- About Us
- Business Continuity/DR/Backup
- Oracle Solutions
- RSA Avesksa
- Bradford Networks
- Cyber Ark
- Skyport Systems
- DIR Products
- Contact Us
What IT Can Learn from Target’s Data Breach
[Update, February 6, 2:42 PM: The security blog Krebs on Security has new revelations concerning the Target breach, including that the hackers may have used the network credentials belonging to a HVAC contractor to gain access to the environment. The blog also quotes a Gartner analyst who estimates that Target may be facing losses up to $420 million as a result of the breach.]
For 19 days during the 2013 holiday shopping season, thieves collected credit and debit card information from 40 million shoppers at Target. The stolen information included everything stored on the card’s magnetic stripe—card numbers, customer names, expiration dates, encrypted security codes for credit cards, and encrypted PINs for debit cards. Target’s data breach is the second-largest reported ever for the retail industry.
Assume a Data Breach, Then Use ExtraHop
For IT teams, the data breach at Target reaffirms the need for healthy paranoia. Primarily, this means shifting from a protect-the-perimeter stance to an assumption that your systems have already been breached. If you wake up every morning assuming that bad actors—Russian crime syndicates, hacktivists, or disgruntled employees—are already at work inside your network, then you’ve got the right mindset.
For security-conscious team members across the IT organization, ExtraHop plays a key role in helping to detect and investigate data breaches. Security industry analysis shows that detection and containment processes are shockingly slow and reactive. Verizon’s 2013 Data Breach Investigations Report reveals that 66 percent of data breaches go undiscovered for months or longer, as illustrated in the charts below.
As the report puts it, “Prevention is crucial, and we can’t lose sight of that goal. But we must accept the fact that no barrier is impenetrable, and detection/response represents an extremely critical line of defense.”
How One Major Retailer Caught a Data Thief with ExtraHop
ExtraHop’s wire data analytics can help IT teams detect and contain data breaches faster. While no technology is a cure-all, numerous customers have used ExtraHop to identify anomalous behavior, quickly determine the root cause, and then take remedial action.
One large online retailer uses ExtraHop to monitor the databases at the heart of their popular e-commerce site and applications, handling thousands of transactions per second and storing sensitive customer data. The retailer uses ExtraHop primarily to monitor database performance by passively recording methods and errors, as well as network and server processing time. However, ExtraHop proved to be a critical security forensics tool as well.
The retailer had noticed that some database responses were much larger than the normal <2KB size. To investigate, the IT team modified their ExtraHop analysis in minutes using Application Inspection Triggers, a programmatic interface to the ExtraHop Context and Correlation Engine. Their trigger captured the client IP address, timestamp, user name, and SQL query for every response over 10MB. This revealed that an application server in another datacenter had been compromised. Disabling the user, the IT team stopped the data exfiltration.
This example underscores the flexibility of ExtraHop’s wire data analytics platform. By passively analyzing all transactions, the IT team was able to obtain precisely the data it needed without adding any overhead. If the IT team were to run a SQL profiler on the database, it could take hours to create, run, and analyze traces—not to mention severely impact the performance of the e-commerce application in the process. ExtraHop’s approach makes much more sense.
Use Wire Data Analytics to Detect and Investigate Data Breaches
Perimeter defenses are critical but none are impenetrable. Bad guys will get in (or are already, if they are insiders). To prepare, IT needs continuous, pervasive monitoring to detect anomalous activity and an analytics capability that facilitates fast, ad hoc investigations. ExtraHop’s wire data analytics meets this need.
The video below demonstrates how to use the free ExtraHop Discovery Edition to use wire data to detect potential data leakage.
Monday through Friday
8:00am - 6:00pm
Our Office Locations
Southwest Regional Office:
5729 Lebanon Road, Suite 144
Frisco, TX 75034
Southeastern Regional Office:
10200 NW 25th Street, Suite #207
Doral, Florida 33172
Atlantic Regional Office:
1705 Holbrook Street
Greensboro, NC, 27404
Phone and Fax
- Office Hours