Summary: Today we have a report from the front lines of the cyberwars. It’s an axiom of 4th generation war that crime and war increasingly use the same methods, and even merge at higher intensities (as seen in Mexico’s fight with its drug cartels). Today we hear about companies fight against cybercrime, still growing and already more profitable than drugs.ย {2nd of 2 posts today.}
37% of respondents said they were not confident in their company’s ability even to detect a breach. … Only 45% were confident about the security of their Point of Sale devices.
— Tripwire Online Survey , March 2015.
“Cybercrime: Now More Profitable Than The Drug Trade“
By Irfahn Khimji and David Bisson
From tripwire, 30 March 2015.
Posted here with their generous permission.
Tripwire recently hosted a webcast entitled, โPCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan: Real World Cyber Attacks and Protecting Credit Card Data.โ For our presentation we discussed the importance of the new Payment Card Industry Data Security Standard 3.0. Together, we also provided some insight into how companies can leverage this new compliance standard to protect themselves against a security breach.
As reported by the 2013 Europol Serious & Organized Threat Assessment, the โTotal Global Impact of CyberCrime [has risen to] US $3 Trillion, making it more profitable than the global trade in marijuana, cocaine and heroin combined.โ

This growing cost of cyber crime partially reflects the different laws that define countriesโ breach disclosure policies. For example, whereas the United States has mandatory disclosure laws, the European Union has none. European-based companies that have been affected by an incident, including TK Maxx, Loyaltybuild (Affinion Intl), Stay Sureย and CEC Bank, are therefore under no obligation to notify their customers of an incident. This lack of visibility may limit the affected companyโs incentives to invest in detection measures that facilitate a timely response.
Acknowledging these differences in breach detection and response, we took the opportunity to poll our webcast participants in an effort to gain an understanding of companiesโ breach preparedness more generally.
First, we asked our participants how long they estimated it would take for them to detect a breach. The responses varied, but most disturbing was the fact that 37% of respondents said they were not confident in their ability to detect a breach at all.
This finding is not new, however. In its 2014 Data Breach Investigations Report, Verizon found that a data breach usually occurred within a matter of seconds or minutes after the attackers had successfully infiltrated a companyโs computer systems. The attackers would then successfully begin exfiltrating the data only a few minutes thereafter.

By contrast, Verizon found that detection would usually take at least a few weeks after the initial breach had occurred, giving the attackers plenty of time to do what they want with customersโ stolen data.
Even then, for those that were in fact discovered, many of the breaches were not detected by the companies themselves. In fact, for 99% of the cases examined by Verizon, the affected companies were notified of the breaches by third parties โ law enforcement entities or financial organizations following up on reports of payment card fraud, and in some cases customers who had been victimized in the incidents.
Verizon also found that between 2011 and 2013, 45% of retail breaches occurred as a result of attackers exploiting the insecure configurations of companyโs point-of-sale (PoS) devices. This is especially concerning given the fact that only half of our webcastโs attendees answered that they were confident in the secure configurations of their PoS devices.
Clearly, computer criminals are interested in stealing customersโ payment card information, which helps to explain the uptick in breaches we are seeing today. This begs the question: How can we make sure a company does not succumb to large-scale payment card theft?
The answer has to do with compliance. Information protection policies were created to ensure the protection of sensitive information. In this case, compliance with one such policy, known as the Payment Card Industry Data Security Standards (PCI DSS), helps to protect customersโ payment card information.

To be sure, companies vary in their approach to the issue of compliance. Some organizations look at compliance as just a checkbox, implementing security controls in an effort to merely pass their security audit and thereby continue to do business. As I discussed in a recent post, however, this approach more often than not values a cheap solution to compliance at the expense of improving the organizationโs security. It is therefore no surprise that many companies that implement the โcheckboxโ approach are predominantly those affected by large security breaches.
Just to be clear, a comprehensive approach to compliance cannot prevent attackers from infiltrating a companyโs networks. On the contrary, as the growing number of breaches has shown, it is inevitable that attackers will find a way in. But where PCI DSS compliance makes a difference is in a companyโs detection and response time.
Having the capabilities to quickly detect and remove an attacker from oneโs network allows a company to resume business as usual in a matter of weeks. This is a preferred outcome when one considers the case of Target, which recently agreed to a multi-million dollar settlement after losing millions of customersโ data back in 2013.
Todayโs threat landscape necessitates that all companies strive to achieve continuous compliance with PCI DSS. If your organization is just embarking on this road, you can learn more, including some of the new requirements in PCI 3.0, by watching a full recording of our webcast here.
————————————————
About the authors
Irfahnย Khimji holds a CISSP certification and brings a wide range of expertise in the field of information security specializing in Vulnerability Management, Compliance, Risk Identification and Scoring, as well as Social Engineering. He is a recognized leader in building Information Security Solutions and Customer Satisfaction. He has experience providing technical security leadership and guidance to Fortune 500 accounts, as well as smaller companies, in several verticals including financial, energy/commercial, healthcare, and retail.
See what heโs thinking on Twitter @TheRealKhimji — and see his articles at tripwire here.
David Bisson (CISM, CGEIT, CRISC) earned his B.A. in Political Studies at Bard College. Before joining Tripwire as a Contributor Author, David worked as Editor for Information Security Buzz. He is an information systems and cybersecurity specialist and a member of the Advisory Group on Internet Security to Europolโs Cyber Crime Centre (EC3) on breach investigations,
Looking ahead, he intends to pursue a career that balances a technical understanding of information security with his love for infosec journalism. Read him on Twitter @DMBisson — and see his articles at tripwire here.
About tripwire
Tripwire delivers advanced threat, security and compliance solutions used by over 9,000 organizations, including over 50% of the Fortune 500. Tripwire enables enterprises, service providers and government agencies around the world to detect, prevent and respond to cyber security threats.
For More Information
Graphics about threats are from Norton’s “2014 Internet Security Threat Report“, an analysis of the year in global threat activity based on data from the Symantec Global Intelligence Network. Also see “Net Losses: Estimating the Global Cost of Cybercrime” by the Center for Strategic and International Studies (June 2014).
If you liked this post, like us on Facebook and follow us on Twitter.ย See all posts about cyberwar & cyberespoinage, especially The FBI told their story about North Korea attacking Sony. Before we retaliate, read what they didnโt tellย you.
There have been some good books about this new frontier:
- Kevin Mitnickโs Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
,
- Andy Greenbergโs This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World’s Information
,
- Brian Krebsโ Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door
.
- Kim Zetterโs Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon
, describing the new era of war and preparing you for the next attack (see a review here).
Pingback: Prepare for Cyberwar | Bill Totten's Weblog
Pingback: Prepare for CyberWar | TRUTH TIME