8 hours 28 minutes
Hello and welcome to another application of the minor attack framework discussion. So today we're going to be going through our case study for the initial access phase of minor. And so you might be asking. Well, what is it that we're going to be looking at? Well,
we're going to be looking at HSBC discloses a security incident and so I'm got for us here. Some excerpts from the notification letter under there. What happened and what information was involved. Section
Now, I do encourage you to you can You can do a quick Google search and just find this pdf document and you can view it and see it and kind of feel it and mark it up. Whatever the case may be, is your going through this process?
So what happened? So HSBC became aware of online accounts being access by unauthorised users. Between October 4th 2018 and October 14th 2018
when HSBC discovered your on line account was impacted, we suspended online access to bribe prevent further unauthorised entry of your account.
You may have received a call or email from us so we could help you change your arm on banking credentials and access your account. If you need help accessing your account, please call and a number was provided there.
We apologize for this inconvenience. HSBC takes this very seriously and the security of your information is very important to us.
What information was involved? The information that may have been accessed include your full name mailing address, phone number, email address, date of birth, account number, account types, account balances, transaction histories,
pay account information and statement history where available
now In my mind, this was a very big amount of information. As far as the type of information. Had it just been names and maybe simp own numbers, that would have been, Ah, little, you know, frustrating because then we're dealing with maybe spammers or something like that,
but data, birth, email, address, phone numbers, mailing addresses, account types and balances.
Everything that's involved here is a perfect storm for threat actors or identity thieves to try and compromise other accounts or opposes thes users because they have a lot of legitimate information that was involved here. So
what should have been done? So this is where you come into play as faras dealing this case study. So sources indicated that credential stuffing was a likely reason that accounts were compromised. So this is when an attacker uses a combination of user names and passwords, which may have been obtained from a previous breach. Okay,
so that's important. We discussed this invalid accounts when we talked about valid accounts.
In that threat, actors will purchase or compromise one system and get a list of user names and passwords,
and then they will pass those through other systems and attempt to gain access to user accounts. So the first thing that we want to look at is in the minor framework, which in its initial access vector, most suits this scenario.
And would the mitigating factors under that vector have prevented or reduced the risk with compromise? And so what I encourage you to do
is read the information concerning the HSBC security incident, understand the language that they're using and the scenario, and then see if there were any particular mitigating factors that could have been applied based on the vector you choose
that could have reduced risk or potentially
prevented such a thing from happening Now, the other thing that we run into here is
when we talk about this potentially being from a separate compromise where user name and passwords were exposed
and the threat actors just used the user names and passwords that were used on other sites by the end users.
Do the users of the bank have any culpability
if they re used credentials? And so you have to ask yourself,
in this day and age, when we're aware of
the threats that are out there when we're being told to not reuse passwords across multiple accounts, especially banks or mortgages or, you know things of that nature, financial information, credit, check data, health information
and we've got tools out there that help us to manage passwords and set complex passwords and implement multi factor authentication,
do the end users have any culpability? They're now The bank ultimately
you know, clean up the mess and implement additional controls. They could have been, you know, done certain things that we won't discuss here because that's part of your case study.
But you have to bring into this, you know, user culpability. And while it's ultimately
not 100% the banks fault or 100% the end users fault,
there needs to be better hygiene and better practices there as well. So think about some controls that, as in users, we need to take advantage of to protect ourselves as well. Edger writing up this particular review and looking at controls against this particular case. So with that in mind,
I want to thank you for your time today,
and I look forward to seeing you again soon.
Become an Incident Handler
In this Career Path, you will learn the incident response process, from building an incident ...
Information Security Fundamentals
The foundational networking and security concepts taught in this career path form the backbone of ...