Cybercrime: Now More Profitable Than The Drug Trade

Summary: Today we have a report from the front lines of the cyberwars. It’s an axiom of 4th generation war that crime and war increasingly use the same methods, and even merge at higher intensities (as seen in Mexico’s fight with its drug cartels). Today we hear about companies fight against cybercrime, still growing and already more profitable than drugs.ย  {2nd of 2 posts today.}

37% of respondents said they were not confident in their company’s ability even to detect a breach. … Only 45% were confident about the security of their Point of Sale devices.

Tripwire Online Survey , March 2015.

Cybercrime

Cybercrime: Now More Profitable Than The Drug Trade

By Irfahn Khimji and David Bisson
From tripwire, 30 March 2015.
Posted here with their generous permission.

 

Tripwire recently hosted a webcast entitled, โ€œPCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan: Real World Cyber Attacks and Protecting Credit Card Data.โ€ For our presentation we discussed the importance of the new Payment Card Industry Data Security Standard 3.0. Together, we also provided some insight into how companies can leverage this new compliance standard to protect themselves against a security breach.

As reported by the 2013 Europol Serious & Organized Threat Assessment, the โ€œTotal Global Impact of CyberCrime [has risen to] US $3 Trillion, making it more profitable than the global trade in marijuana, cocaine and heroin combined.โ€

 

2014 Internet Security Threat Report
2014 Internet Security Threat Report

This growing cost of cyber crime partially reflects the different laws that define countriesโ€™ breach disclosure policies. For example, whereas the United States has mandatory disclosure laws, the European Union has none. European-based companies that have been affected by an incident, including TK Maxx, Loyaltybuild (Affinion Intl), Stay Sureย and CEC Bank, are therefore under no obligation to notify their customers of an incident. This lack of visibility may limit the affected companyโ€™s incentives to invest in detection measures that facilitate a timely response.

Acknowledging these differences in breach detection and response, we took the opportunity to poll our webcast participants in an effort to gain an understanding of companiesโ€™ breach preparedness more generally.

First, we asked our participants how long they estimated it would take for them to detect a breach. The responses varied, but most disturbing was the fact that 37% of respondents said they were not confident in their ability to detect a breach at all.

This finding is not new, however. In its 2014 Data Breach Investigations Report, Verizon found that a data breach usually occurred within a matter of seconds or minutes after the attackers had successfully infiltrated a companyโ€™s computer systems. The attackers would then successfully begin exfiltrating the data only a few minutes thereafter.

2014 Internet Security Threat Report
2014 Internet Security Threat Report

By contrast, Verizon found that detection would usually take at least a few weeks after the initial breach had occurred, giving the attackers plenty of time to do what they want with customersโ€™ stolen data.

Even then, for those that were in fact discovered, many of the breaches were not detected by the companies themselves. In fact, for 99% of the cases examined by Verizon, the affected companies were notified of the breaches by third parties โ€” law enforcement entities or financial organizations following up on reports of payment card fraud, and in some cases customers who had been victimized in the incidents.

Verizon also found that between 2011 and 2013, 45% of retail breaches occurred as a result of attackers exploiting the insecure configurations of companyโ€™s point-of-sale (PoS) devices. This is especially concerning given the fact that only half of our webcastโ€™s attendees answered that they were confident in the secure configurations of their PoS devices.

Clearly, computer criminals are interested in stealing customersโ€™ payment card information, which helps to explain the uptick in breaches we are seeing today. This begs the question: How can we make sure a company does not succumb to large-scale payment card theft?

The answer has to do with compliance. Information protection policies were created to ensure the protection of sensitive information. In this case, compliance with one such policy, known as the Payment Card Industry Data Security Standards (PCI DSS), helps to protect customersโ€™ payment card information.

2014 Internet Security Threat Report
2014 Internet Security Threat Report

To be sure, companies vary in their approach to the issue of compliance. Some organizations look at compliance as just a checkbox, implementing security controls in an effort to merely pass their security audit and thereby continue to do business. As I discussed in a recent post, however, this approach more often than not values a cheap solution to compliance at the expense of improving the organizationโ€™s security. It is therefore no surprise that many companies that implement the โ€œcheckboxโ€ approach are predominantly those affected by large security breaches.

Just to be clear, a comprehensive approach to compliance cannot prevent attackers from infiltrating a companyโ€™s networks. On the contrary, as the growing number of breaches has shown, it is inevitable that attackers will find a way in. But where PCI DSS compliance makes a difference is in a companyโ€™s detection and response time.

Having the capabilities to quickly detect and remove an attacker from oneโ€™s network allows a company to resume business as usual in a matter of weeks. This is a preferred outcome when one considers the case of Target, which recently agreed to a multi-million dollar settlement after losing millions of customersโ€™ data back in 2013.

Todayโ€™s threat landscape necessitates that all companies strive to achieve continuous compliance with PCI DSS. If your organization is just embarking on this road, you can learn more, including some of the new requirements in PCI 3.0, by watching a full recording of our webcast here.

————————————————

Irfahn Khimji

About the authors

Irfahnย Khimji holds a CISSP certification and brings a wide range of expertise in the field of information security specializing in Vulnerability Management, Compliance, Risk Identification and Scoring, as well as Social Engineering. He is a recognized leader in building Information Security Solutions and Customer Satisfaction. He has experience providing technical security leadership and guidance to Fortune 500 accounts, as well as smaller companies, in several verticals including financial, energy/commercial, healthcare, and retail.

See what heโ€™s thinking on Twitter @TheRealKhimji — and see his articles at tripwire here.

David Bisson

David Bisson (CISM, CGEIT, CRISC) earned his B.A. in Political Studies at Bard College. Before joining Tripwire as a Contributor Author, David worked as Editor for Information Security Buzz. He is an information systems and cybersecurity specialist and a member of the Advisory Group on Internet Security to Europolโ€™s Cyber Crime Centre (EC3) on breach investigations,

Looking ahead, he intends to pursue a career that balances a technical understanding of information security with his love for infosec journalism. Read him on Twitter @DMBisson — and see his articles at tripwire here.

About tripwire

Tripwire delivers advanced threat, security and compliance solutions used by over 9,000 organizations, including over 50% of the Fortune 500. Tripwire enables enterprises, service providers and government agencies around the world to detect, prevent and respond to cyber security threats.

For More Information

Graphics about threats are from Norton’s “2014 Internet Security Threat Report“, an analysis of the year in global threat activity based on data from the Symantec Global Intelligence Network. Also see “Net Losses: Estimating the Global Cost of Cybercrime” by the Center for Strategic and International Studies (June 2014).

If you liked this post, like us on Facebook and follow us on Twitter.ย  See all posts about cyberwar & cyberespoinage, especially The FBI told their story about North Korea attacking Sony. Before we retaliate, read what they didnโ€™t tellย you.

There have been some good books about this new frontier:

 

 

2 thoughts on “Cybercrime: Now More Profitable Than The Drug Trade”

  1. Pingback: Prepare for Cyberwar | Bill Totten's Weblog

  2. Pingback: Prepare for CyberWar | TRUTH TIME

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Scroll to Top
%d bloggers like this: