+ All Categories
Home > Documents > SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November...

SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November...

Date post: 24-May-2020
Category:
Upload: others
View: 4 times
Download: 0 times
Share this document with a friend
52
SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015
Transcript
Page 1: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

SOCIAL ENGINEERING:

The Hacking of the Mind

November 5, 2015

Page 2: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

Gamelah Palagonia – Willis FINEX North America

1

Gamelah Palagonia, CIPM, CIPT, CIPP/US, CIPP/G, ARM, RPLU+

Senior Vice President

Willis Americas Administration, Inc.

Brookfield Place, 200 Liberty Street

[email protected]

212.915.8575

Gamelah Palagonia is a Senior Vice President and national resource for Network

Security, Data Privacy and Technology Errors & Omissions.

Gamelah brings over 25 years of risk management and insurance brokerage

experience. She is one of the first insurance professionals to specialize in online

media, intellectual property, technology errors & omissions liability and cyber

risks. Gamelah is a recognized thought leader in the Cyber & Privacy Liability

insurance and risk management industry. She is a frequent speaker and author

on the topic. Prior to joining Willis, Gamelah was the founder of Privacy

Professionals LLC, a Cyber & Privacy Risk Advisory firm.

Credentials

Gamelah holds an Associate Risk Management (ARM) and Registered

Professional Liability Underwriter/PLUS (RPLU+) designation, and several

information privacy certifications including Certified Information Privacy Manager

(CIPM); Certified Information Privacy Technologist (CIPT); Certified Information

Privacy Professional/United States (CIPP/US); Certified Information Privacy

Professional/Government (CIPP/G).

Page 3: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

Keith Swiat – RSM

2

Keith Swiat

Director, Security and Privacy

RSM LLP

New York

[email protected]

212.372.1687

Keith Swiat brings over 20 years of experience in information technology,

including 10 years of experience in management and network/application security

with a strong technical expertise with mobile platforms. He is an expert advisor on

best practices and compliance for software vendors developing

mobile/web/desktop applications.

As an active participant in the payment card industry, Keith has collaborated with

standards organizations, merchants and software vendors to create new data

security standards and best practices. His proven leadership skills focus on

utilizing the individual strengths of team members to build productive and

cohesive practices.

Credentials

•International Association of Privacy Professionals (IAPP) Member

•Certified Ethical Hacker (CEH)

•Computer Forensics and Incident Response, SANS Institute

•PCI-DSS Certifications: QSA (PCI-DSS), PA-QSA (PA-DSS), PA-QSA (P2PE)

Page 4: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

Stephen Leggett – Willis of New York

3

Stephen Leggett

Senior Vice President, National Fidelity Practice Leader

Willis of New York

Brookfield Place, 200 Liberty Street

[email protected]

212.915.7901

Steve provides Fidelity Bond expertise to offices throughout the U.S. responding

to complex coverage and claim issues surrounding Financial Institution Bond and

Commercial Crime policies. He has more than 30 years of experience.

Steve is also responsible for the broking and servicing of Fortune 500 companies

and Financial Institution Bond placements within the practice. Broking

responsibilities also include ancillary bond products, such as Excess SIPC and All

Risk Form J policies.

Prior to joining Willis, Steve worked with two global brokerage firms handling

Fidelity Bond placements for money centre institutions, stockbrokerage firms,

insurance companies and Fortune 500 companies. He began his career with an

insurance carrier underwriting Fidelity and Surety Bond accounts.

Credentials

Steve has spoken at numerous conferences on the subject of Financial Institution

Bonds and Comprehensive Crime Policies, including the American Bankers

Association, RIMS, PLUS and the American Bar Association. Steve graduated

from the State of University of New York at Oswego with a BA. He has completed

numerous accounting and business law postgraduate courses.

Page 5: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

Judy Selby – BakerHostetler

4

Judy Selby, Esq.

Co-Leader, Information Governance Team

BakerHostetler

45 Rockefeller Plaza, NY, NY 10111

[email protected]

212.589.4208

Judy Selby is co-leader of BakerHostetler's Information Governance team and founded the

E-discovery and Technology Management team. She also defends class action lawsuits and

recently won the complete dismissal of a data breach class action. Judy handles cutting

edge privacy, data breach, and information governance matters, and supports due diligence

concerning information-related and Big Data issues in merger and acquisition transactions.

She also provides counseling with regard to cyber insurance and handles a variety of

insurance coverage matters, including TCPA claims. She has more than 20 years of

experience in large scale first- and third-party complex insurance coverage matters,

providing a full range of services from opinion work, coverage gap analysis, claims

counseling, broker liability, settlement negotiations, international arbitration, and all phases

of insurance coverage litigation.

Credentials

Judy is a member of the Law360 Insurance Editorial Advisory Board, the Editorial Advisory

Board of Law Technology News, the Professional Liability Underwriters Association, and the

Defense Research Institute. She is also a contributor to InsuranceThoughtLeadership.com,

Datfloq.com, and BigDataMadeSimple.com. Judy was honored as LawCrossing's Law Job

Star in July 2014, featured in Law Technology News as a leading woman in technology, and

has been quoted in Forbes, Reuters, Law360,Bloomberg BNA, Insurance Business

America, The National Law Journal, and Law Technology News regarding information-

related issues. She was selected as the LXBN Leader in May 2015 and as a finalist for

CLM's 2015 Outside Counsel of the Year award.

Page 6: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

Dan Twersky – Willis of New York

5

Dan Twersky

Senior Claims Specialist, FINEX North America

Willis Americas Administration, Inc., Brookfield Place, 200 Liberty Street, New

York, NY 10281

Direct: 212 915 8580

Dan is a Senior Claims Specialist for the FINEX Practice of Willis, where he

advocates on behalf of his clients in connection with Directors and Officers

Liability, Financial Institutions Professional Liability, Employment Practices

Liability, Fiduciary Liability, Cyber Liability, and Fidelity insurance policies.

Prior to joining Willis, Dan was most recently a Claim Consultant at CNA,

focused on Cyber Liability, Technology and Professional Services Liability, and

Media Liability matters. He has worked with a variety of primary and excess,

admitted and non-admitted, duty-to-defend coverage forms in connection with

both first-party and third-party claims involving a wide range of entities

including hardware and software companies, cloud service providers, payment

processors, law firms, media conglomerates, engineering firms, non-profits,

publishers, web developers, accounting firms, retailers, data brokers, and

healthcare providers.

Page 7: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

WHAT IS SOCIAL

ENGINEERING?

Section one

6

Gamelah Palagonia, Willis – FINEX North America

Page 8: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

“Human beings are social

creatures that are shaped as

individuals through social

interactions and influences.”

7

Page 9: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

“Social science is a field of study

focused on relationships among

individuals within a society, such

as sociology, anthropology,

competitive intelligence, and

political science.”

8

Page 10: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

“Social Engineering is a

discipline in social science that

refers to efforts to influence

popular attitudes and social

behaviors on a large scale.”

9

Page 11: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

There are

positive

aspects to

social

engineering

but…

today our

discussion is

focused on the

criminal aspect

as it relates to

data privacy and

security.

10

Page 12: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

Social

Engineering:

The Human

Exploit

Social engineering is a

broad term for a wide

range of tactics and

techniques used by

criminal attackers that

exploit the human element.

While cyber attacks

combine a range of

different tactics, it is clear

that there is one very

common risk denominator

– us humans.

11

Page 13: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

Verizon 2015 Data Breach Investigations Report (DBIR)

“While the threats against us may “seem” innumerable,

infinitely varied, and ever-changing, the reality is they

aren’t. The common denominator across the top four

patterns of security incidents – accounting for nearly

90% of incidents – is people. Whether it’s goofing up,

getting infected, behaving badly or losing stuff.”

12

90% Miscellaneous Errors

Crimeware

Insider Misuse

Physical Theft or Loss

2014 Top Four Patterns

Page 14: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

Symantec 2015 Internet Security Threat Report (ISTR)

“Almost no company, whether large or small, is immune to

spear-phishing. Five out of six large (2,500 + employees)

companies were targeted with spear-phishing attacks

during 2014 – a 40% increase over the previous year.

Small and medium-sized businesses also saw an uptick,

with attacks increasing 26% and 30%, respectively.”

13

40% Increase

Page 15: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

14

The Targets

Page 16: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

15

Malicious Insiders

Third-Party Vendor

Compromise

Hacktivists

Negligent Insiders

Threat Sources

Hacked!

Page 17: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

The Costs

Source: 2015 Ponemon Institute Research Report: The Cost of Phishing & Value of Employee Training, sponsored by Wombat Security Technologies, Inc.

16

The average annual cost to contain a credential compromise that

originated from a successful phishing attack:

$381,920 The average total cost on an annual basis for

an average-sized company to contain

malware:

Uncontained malware costs an average

sized company:

$1,900,000

$105,900,000 The cost of business disruption due to phishing is:

$66,900,000

Page 18: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

Solutions:

Data Privacy

and Security

Training

Businesses that roll out

training programs see

improvements of between

26 and 99% in their

phishing email click rates,

with an average

improvement of

64%.

17

Source:

2015 Ponemon Institute Research Report: The Cost of Phishing & Value

of Employee Training, sponsored by Wombat Security Technologies, Inc.

Page 19: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

Cyber & Privacy

Liability Insurance

Crime

Insurance

18

Page 20: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

19

Page 21: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

CRIME COVERAGE FOR

SOCIAL ENGINEERING

Section two

20

Steve Leggett – Willis of New York, Inc.

Page 22: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

Social Engineering – Crime Policy

Crime Policy

• loss resulting “directly” from…..

• Indirect or consequential loss exclusion

• Purchase & exchange exclusion

FI Bond

• loss resulting “directly” from…..

• fraudulent entry of “electronic data” or “computer programs”….

• Indirect or consequential loss exclusion

Where is the coverage under a standard FI Bond or Comprehensive Crime

Policy?

21

Page 23: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

Social Engineering

Insurance

• FI Bond

Fraudulent Transfer Instruction Endorsement (covers fraudulent

emails, telefaxes and VIT)

Limit – full

Warranties (sender includes password, PIN or other security code/

recipient was authorized to receive / call back)

Impersonation of Insured’s client, another financial institution or

Insured’s employee acting on behalf of client

• Crime Policy

Limit – sub-limited with few exceptions (excess drop down for

sub-limits)

Warranties (call back to a pre-determined number)

Impersonation of Insured’s client, employee or vendor

Can coverage be purchased?

22

Page 24: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

Social Engineering

Insurance

• ISO conundrum

Strong argument for coverage under the Wire Fraud Insuring Agreement

Definition of “Fraudulent Instruction” – “an electronic … instruction

received by you which purports have been transmitted by an

employee but which was in fact transmitted by someone else…”

Purchase & Exchange Exclusion – limited to Premises & Transit

Insuring Agreements

Confidential Information Exclusion – not intended to apply to loss

otherwise covered under the policy

• Acceptance of Impersonation Fraud Agreement will likely result in

sub-limit of liability

Coverage Warranties (why buy coverage)

Does following policy authentication warranties eliminate potential

for loss?

Coverage Issues

23

Page 25: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

IT AND SECURITY ISSUES

Section three

24

Keith Swiat – RSM

Page 26: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

25

Northeast Director of Privacy and Security

Based out of the NYC office

20+ years experience in:

• Penetration Testing (network and application)

• Vulnerability Assessments

• Code Review

• Crypto analysis

• PCI Compliance

Sensitive Data Security Expert

Who is Keith Swiat

And what is he doing here?

Page 27: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

26

Before We Go Any Further

Some Definitions… “Hackers vs. Attackers”

hack·er noun \ˈha-kər\

A person who’s technologically savvy and enjoys finding solutions to problems.

Being a hacker is more of a mindset. It’s about wanting to improve and fix

things rather than one of wanting to do harm.

We are the good guys.

at·tack·er noun \əˈtakər\

Driven by either personal gain or by promoting political/philosophical ideologies.

These are the guys that:

• Steal identities and commit fraud

• Infect computers with malware, trojans, or viruses

• Phish

• Use denial of service attacks

• Breach security systems to steal or destroy data

• Take intellectual property

They are not true hackers.

Page 28: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

27

Security Misconceptions

The Attackers Are Not Exactly Who You Think They Are

The underground economy has lowered the knowledge threshold

Skilled attackers make more money at less risk by selling their

knowledge in packaged form

• Kits, automation, subscriptions, malware pre-packs, etc.

Result: Pseudo “APT” attackers

• a.k.a. “Idiots with nuclear weapons”

Page 29: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

28

Attack Vectors

Three Most Prevalent Attack Vectors

1. Social Engineering • Why bother to do all the heavy lifting

involved with “hacking” when you can just

ask someone to do something for you?

• While there is a technical component the

attack is against human nature

2. Malware • Finding and purchasing non-detectable

malware in the underground market is

trivial

• Modern anti-virus is an 80-20 proposition at

best

3. Client-Side Attacks • “Traditional” hacking is used post-breach

not as the original entry point

• Current methods focus on web apps and

browser plugins

Page 30: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

29

Social Engineering

The “Gateway” Vector

Why hack hardened electronic defenses when is easier to hack the human.

• Preys on trust between people.

• Very hard to defend against.

Can’t just buy software to protect yourself.

Requires a cultural shift in security mindset.

Morphs an external threat to in internal threat.

Two flavors:

• Electronic (phishing, IM, voice)

• Physical Infiltration (impersonation, piggy backing, malware delivery)

Page 31: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

30

Phising Emails

The New Face of Phishing

Phishing emails no longer look like a third grader created them.

Page 32: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

31

Phising Emails

What is Real and What Isn’t

Example of malicious link.

Page 33: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

32

Data Security Targets

The Bounty

Credential Harvesting

• Attackers stand up fake versions of popular cloud services in order

to get victims to enter credentials.

• Victims are redirected to actual cloud services site without knowing

they have been attacked.

Confidential Data Breach

• Stolen credentials can lead to breach of confidential data stored

within cloud services.

Unauthorized System Use

• Phishing emails may include malware that is can allow attacker to

gain control of systems inside an organization’s network,

effectively turning an external threat to an internal threat.

Page 34: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

33

What Should Organizations Do?

The Human Response vs. The Machine Response

The Human Response

Security awareness programs

• To be effective, programs need to explain the threat, not just tell

people what to do.

• Make employees understand that ALL data they have access to on

the network could be valuable to an attacker.

The Machine Response

Email sandboxing

• Systems the review emails before they are delivered.

Environment Logging (SIEM)

• Scans for anomalous behavior that could be malicious.

Endpoint Protection (A/V)

• Catch malicious software when it is run on a system.

Page 35: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

LEGAL ASPECTS

Section four

34

Judy Selby – BakerHostetler

Page 36: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

Complexities of Privacy and Data Security Compliance

COMPLIANCE

PCI-DSS

HIPAA

HITECH

STATE

PRIVACY

LAWS

(e.g. TX, CA)

INDUSTRY

SELF

REGULATION

FTC

GLBA

STATE

BREACH

NOTIFICATION

LAWS

35

SEC

DISCLOSURE

GUIDANCE

INTERNATIONAL

DATA

PROTECTION

(e.g. EU,

CANADA)

35

Page 37: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

State Laws

47 states, D.C., and U.S. territories

• Laws differ by jurisdiction

• National breach notification law on the table

Varying levels of enforcement by state attorneys general

36

Page 38: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

Decisions, Decisions, Decisions

37

Is it a breach?

• If yes, who needs to be notified?

Do you retain counsel?

Do you involve law enforcement? Regulatory authorities?

Do you hire a forensics company?

Is crisis management necessary?

Do you offer credit monitoring/identity theft protection?

Page 39: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

Litigation: Clapper

Fear from the heightened risk of future identity theft or fraud from a data

breach does not give legal standing to sue by a party whose data may

have been compromised.

“Allegations of future harm can establish Article III standing if that harm

is “certainly impending,” but “allegations of possible future injury are

not sufficient.” Clapper v. Amnesty Int’l USA, 133 S.Ct. 1138, 1147 (2013).

“Our cases do not uniformly require plaintiffs to demonstrate that it is

literally certain that the harms they identify will come about. . . . we have

found standing based on a ‘substantial risk’ that the harm will occur ….”

Clapper at 1150 n.5.

38

Page 40: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

Post-Clapper

Courts accepting defendants’ standing arguments and dismissing the lawsuit

Lewert v. P.F. Chang’s China Bistro, Inc., No. 14 C 923 (N.D. Ill. Dec. 10, 2014)

Remijas v. Neiman Marcus, No. 14 C 1735 (N.D. Ill. Sept. 16, 2014)

In re Science Applications Int’l Corp. (SAIC) Backup Tape Data Theft Litig., No. 12–347 (JEB),

2014 WL 1858458 (D.C. May 9, 2014)

Galaria v. Nationwide Mutual Insurance, No. 2:13-cv-118 (S.D. Ohio, Feb. 10, 2014)

Polanco v. Omnicell Inc., 988 F. Supp. 2d 451 (D.N.J. 2013)

Courts rejecting defendants’ standing arguments and letting the lawsuit proceed

In re: Target Corporate Customer Data Security Breach Litigation, MDL No. 14-2522

(PAM/JJK) (D. Minn. Dec. 18, 2014)

In re Sony Gaming Networks & Customer Data Sec. Breach Litig., 996 F. Supp. 2d 942 (S.D.

Cal. 2014) (settled for $15 million)

Moyer v. Michaels Stores, Inc., No. 14 C 561 (N.D. Ill. July 14, 2014) (court found that there

was standing but found that plaintiffs failed to state a claim for breach of contract and a

violation of the Illinois Consumer Fraud Act)

In re Adobe Sys., Inc., Privacy Litig., No.: 13–CV–05226–LHK, 2014 WL 4379916 (N.D. Cal.

Sept. 4, 2014)

39

Page 41: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

Neiman Marcus

“The plaintiffs allege that the hackers deliberately targeted Neiman Marcus in

order to obtain their credit-card information. . . . [t]here is ‘no need to

speculate as to whether [the Neiman Marcus customers’] information has

been stolen and what information was taken. . . . The Neiman Marcus

customers should not have to wait until hackers commit identity theft or credit-

card fraud in order to give the class standing, because there is an ‘objectively

reasonable likelihood’ that such an injury will occur.” Remijas v. Neiman

Marcus Group, LLC, 794 F.3d 688, 693 (7th Cir. 2015).

“At this stage in the litigation, it is plausible to infer that the plaintiffs

have shown a substantial risk of harm from the Neiman Marcus data

breach. Why else would hackers break into a store’s database and steal

consumers private information? Presumably, the purpose of the hack is,

sooner or later, to make fraudulent charges or assume those consumers’

identities.”

40

Page 42: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

Issuing Banks Class Actions: Real Harm

Standing has not been an issue in cases where the harm is readily ascertainable:

“Target does not challenge Plaintiffs’ allegations with respect to the elements of

causation and damages.” In re Target Corp. Customer Data Sec. Breach

Litigation, 64 F.Supp.3d 1304, 1310 (D. Minn. 2014).

41

Page 43: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

Regulatory & Administrative

In January 2014, SEC indicated that the new standard of care for companies may

require policies in place for:

• Prevention, detection, and response to cyber attacks and data breaches,

• IT training focused on security, and

• Vendor access to company systems and vendor due diligence.

FTC’s Order required business to follow three steps when contracting with third-

party service providers, In re GMR Transcription Svcs, Inc., 2014 WL 4252393 (Aug.

14, 2014):

• Investigate by exercising due diligence before hiring data service providers.

• Obligate their data service providers to adhere to the appropriate level of data

security protections through contractual agreements with provider.

• Verify that the data service providers are adequately protecting data as required

by the contractual standards.

42

Page 44: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

SEC’s Cybersecurity Guidance

SEC Division of Investment Management Cybersecurity Guidance (Apr. 2015)

Contains recommendations that are applicable to all financial firms, including:

Periodically assess their firms’ (i) information and processes, (ii) internal and

external cybersecurity threats and vulnerabilities, (iii) security controls and

processes, (iv) impact of cyber-related events, and (v) governance structures.

Devise cybersecurity strategy to (i) control access to systems and data, (ii)

encrypt data, (iii) restrict use of removable media, (iv) deploy monitoring

software, (v) employ data backup and retrieval, and (vi) develop an incident

response plan.

Implement written police and procedures and training to provide appropriate

guidance.

Assess cybersecurity measures of vendors and business partners.

43

Page 45: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

The SEC’s Long Awaited Cybersecurity “Message” Case

The federal security laws require registered investment advisors to adopt written policies and procedures reasonably designed to protect customer records and information. S.E.C. v. R.T. Jones Capital Equities Management, Consent Order (September 22, 2015).

“Firms must adopt written policies to protect their clients’ private information and they need to anticipate potential cybersecurity events and have clear procedures in place rather than waiting to react once a breach occurs.”

R.T. Jones violated this “safeguards rule” during a four-year period when it had no such policies and hackers accessed more then 100,000 records of individuals, including its clients. The attack was traced to China; no individuals have reported financial harm.

This violated Rule 30(a) of Regulation S-P of the Securities Act of 1933. In settling, R.T. Jones agreed to censure and a $75,000 penalty.

44

Page 46: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

Recent SEC Speeches Suggest CCO Cybersecurity

Cases

June 25, 2015 SEC Commissioner Aguilar: SEC is “currently

investigating multiple data breaches….[,] examining how it can bring more

cybersecurity enforcement actions using its existing authority, and

[determining] how that authority might need to be broadened to meet

emerging cybersecurity threats.”

October 14, 2015 SEC Chief of Staff Donohue: SEC will continue to bring

enforcement actions against CCOs for not addressing compliance issues,

including cybersecurity.

October 16, 2015 SEC Chair Mary Jo White: “While cybersecurity attacks

cannot be entirely eliminated, it is incumbent upon private fund advisers to

employ robust, state-of-the-art plans to prevent, detect, and respond to

such intrusions.”

45

Page 47: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

OCIE Second Cybersecurity Sweep Exam

OCIE’s 2015 Cybersecurity Examination Initiative (September 15, 2015)

OCIE announced second round of cybersecurity examinations to focus on, among

other things: (i) governance and risk assessment, (ii) access rights and controls, (iii)

data loss prevention, (iv) vendor management, (v) training, and (vi) incident

response.

Included with the Risk Alert was a sample document request seeking information on

those topic areas (as highlighted below) that is a helpful guide to regulatory focus

and priorities

• Policies and procedures

• Board minutes and briefing materials

• Info on the Chief Information Security Officer or equivalent position

• Risk assessment findings and remediation

• Training to employees, vendors, and business partners

46

Page 48: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

UNITED STATES SECURITIES AND EXCHANGE COMMISSION

WASHINGTON, D.C. 20549

FORM 8-K

CURRENT REPORT PURSUANT TO SECTION 13 or 15(d) OF THE

SECURITIES EXCHANGE ACT OF 1934

Date of Report (Date of earliest event reported): August 4, 2015

UBIQUITI NETWORKS, INC. (Exact name of registrant as specified in its charter)

Delaware (State or other jurisdiction of incorporation)

001-35300 32-0097377 (Commission File Number) (IRS Employer Identification No.)

2580 Orchard Parkway San Jose, CA 95131

(Address of principal executive offices, including zip code) (408) 942-3085

(Registrant’s telephone number, including area code) N/A

(Former name or former address, if changed since last report)

47

Page 49: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

UBIQUITI NETWORKS

Item 8.01 Other Events

48

Business Fraud

On June 5, 2015, the Company determined that it had been the victim of a criminal fraud. The incident

involved employee impersonation and fraudulent requests from an outside entity targeting the

Company’s finance department. This fraud resulted in transfers of funds aggregating $46.7 million held

by a Company subsidiary incorporated in Hong Kong to other overseas accounts held by third parties.

As soon as the Company became aware of this fraudulent activity it initiated contact with its Hong Kong

subsidiary’s bank and promptly initiated legal proceedings in various foreign jurisdictions. As a result of

these efforts, the Company has recovered $8.1 million of the amounts transferred. Furthermore, an

additional $6.8 million of the amounts transferred are currently subject to legal injunction and reasonably

expected to be recovered by the Company in due course. The Company is continuing to pursue the

recovery of the remaining $31.8 million and is cooperating with U.S. federal and numerous overseas law

enforcement authorities who are actively pursuing a multi-agency criminal investigation. The Company

may be limited in what information it can disclose due to the ongoing investigation. The ultimate amount

of the loss will depend, in part, on the Company’s success in recovering the funds. The Company may

not be successful in obtaining any insurance coverage for this loss. The Company currently believes this

is an isolated event and does not believe its technology systems have been compromised or that

Company data has been exposed. While this matter will result in some additional near-term expenses,

the Company does not expect this incident to have a material impact on its business or its ability to fund

the anticipated working capital, capital expenditures and other liquidity requirements of its ongoing

operations.

Page 50: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

UBIQUITI NETWORKS

Item 8.01 Other Events (cont.)

49

The Audit Committee of the Company’s Board of Directors has conducted an

independent investigation into this matter with the assistance of outside advisors. The

investigation concluded on July 17, 2015. The investigation uncovered no evidence

that our systems were penetrated or that any corporate information, including our

financial and account information, was accessed. The investigation found no evidence

of employee criminal involvement in the fraud. As a result of this investigation, the

Company, its Audit Committee and advisors have concluded that the Company’s

internal control over financial reporting is ineffective due to one or more material

weaknesses. The Company has implemented enhanced internal controls over

financial reporting since June 5, 2015 and is in the process of implementing additional

procedures and controls pursuant to recommendations from the investigation.

Page 51: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

Officer & Director Liability

Boards that choose to ignore, or minimize the importance of cybersecurity oversight

responsibility do so at their own peril.

SEC Commissioner Luis A. Aguilar, June 10, 2014

Shareholder Derivative Litigation

Target: Verified Shareholder Derivative Complaint, In re Target Corporate Shareholder Derivative

Litig., No. 0:14-cv-00203-PAM-JJK (D. Minn. Jan. 21, 2014)

Wyndham: Verified Shareholder Derivative Complaint, Palkon v. Holmes, No. 2:14-cv-01234-

SRC-CLW (D. N.J. May 2, 2014)

TJX Companies, Inc.: Verified Shareholder Derivative Complaint, Louisiana Municipal Police

Employees Retirement Fund v. Alvarez, Civ. No. 5620-VCN (Del. Ch. July 2, 2010)

Securities Fraud Class Action Litigation

Heartland Payment Systems: In re Heartland Payment Sys., Inc., No. 09-1043, 2009 WL

4798148 (D. N.J. Dec. 7, 2009)

50

Page 52: SOCIAL ENGINEERING: The Hacking of the Mind · SOCIAL ENGINEERING: The Hacking of the Mind November 5, 2015 . ... • Penetration Testing (network and application) • Vulnerability

51

Questions?

The observations, comments and suggestions we have made herein are advisory and are not intended

nor should they be taken as legal advice. Please consult your professional advisors on legal, tax,

accounting and human resource issues for an analysis of your specific facts and circumstances.

FOR FURTHER INFORMATION, PLEASE CONTACT:

Shahri Griffin, Senior Vice President, Co-Practice Leader

Financial Institutions Group, Client Advocacy

Willis of New York, Inc., Brookfield Place, 200 Liberty Street, New York, NY 10281

Direct: 212-915-8715 Mobile: 973-715-8282 [email protected]


Recommended