{"id":42733,"date":"2020-08-03T13:56:23","date_gmt":"2020-08-03T17:56:23","guid":{"rendered":"https:\/\/www.opensource.im\/uncategorized\/avoid-bad-security-practices-that-caused-postbanks-breach-itweb.php"},"modified":"2020-08-03T13:56:23","modified_gmt":"2020-08-03T17:56:23","slug":"avoid-bad-security-practices-that-caused-postbanks-breach-itweb","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/avoid-bad-security-practices-that-caused-postbanks-breach-itweb.php","title":{"rendered":"Avoid bad security practices that caused Postbank&#8217;s breach &#8211; ITWeb"},"content":{"rendered":"<p><p>The news a  couple of months ago that Postbank has to replace 12 million bank cards  due to a major data breach is an excellent case study in the risks of  poor security processes and the reality that the human element remains a  weak link in the security chain.<\/p>\n<p>The breach  resulted from Postbank's encrypted master key being printed in a plain,  unencrypted format at its old data centre in Pretoria, and then being  stolen by staff members. <\/p>\n<p>The  breach might appear to be a stroke of hacking genius, but, in truth,  its just a case of inadequate security practices and seemingly rogue  and corrupt individuals who stole the 36-digit (encryption) master key,  says Karl Nimmo, CEO and founder of InTouch.<\/p>\n<p>Manual  key management is fraught with difficulties, says IT security expert  Ian Farquhar, a director of Worldwide Security Architecture Team at  Gigamon in Australia. In Postbanks case, its going to cost them far more to fix this than the actual fraud, he adds. <\/p>\n<p>People routinely underestimate the cost of getting key management wrong. Theres another risk involved here, too. Not only financial loss, but poor key management can actually lead to outages that can cost as much if not more than fraud. Hopefully, this will be a wake-up call for other regional banks, so that they can improve their technology and processes around keys.<\/p>\n<p>According to Farquhar, its  a credit to the payment card industry that they have, in the vast  majority of cases, properly implemented controls around the  cryptographic keys used to protect electronic  financial transactions (EMV). However, it seems that in the Postbank  case, a key was exposed during a data centre migration, and rather than  being managed properly, it was seriously mishandled by those involved.  This fraud was the result, he says.<\/p>\n<p>Farquhar  stresses that most organisations don't rely on EMV keys alone. EMV,  which originally stood for Europay, Mastercard, and Visa, is a payment  method based upon a technical standard for smart payment cards and for  payment terminals and ATMs that are able to accept them. <\/p>\n<p>I was recently speaking to a large international financial organisation that was managing 170 000 different keys. While an extreme example, even small financial institutions will be managing 1 000 or 2 000 keys, far more than can be reliably handled with manual processes.<\/p>\n<p>In  the Postbank case, breaking the 36-character key using a brute force  hacking technique would be practically impossible, based on the current  state of modern supercomputers, adds Nimmo. <\/p>\n<p>The  most sophisticated hackers in the world would consider this a  non-trivial task with a very low likelihood of success, which is why  this breach was not the work of sophisticated attackers, but, rather, the result of bad security practices and dishonestindividuals  who had access to the physical systems. This breach is a reminder that  hacking isnt always done by someone sitting on the other side of the  world, but often employs clever social engineering where the attacker  has access to physical devices. The best way to protect against this is  to strictly adhere to best security practices and processes.<\/p>\n<p>According  to Nimmo, there are several encryption methods to protect data to  ensure it remains safe and private to the intended parties, who should have access to the encrypted data. <\/p>\n<p>End-to-end  encryption is a robust asymmetric encryption technique for encrypting  data where the keys are stored by both the sender and the recipient with  public and private keys. This form of encryption puts the key in the  hands of the end-user. A breach would require the attacker to breach  either the senders or the receiver's device.<\/p>\n<p>The  concept of a master key to protect all the other cryptographic keys is  another well-known implementation of encryption, adds Nimmo. <\/p>\n<p>Typically,  these master keys are very strong and would be nearly impossible to  break using even the most powerful supercomputers in existence. Using a  master key has the advantage that only one piece of plaintext material  needs to be protected and stored.<\/p>\n<p>The  flip side of the coin and the inherent disadvantage of this single  point of failure is that if this key is breached, then the entire system  is breached, as in the case of Postbank.<\/p>\n<p>The good news, says Farquahar,  is that there are solutions in this space: hardware security modules  (HSMs) for securely storing keys and enterprise key management systems,  as well as associated technologies such as enterprise certificate  lifecycle management systems. <\/p>\n<p>These all help to secure and automate key management, removing the need for problematic manual processes. Im seeing a lot of organisations, inside as well as outside the financial services industryimplement these. They need to  be backed up with strong operational processes supported by standards  published by organisations like the ISO and NIST, Farquahar adds.<\/p>\n<p>The  Postbank breach is a reminder that information security has many  idiosyncratic foibles that do not always rely on a technical solution.  It is a collective engagement of technical best practices as well as  real-world physical security. `Do not allow your master key to be printed would be a sound security starting point, Nimmo concludes.<\/p>\n<p>Attempts by ITWeb to get further details from Postbank went unanswered.<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.itweb.co.za\/content\/mYZRXv9aoXmvOgA8\" title=\"Avoid bad security practices that caused Postbank's breach - ITWeb\" rel=\"noopener noreferrer\">Avoid bad security practices that caused Postbank's breach - ITWeb<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The news a couple of months ago that Postbank has to replace 12 million bank cards due to a major data breach is an excellent case study in the risks of poor security processes and the reality that the human element remains a weak link in the security chain. The breach resulted from Postbank's encrypted master key being printed in a plain, unencrypted format at its old data centre in Pretoria, and then being stolen by staff members<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-42733","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/42733"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=42733"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/42733\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=42733"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=42733"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=42733"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}