• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Cyber Security Capstone

Temple University

Cyber Security Capstone

MIS 5903.711 ■ Summer 2022 ■ William Bailey
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • Week 01: Introduction
    • Week 02: Security and Risk Management
    • Week 03: Asset Security
    • Week 04: Security Engineering
    • Week 05: Communication and Network Security
    • Week 06: Identity and Access Management
    • Week 07: Security Assessment and Testing
    • Week 08: Security Operations
    • Week 9: Software Development Security
  • Assignments
    • Reading Assignments
    • Weekly Discussion Questions
    • In the News Article
    • Team Presentation
  • Quizzes
  • Group Project Discussion
    • Team 1 – Banking
    • Team 2 – Healthcare
    • Team 3 – Power Utility
    • Team 4 – Retail

Week 6: In the News – Compromised Identities, Improper Use of Access

June 10, 2022 by William Bailey 12 Comments

For this week’s “In the News”, research an article that centers around how identities were compromised to provide access, or how an account that was otherwise authorized was then used for unauthorized purposes.

Filed Under: Week 06: Identity and Access Management Tagged With:

Reader Interactions

Comments

  1. Anthony Wong says

    June 11, 2022 at 6:44 pm

    In April 2022, Cash App filed a report with the Securities and Exchange Commission (SEC) explaining the company had a security breach affecting approximately 8.2 million customers. It was disclosed that a former employee downloaded company reports containing customer data who used Cash App’s investing services, which included social security numbers, credit card information, date of birth, and first and last names. The article does not mention anymore details around the former employee, but an important question to answer is whether the employee required access to these reports. Additionally, was the former employee still with Cash App at the time of the breach? If no, why does Cash App not have a policy that has an user account decommissioning process?

    In the second article, I found that the former employee was authorized to access this information, but the report was downloaded after he was no longer employed with Cash App. It is surprising to me that Cash App did not have a DLP solution implemented to monitor the egress points for sensitive information and prevent it from leaving the network.

    Source:
    https://news.trendmicro.com/2022/04/07/cash-app-data-breach/
    https://www.usatoday.com/story/money/2022/04/06/cash-app-data-breach/9490327002/

    Log in to Reply
    • William Bailey says

      June 12, 2022 at 7:12 am

      Before I comment too much about this article, what kind / how many controls should have been present in Cash App’s Information Security Program?
      (hint – there is no silver bullet, and think before/after the breach, because Cash App is still in business; how do they minimize the likelihood or impact of the next breach attempt?)

      Log in to Reply
      • Anthony Wong says

        June 12, 2022 at 9:19 pm

        I think Cash App would need to implement a DLP solution to monitor the egress points for any information higher than confidential to prevent it from leaving the network. Furthermore, Cash App may want to implement a tokenization server to replace the sensitive data with tokens or mask the data and encrypt it at rest. Additionally, Cash App should implement a policy and process to deactivate user’s access as part of the onboarding process.

        Log in to Reply
  2. Kelly Sharadin says

    June 11, 2022 at 8:56 pm

    In this article from ZDnet, cyber criminals are increasing their “dwell time” within networks to an average of 15 days. There have even been instances of multiple competing criminals gaining and maintaining access to network within the same time frame. This increased dwell time, allows criminals to amass a greater repository of organizational intelligence to launch more sophisticated attacks. Sophos, a leading security company, reports that in 2021, 47% of successful attacks used unpatched security vulnerabilities to gain initial access. The article goes on to highlight that strained and under resourced security departments are failing to detect suspicious activity within their networks. Business email compromise is often a result of increased criminal dwell time. Strong identity access logging is critical for investigating suspicious user activity such as enumeration and exfiltration of business data

    https://www.zdnet.com/article/hackers-are-now-hiding-inside-networks-for-longer-thats-not-a-good-sign/

    Log in to Reply
  3. Kyuande Johnson says

    June 12, 2022 at 5:15 pm

    A large-scale phishing attack was uncovered by PIXM, as well as the person who had been carrying out the attacks.
    Anti-phishing company PIXM found that a fake login portal for Facebook was being used as a stand-in for the social network site’s landing page, and that users were entering their account information in an attempt to log in to the site only to have their information stolen. Ensuring that MFA is enabled on all social media platforms is essential. The threat actor was able to obtain the login information of users who imputed their credentials into the portal. Enabling MFA would’ve prevented the threat actor from login into the account. In most cases, people use the same social media user name and passwords for other online services such as banking.

    Log in to Reply
    • Kyuande Johnson says

      June 12, 2022 at 5:16 pm

      https://www.techrepublic.com/article/a-cybercriminal-stole-1-million-facebook-account-credentials-over-4-months/

      Log in to Reply
    • Kelly Sharadin says

      June 12, 2022 at 7:29 pm

      Yikes! I would say go one step farther – enforce MFA. Many times I’ve audited a company who says “oh, yeah we have MFA”. Unfortunately, enabled != enforced. If users are provided the option to voluntarily enroll in MFA they will delay as long as possible best to enforce MFA in my opinion.

      Log in to Reply
  4. Shubham Patil says

    June 12, 2022 at 8:05 pm

    I found an interesting article of a woman who is accused of downloading data of more than 100 million Capital One customers. Her lawyers argue a conviction would criminalize legitimate research practices.

    This article shows why zero-trust model is important for enterprises today, Ms. Thompson, 36, is accused of violating an anti-hacking law known as the Computer Fraud and Abuse Act, which forbids access to a computer without authorization. In 2019, she downloaded personal information belonging to more than 100 million Capital One customers, The data came from applications for credit cards, and included 140,000 Social Security numbers and 80,000 bank account numbers. She faces 10 counts of computer fraud, wire fraud and identity theft. s. Thompson has pleaded not guilty, and her lawyers say her actions — scanning for online vulnerabilities and exploring what they exposed — were those of a “novice white-hat hacker.”

    https://www.nytimes.com/2022/06/08/technology/capital-one-hacker-trial.html

    Log in to Reply
  5. Mohammed Syed says

    June 12, 2022 at 9:01 pm

    https://www.jdsupra.com/legalnews/compromised-email-account-leads-to-data-9566510/
    In this digital era, the attacker is brilliant, and they always try new techniques to gather authorized authentication. They use social engineering and advanced technology to compromise security authentication of legal account credentials, maximum security of hardware, and software failure to social engineering attack due to its attacks directly on human nature. The above news article LLC confirmed that the company experienced a data breach after an unauthorized party accessed sensitive consumer information through employee email accounts using names, social security numbers, driver’s license numbers, and state identification numbers.
    As per the investigation, all data breaches happen due to attackers hacking the employee email address between 4 to 18 Nov 2021. Late they breach all sensitive databases of individual consumers, in that including social security numbers and state identification numbers. On May 27, 2022, LLC issued a Notice of Data Breach to all individuals whose information was compromised due to the incident. They do not clarify how it happened and how the hacker got sensitive information, but it is clear it happened due to an employee’s email id being hacked by attackers. To hack email addresses, attackers use social engineering techniques like phishing, spyware, malware, keyloggers, and another attack to get email authentication and credentials.
    Thus, it is mandatory and essential that they provide appropriate steps to educate all employees about the risk of data security, aware of social engineering attack techniques, phishing emails, and all other challenging threats to businesses. It all happens due to one email account being accessed by a third party, damaging the whole organization’s reputation and consumers’ sensitive information.

    Log in to Reply
  6. Vraj Patel says

    June 12, 2022 at 9:20 pm

    According to research conducted by the Microsoft Security Response Center (MSRC), malicious actors can get unauthorized access to an online account even before the user has created it. According to their research, pre-hijacking attacks are more vulnerable to high-traffic services. The malicious actors capture basic information about the victim, such as their name and email address, and then use that information to get access to services that the user does not utilize but has access to via federated authentication. To mitigate this attack, they also recommend using multi-factor authentication wherever possible.

    Reference:
    https://portswigger.net/daily-swig/dozens-of-high-traffic-websites-vulnerable-to-account-pre-hijacking-study-finds

    Log in to Reply
  7. Antonio Cozza says

    June 13, 2022 at 9:37 pm

    This article raises a pretty painful point regarding cloud identity and access management; many teams implementing cloud identities are not focusing on access controls for both standard and even privileged enterprise accounts! The result of this is that attackers are able to execute simple browser exploits and remain undetected in organizations’ cloud environments for extended periods of time. The MFA lack of enforcement sentiment continues in this case as well; according to Aaron Turner, VP of SaaS Posture of cybersecurity company Vectra, as all entry points into the cloud environment are, at large, not being covered by MFA – only 1 interface is. This leaves the rest open to attacks that render the one MFA interface useless.

    https://securityboulevard.com/2022/04/mismanaged-iam-can-lead-to-data-breaches/

    Log in to Reply
  8. Mitchell Dulaney says

    June 15, 2022 at 9:53 am

    “Kaiser Permanente Exposes Nearly 70K Medical Records in Data Breach”

    Personal health information related to roughly 70,000 patients was compromised when a Kaiser Permanente employee’s account credentials were stolen. The employee fell victim to a phishing attempt, and the attacker used their credentials to access their emails for a period of several hours before the company “terminated the activity”. Those emails contained patient medical records, which the attacker could use to launch further social engineering campaigns against the patients themselves. Strangely, Kaiser cannot confirm or deny whether the attacker actually accessed the emails containing the PHI, because their auditing logs don’t include such information. Because of this uncertainty, and the fact that Kaiser was forced to notify all 70,000 potentially-impacted patients, many experts say that the company has insufficient incident response procedures. This case is proof that it is critical that organizations implement detailed audit logs related to information asset access, including such granular details as which emails are viewed in an employee’s mailbox.

    https://threatpost.com/kaiser-permanente-breach/179949/

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Week 01: Introduction (1)
  • Week 02: Security and Risk Management (2)
  • Week 03: Asset Security (2)
  • Week 04: Security Engineering (2)
  • Week 05: Communication and Network Security (2)
  • Week 06: Identity and Access Management (2)
  • Week 07: Security Assessment and Testing (2)
  • Week 08: Security Operations (2)
  • Week 09: Software Development Security (2)
  • Week 10: New Trends (2)
  • Week 11: Incident Response (2)
  • Week 12: IT Security (2)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in