR hasn't gone away" width="364" height="1024" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/10/GDPR-hasnt-gone-away-2-364x1024.jpg 364w, https://www.l2cybersecurity.com/wp-content/uploads/2018/10/GDPR-hasnt-gone-away-2-107x300.jpg 107w, https://www.l2cybersecurity.com/wp-content/uploads/2018/10/GDPR-hasnt-gone-away-2.jpg 500w" sizes="auto, (max-width: 364px) 100vw, 364px" />Something I&#8217;ve noticed since the summer holidays came to an end, interest in GDPR related training and discussions have dropped away. I&#8217;ve asked around why this might be. The most common type of response is &#8220;Sure that GDPR thing was a pile of scare mongering. Nothing has happened. It&#8217;s like that Y2K nonsense we had a few years back&#8221;. <span id="more-1434"></span>I keep having to remind people that the GDPR hasn&#8217;t gone away. The law went into force on the 25th of May. If there are going to be any investigations, leading to prosecutions and fines, these will take a little bit of time to come to a conclusion. I think we will start hearing about some of these before the end of the year in Ireland.</p>
<h3>The first GDPR fine has been issued</h3>
<p>The first GDPR fine in Europe has just <a href="http://digital.freshfields.com/post/102f39w/first-gdpr-fine-issued-by-austrian-data-protection-regulator" target="_blank" rel="noopener">been issued in Austria</a>. Their data protection authority (DSB) has fined the owner of a business €4,800 for having a CCTV camera that was monitoring too large an area of the public footpath outside the premises. Large scale monitoring of public places is not permitted for private individuals or businesses under GDPR. There was also inadequate signage for the camera. Anybody who comes to my training gets told that sign makers will be making fortunes out of the GDPR.</p>
<p>What was also notable in that report, is that there are 36 post-GDPR fine proceedings pending with the DSB. So to reiterate &#8211; The GDPR hasn&#8217;t gone away you know.</p>
<h3>And the GDPR hasn&#8217;t gone away in Ireland either</h3>
<p>We know that the Data Protection Commission (DPC) have a number of investigations underway. Most publicly is the <a href="https://www.l2cybersecurity.com/facebook-breach-dpc-public/" target="_blank" rel="noopener">Facebook data breach</a>. That has only just happened, so don&#8217;t expect to hear much on that until sometime next year probably. But there are a number of other investigations with prosecutions pending with the DPC <span style="text-decoration: underline;"><strong>right now</strong></span>. Once these come to light, I think we shall see an increase in interest from businesses wanting to get compliant.</p>
<h3>Quick update on a previous story</h3>
<p>A quick update on a previous data breach story. This is the USB stick that got mislaid from <a href="https://www.l2cybersecurity.com/heathrows-dangerous-data-breach/" target="_blank" rel="noopener">Heathrow Airport</a> in October 2017. The UK&#8217;s Information Commissioners Office (ICO) has just <a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2018/10/heathrow-airport-limited-fined-120-000-for-serious-failings-in-its-data-protection-practices/" target="_blank" rel="noopener">hit Heathrow Airport with a £120,000 fine</a> for that breach. Now the amount of personal data on that stick was limited enough. However the ICO decided to hit harshly due to poor corporate standards and staff training which led to the breach. This fine was brought under the old legislation, pre-GDPR. The maximum fine available under that law was £500,000. As the GDPR puts much more responsibility on companies to protect personal data, if they were to have the same thing happen now, they would get a much larger fine.</p>
<p>If there&#8217;s one take away from all of this &#8211; the GDPR hasn&#8217;t gone away. ? If you want to find out the type of training that I deliver, I&#8217;ve got my normal <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/04/GDPR-Training.pdf" target="_blank" rel="noopener">GDPR Awareness training</a> and my <span style="color: #ff0000;"><strong>***ALL NEW***</strong></span> <a href="https://www.l2cybersecurity.com/wp-content/uploads/2018/10/GDPR-Practical-Training.pdf" target="_blank" rel="noopener">GDPR Practical training</a> is now available. Get in touch on info@L2CyberSecurity.com or call 087-436-2675 to discuss further.</p>
<p>The post <a href="https://www.l2cybersecurity.com/gdpr-hasnt-gone-away/">GDPR hasn&#8217;t gone away.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Vulnerable Shopping Carts lead to Credit Card breaches</title>
		<link>https://www.l2cybersecurity.com/vulnerable-shopping-carts-lead-to-credit-card-breaches/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 21 Sep 2018 10:49:25 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Magecart]]></category>
		<category><![CDATA[Plugins]]></category>
		<category><![CDATA[Scam]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1402</guid>

					<description><![CDATA[<p>You may have heard about the Ticketmaster data breach earlier this summer. You probably also have heard about the British Airways data breach at the start of this month. A new breach at another large online marketplace using the same technique shows that vulnerable shopping carts are being exploited more and more. If you operate some kind of&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/vulnerable-shopping-carts-lead-to-credit-card-breaches/">Vulnerable Shopping Carts lead to Credit Card breaches</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1403" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/shopping-thief-2-150x150.jpg" alt="Vulnerable Shopping Carts" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/shopping-thief-2-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/09/shopping-thief-2.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />You may have heard about the <a href="https://www.rte.ie/news/2018/0627/973682-ticket-master-data/">Ticketmaster data breach</a> earlier this summer. You probably also have heard about the <a href="https://www.theguardian.com/business/2018/sep/07/british-airways-data-breach-what-to-do-if-you-have-been-affected">British Airways data breach</a> at the start of this month. A new breach at another large online marketplace using the same technique shows that vulnerable shopping carts are being exploited more and more.<span id="more-1402"></span> If you operate some kind of eCommerce site, where you have a checkout that collects credit card details for orders, then you need to check if you have been potentially compromised.</p>
<h3>What caused these vulnerable shopping carts?</h3>
<p>Basically the bad guys are sneaking in via plugins to the websites. It was very similar to how crypto-currency mining code <a href="https://www.l2cybersecurity.com/websites-compromised-generate-money/">infiltrated UK government websites</a> earlier this year. In the case of the vulnerable shopping carts of Newegg, they plugged their nasty code into the &#8220;Feedify&#8221; plugin. This plugin is used to gather feedback from customers.</p>
<p>So when a customer browsed to the Newegg site, the webserver loads up the website. It then goes and brings in the code from the plugins. The Feedify plugin that was compromised gets loaded and the malicious code starts monitoring. It&#8217;s waiting for credit card information to be typed in. Once it gets that, it sends it off to the evil doers, a hacking group called <a href="https://www.riskiq.com/blog/labs/magecart-british-airways-breach/">Magecart</a>. This code was used to compromise the &#8220;Inbenta&#8221; customer service plugin with Ticketmaster and the &#8220;Modernizr&#8221; plugin for BA.</p>
<h3>So how can I protect my website from this?</h3>
<p>Well, you&#8217;ll need your web-person to do a couple of things.</p>
<ol>
<li>Define a Content Security Policy (CSP) for your website</li>
<li>Set-up Sub Resource Integrity (SRI) verification of your website plug-ins</li>
</ol>
<p>CSP will basically state the trusted locations that your website can load plugins from, so make sure these are set for your own site and that of your payment provider.</p>
<p>SRI is where you generate a &#8220;hash&#8221; (a unique code based on the content of an item) for your plugins when you create the site. When the plugin gets loaded by the browser of a customer, the plugin gets re-hashed and if the value does not match the original hash, then it has been altered.</p>
<p>You can get more details on CSP and SRI from <a href="https://scotthelme.co.uk/hardening-payment-forms-with-csp/">Scott Helme&#8217;s blog</a>.</p>
<p>In the meantime, #LetsBeCarefulOutThere.</p>
<p>#SecuritySimplified</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/vulnerable-shopping-carts-lead-to-credit-card-breaches/">Vulnerable Shopping Carts lead to Credit Card breaches</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Dodgy extensions and not a builder in sight.</title>
		<link>https://www.l2cybersecurity.com/dodgy-extensions-no-builder-seen/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 06 Sep 2018 12:05:51 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Scam]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1385</guid>

					<description><![CDATA[<p>A lot of normal people might think about the phrase &#8220;dodgy extensions&#8221; and associate it with some kind of cowboy builder. But alas, the dodgy extensions to which I refer are in a web browser and these could lead you to a data breach or worse. This has come to light recently when a browser&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/dodgy-extensions-no-builder-seen/">Dodgy extensions and not a builder in sight.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1389" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dodgy-extensions-150x150.jpg" alt="dodgy extensions" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dodgy-extensions-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Dodgy-extensions.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />A lot of normal people might think about the phrase &#8220;dodgy extensions&#8221; and associate it with some kind of cowboy builder. But alas, the dodgy extensions to which I refer are in a web browser and these could lead you to a data breach or worse. <span id="more-1385"></span>This has <a href="https://krebsonsecurity.com/2018/09/browser-extensions-are-they-worth-the-risk/">come to light recently</a> when a browser extension for a popular cloud storage service called <em><strong>Mega.nz</strong></em> was compromised and started passing people&#8217;s User IDs and passwords to an evil doer&#8217;s server based in the Ukraine. This is similar to the <a href="https://www.l2cybersecurity.com/posh-pos-was-compromised/">breach in April</a> where Saks and related stores in the US had their point-of-sale terminals compromised.</p>
<h3>What is an extension?</h3>
<p>These are little pieces of software that are available for internet browsers to provide some type of add-on or extra functionality. There are thousands of these kind of things out there and you might have some installed without realising it. One quick way is to look at the top of your browser window, on the right-hand-side of the address bar, there may be a few icons. Here is an example from my Chrome browser:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1386" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/List-of-extensions.jpg" alt="" width="130" height="34" /></p>
<p>These extensions are:</p>
<ol>
<li>LastPass (password manager)</li>
<li>Privacy Badger (blocks tracking cookies)</li>
<li>F-Secure Browser Protection (adds security for online banking pages)</li>
<li>HTTPS Everywhere (forces browser to use HTTPS version of websites where possible)</li>
</ol>
<p>All security related for some reason. ?</p>
<p>Not all installed extensions may be shown on the browser bar. They may also be hidden, but still enabled. In order to find out what extensions you have, do the following:</p>
<ul>
<li>Google Chrome &#8211; paste the following address into a new tab <a href="chrome://extensions/" target="_blank" rel="noopener">chrome://extensions/</a></li>
<li>Firefox &#8211; paste the following address into a new tab <a href="about:addons" target="_blank" rel="noopener">about:addons</a></li>
<li>Edge &#8211; Click the three horizontal dots (top right of the browser) -&gt; Extensions</li>
</ul>
<p>If you have a lot of extensions, then you have a greater chance of falling victim to the bad guys.</p>
<h3>How do we get dodgy extensions?</h3>
<p>Most of the extensions you have are probably all legitimate and from a reliable source &#8230; originally. However, over time the developers of these extensions may sell them on or even just give up on them and somebody else takes control of the extension. In the case of the <em><strong>Mega.nz</strong></em> extension, the person responsible for the software was compromised. The extension was then infected for a period of time and it joined the ranks of the dodgy extensions.</p>
<p>The software started stealing users log-in IDs &amp; passwords and sending them onto the criminals. To do this, it required additional permissions on the users browser, which unwary people granted. If you&#8217;ve used an extension that is actively being enhanced, you will regularly sees notifications that it has been updated. In the <strong><em>Mega.nz</em></strong> case, when the notification was issued, there was also a notice about the additional permissions that the evil doers needed to be granted in order to steal passwords.</p>
<p>Here is an example of the permissions needed by LastPass:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1388" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Extension-permissions.jpg" alt="" width="346" height="159" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Extension-permissions.jpg 346w, https://www.l2cybersecurity.com/wp-content/uploads/2018/09/Extension-permissions-300x138.jpg 300w" sizes="auto, (max-width: 346px) 100vw, 346px" /></p>
<p>Those are already pretty extensive. If that suddenly required additional permissions, most people might tend to just click OK to &#8220;get on with it&#8221; and not stop to think &#8220;Why is this asking for enhanced permissions?&#8221;</p>
<h3>What should I do?</h3>
<p>If you have been using your computer for a while, you may have accumulated more and more extensions. So review all of the extensions you have. Remove those that you no longer use or don&#8217;t need.</p>
<p>You should also put in place controls on your staff, to prevent them from installing dodgy extensions. You don&#8217;t want them causing any kind of data breach which might fall into the auspices of the #GDPR.</p>
<p>If and when an extension gets updated, if it asks for additional permissions, <span style="text-decoration: underline;"><strong>always deny them</strong></span>. Then seek an expert opinion. An actual expert and not your 15 year old computer mad niece/nephew. You could send us details of the extension and what permissions it wants at <a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a> and we will answer free of charge.</p>
<p>If you would prefer a security review of your set-up we would be happy to arrange that too. Call us on 087-436-2675.</p>
<p>The post <a href="https://www.l2cybersecurity.com/dodgy-extensions-no-builder-seen/">Dodgy extensions and not a builder in sight.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Holiday Data Breach Photos.</title>
		<link>https://www.l2cybersecurity.com/holiday-data-breach-photos/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 28 Aug 2018 08:48:28 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Surveillance]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1361</guid>

					<description><![CDATA[<p>Most normal people go on holidays, forget about work, relax and enjoy themselves. They also, probably take lots of nice photos of the great places they&#8217;ve been and the nice food they&#8217;ve eaten. I went on holiday recently in remote, rural Ireland and I did pretty much all of the above. However, I suffer from&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/holiday-data-breach-photos/">Holiday Data Breach Photos.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Most normal people go on holidays, forget about work, relax and enjoy themselves. They also, probably take lots of nice photos of the great places they&#8217;ve been and the nice food they&#8217;ve eaten. I went on holiday recently in remote, rural Ireland and I did pretty much all of the above.<span id="more-1361"></span> However, I suffer from an affliction, which means I actually have holiday data breach photos because:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1362" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/I-see-data-breaches.gif" alt="I see data breaches" width="400" height="225" /></p>
<p>I wasn&#8217;t deliberately going looking for data breaches or other data privacy concerns. However these two examples just leapt out at me. Please note that I have redacted sections of these pictures where there were potentially identifying features. I&#8217;ve also removed individual&#8217;s names, just in case you could make them out.</p>
<h3>Staff roster and holiday plans on public display</h3>
<p>I ate and drank in quite a few different establishments on my holiday, but this one had the staff roster and a holiday planner in plain sight, over one of the tills.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1364" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/Holiday-and-roster-on-public-view.jpg" alt="Holiday planner and roster on public display" width="439" height="374" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/Holiday-and-roster-on-public-view.jpg 439w, https://www.l2cybersecurity.com/wp-content/uploads/2018/08/Holiday-and-roster-on-public-view-300x256.jpg 300w" sizes="auto, (max-width: 439px) 100vw, 439px" />Because it was dark, the camera struggled to pick it out very clearly, but I could read the names clearly on the holiday planner (on the left). This had the staff names down the left hand side. Then the columns were for June, July and August and this is where the staff obviously noted their holiday plans.</p>
<p>The weekly roster is on the right, where again the staff names were down the left hand side. Then what shifts they were working each day was in the columns. I couldn&#8217;t make this out myself at the distance I was from it &#8211; approximately 2m.</p>
<p>If I had a better camera or better light, there is no doubt I could easily have got the complete staff list, their holiday plans and their work schedule for the coming week.</p>
<p>This is a breach of the staff&#8217;s right to privacy. Any member of the public could see when they were going to be on holiday or when they were going to be at work. This could lead to their home being broken into, as the bad guys know when they are going to be away. Or how about an abusive ex-partner? How much would they love to have this kind of information available to them.</p>
<p>The real shame about this &#8230; this place had a large back-of-house (kitchen and office) that all the staff had access to, but not the public. Why not post these things back there?</p>
<h3>Staff surveillance</h3>
<p>CCTV is used extensively in pubs and restaurants mainly for crime prevention and health and safety purposes. In this pub there was this ONE camera that only had eyes for one thing &#8230; this till</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1365" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/CCTV-watching-a-till.jpg" alt="cctv watching a till" width="417" height="600" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/CCTV-watching-a-till.jpg 417w, https://www.l2cybersecurity.com/wp-content/uploads/2018/08/CCTV-watching-a-till-209x300.jpg 209w" sizes="auto, (max-width: 417px) 100vw, 417px" /></p>
<p>So obviously they were using this camera to keep an eye on staff to see if they were fiddling the till. This was a very obvious placement of a camera. This would not be considered &#8220;covert&#8221; by any means or standards. That&#8217;s me talking as somebody who notices this stuff for a living. If I was still in school, starting out on my first pub job, I may <em><strong>not</strong></em> notice such things.</p>
<p>Surveillance of staff needs to be declared by the employer. In this instance there should be a point in the staff manual noting that the tills are monitored by cameras. If an employer was to use secret cameras to monitor staff, they should also declare this. They should state that from time-to-time covert surveillance of employees, in the performance of their work, may be implemented.</p>
<h3>Have you any holiday data breach snaps?</h3>
<p>In both of the above situations, I have anonymously (I was on holiday, so I&#8217;m not hunting sales leads) notified the owners of the establishments about my observations.</p>
<p>When you are looking through your photos from your vacation, can you find any holiday data breach pictures? If you think you have, send them in confidence to <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener">info@L2CyberSecurity.com</a> and I&#8217;ll let you know, but please don&#8217;t tell me the name of the place or the location.</p>
<p>If you would like to know more about different data breaches under the GDPR, check out the videos available on the <a href="https://www.l2cybersecurity.com/gdpr/" target="_blank" rel="noopener">GDPR section</a> of my website.</p>
<p>#LetsBeCarefulOutThere</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/holiday-data-breach-photos/">Holiday Data Breach Photos.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Eir laptop theft &#8211; could have been worse</title>
		<link>https://www.l2cybersecurity.com/eir-laptop-theft-could-have-been-worse/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 24 Aug 2018 11:11:10 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1346</guid>

					<description><![CDATA[<p>The eir laptop theft that was revealed this week was pretty &#8230; actually &#8230; it was really bad and deeply embarrassing for eir. However details that emerged from the statement by the Data Protection Commission showed that it could have been a LOT worse. 1,500 Laptops worse! First up though I did a short video recently&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/eir-laptop-theft-could-have-been-worse/">Eir laptop theft &#8211; could have been worse</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1349" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/eir_laptop_stolen-1-150x150.jpg" alt="eir laptop" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/eir_laptop_stolen-1-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/08/eir_laptop_stolen-1.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />The eir laptop theft that was revealed this week was <del>pretty</del> &#8230; actually &#8230; it was really bad and deeply embarrassing for eir. However details that emerged from the <a href="https://www.dataprotection.ie/docs/EN/22-08-2018-Statement-by-Data-Protection-Commission-in-relation-to-Eir-breach-notification/m/1783.htm" target="_blank" rel="noopener">statement by the Data Protection Commission</a> showed that it could have been a LOT worse. 1,500 Laptops worse!<span id="more-1346"></span></p>
<p>First up though I did <a href="https://www.l2cybersecurity.com/data-breach-video-series-mobile-device-loss/" target="_blank" rel="noopener">a short video</a> recently explaining why loss of mobile devices (including laptops) is a Data Breach under #GDPR. Have a quick watch and then come back here.</p>
<h3>Why was the laptop not encrypted?</h3>
<p>They&#8217;ve not specified exactly what happened, but I surmise that eir use a third party package to secure their mobile devices and some of the many <a href="https://www.computerworld.com/article/3216425/microsoft-windows/microsoft-patch-alert-mainstream-august-patches-look-remarkably-good.html?nsdr=true&amp;page=2" target="_blank" rel="noopener">problematic monthly updates</a> that Microsoft released in July caused them issues. It must have been bad for them to have to decrypt 1,500 laptops. In fairness to eir, they at least notified the Data Protection Commission (DPC) about this on the 10th of August.</p>
<h3>What happened next?</h3>
<p>At some point between 10th August and last weekend one of the 1,500 unsecured laptops was stolen outside. In other words an employee/contractor removed one of the laptops from eir&#8217;s premises and then fell victim to a thief.</p>
<h3>What was on this eir laptop?</h3>
<p>According to the report from the DPC &#8211; names, email addresses, mobile numbers &amp; account numbers for 36,642 customers and names &amp; contact details for 177 eir employees.</p>
<h3>That doesn&#8217;t sound too bad &#8230; does it?</h3>
<p>As I say to people in my training, it&#8217;s all about the context. If you are a florist and you lose a list of names and addresses of your customers, there may not be a significant risk to those individuals in respect to their rights and freedoms. So you probably won&#8217;t need to notify them about the breach. It might be a borderline call as to whether you would need to notify the DPC. I would say you should.</p>
<p>Now lets say that list of names and addresses are for clients of a sexually transmitted disease clinic. The context now shifts dramatically as there is now a significant risk to the individuals rights and freedoms. If that list became public, there would be much embarrassment to those people. So you would definitely be reporting to the DPC and also notifying the affected people.</p>
<p>In the eir laptop case, the fact there are emails and account numbers is quite concerning. If an evil doer uses all of the available information, they could craft an extremely plausible phishing e-mail, which they could con the victim into doing something that is not in their best interests.</p>
<p>Also, if the bad guys combined the detail from the eir laptop with some information they gleaned from answers to <a href="https://www.l2cybersecurity.com/identity-theft-enabled-fun-quizzes/" target="_blank" rel="noopener">fun quizzes</a>, they may be able to impersonate the eir customer to an eir customer service agent and effectively take over the customers account.</p>
<h3>What should have happened?</h3>
<p>Once eir were aware that all of these devices were unsecured, they should never have been allowed to leave the premises. They should have been locked to the employees/contractors desks and the keys stored in the kennel of a hungry rottweiler until the issue with the patch was rectified.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1350 size-medium" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/hungry-rottweiller-200x300.jpg" alt="hungry rottweiler" width="200" height="300" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/hungry-rottweiller-200x300.jpg 200w, https://www.l2cybersecurity.com/wp-content/uploads/2018/08/hungry-rottweiller.jpg 283w" sizes="auto, (max-width: 200px) 100vw, 200px" /></p>
<h3>What have eir done?</h3>
<p>Well they had been busily working away re-encrypting their laptops and according to the DPC&#8217;s statement they had all but 46 completed as of 22nd August.</p>
<p>They have also notified the affected customers, by email from a &#8220;no-reply&#8221; email address, which is pretty crappy. They really should have a specific email address and freephone telephone number for those impacted customers.</p>
<h3>What should we all learn from this?</h3>
<p>The most important thing we should all learn from this eir laptop theft case is that, if you have a mobile device of any type, even if it doesn&#8217;t currently have personal data on it, <span style="text-decoration: underline;"><strong>encrypt the thing</strong></span>! If it&#8217;s not encrypted, <span style="text-decoration: underline;"><strong>keep it securely stored in your</strong></span><strong><span style="text-decoration: underline;"> premises</span></strong> &#8211; don&#8217;t ever take it off premises.</p>
<p>If you want to learn more about good security practice send an e-mail to <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener">info@L2CyberSecurity.com</a> and we can talk to you about training and practical steps to improve your cyber security set-up.</p>
<p>#LetsBeCarefulOutThere</p>
<p>#SecuritySimplified</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/eir-laptop-theft-could-have-been-worse/">Eir laptop theft &#8211; could have been worse</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>MyFitnessPal Breach &#8211; Bigger than Equifax</title>
		<link>https://www.l2cybersecurity.com/myfitnesspal-breach-bigger-equifax/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 30 Mar 2018 15:15:11 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[Data Protection]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1181</guid>

					<description><![CDATA[<p>The MyFitnessPal online fitness and nutrition website has suffered a data breach which affects up to 150 million customers. That is a few million more than the Equifax breach. Under Armour, the website&#8217;s owner, reported the breach yesterday. They have pushed out a notification on their website as well as to all affected customers of the MyFitnessPal&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/myfitnesspal-breach-bigger-equifax/">MyFitnessPal Breach &#8211; Bigger than Equifax</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1182" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/03/My-Fitness-Pal-150x150.jpg" alt="MyFitnessPal breach" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/03/My-Fitness-Pal-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/03/My-Fitness-Pal-300x300.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2018/03/My-Fitness-Pal.jpg 362w" sizes="auto, (max-width: 150px) 100vw, 150px" />The MyFitnessPal online fitness and nutrition website has suffered a data breach which affects up to 150 million customers. That is a few million more than the <a href="https://www.l2cybersecurity.com/data-breaches-what-risk/">Equifax breach</a>. <em>Under Armour</em>, the website&#8217;s owner, <a href="https://www.cnbc.com/2018/03/29/under-armour-stock-falls-after-company-admits-data-breach.html">reported the breach</a> yesterday. <span id="more-1181"></span>They have pushed out <a href="https://content.myfitnesspal.com/security-information/notice.html">a notification</a> on their website as well as to all affected customers of the MyFitnessPal breach and actually did so very quickly, which is pretty impressive. So far, it&#8217;s being handled a lot better than the <a href="https://www.theregister.co.uk/2017/09/21/equifax_fooled_again_company_teets_out_links_to_website_parodying_it/">Equifax omni-shambles</a>.</p>
<p><em> Under Armour</em> report that the MyFitnessPal breach included user names, e-mail addresses and hashed passwords (hashing is the way to scramble passwords).</p>
<p>This breach was detected last weekend, on 25th March. The data itself had been last accessed by the evil doers in February.</p>
<p>As part of the notification, <em>Under Armour </em>stated that they:</p>
<ul>
<li>are notifying MyFitnessPal users to provide information on how they can protect their data</li>
<li>will be requiring MyFitnessPal users to change their passwords and urge users to do so immediately</li>
<li>will continue to monitor for suspicious activity and <span style="text-decoration: underline;"><strong>to coordinate with law enforcement authorities</strong></span></li>
<li>will continue to make enhancements to their systems to detect and prevent unauthorised access to user information</li>
</ul>
<p>All good steps to be taken. I particularly applaud the engagement with law enforcement. As I stated in the post about the <a href="https://www.l2cybersecurity.com/overwhelming-attack-sets-new-record/">overwhelming attack</a> which was detected earlier this month, businesses need to start reporting these criminal activities, so our own <em>Garda Síochána</em> can get better statistics which will support more funding for the <em>Garda Cyber Crime Bureau</em>.</p>
<p><em>Under Armour</em> also provided the affected users with good advice:</p>
<ul>
<li>Change your password for any other account on which you used the same or similar information used for your MyFitnessPal account</li>
<li>Review your accounts for suspicious activity</li>
<li>Be cautious of any unsolicited communications that ask for your personal data or refer you to a web page asking for personal data</li>
<li>Avoid clicking on links or downloading attachments from suspicious emails</li>
</ul>
<p>I suppose it was too much to hope that they would give a suggestion that users should also start using two-factor authentication where possible. Hopefully one of the enhancements that they will make to their systems will be to introduce such a feature.</p>
<p>Have a watch of my <a href="https://www.youtube.com/watch?v=JqcpmfqBAK8">short 10 minute video</a> which tells you all you need to know about two-factor authentication:</p>
<p>The post <a href="https://www.l2cybersecurity.com/myfitnesspal-breach-bigger-equifax/">MyFitnessPal Breach &#8211; Bigger than Equifax</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
