6
How 16 Penetration Tests Missed A Vulnerability Which Could’ve Cost One Company Over $103 Million In PCI Fines CASE STUDY

CASE STUDY How 16 Penetration Tests Missed A Vulnerability ...€¦ · How 16 Penetration Tests Missed A Vulnerability Which Could’ve Cost One Company Over $103 Million In PCI Fines

  • Upload
    others

  • View
    8

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CASE STUDY How 16 Penetration Tests Missed A Vulnerability ...€¦ · How 16 Penetration Tests Missed A Vulnerability Which Could’ve Cost One Company Over $103 Million In PCI Fines

How 16 Penetration Tests Missed A Vulnerability Which Could’ve Cost One Company Over $103 Million In PCI Fines

CASE STUDY

Page 2: CASE STUDY How 16 Penetration Tests Missed A Vulnerability ...€¦ · How 16 Penetration Tests Missed A Vulnerability Which Could’ve Cost One Company Over $103 Million In PCI Fines

IN A RECENT ENHANCED RED TEAM/ADVANCED PENETRATION TEST, OUR TEAM OF TESTERS UNCOVERED A MAJOR VULNERABILITY IN A CLIENT’S NETWORK. THIS VULNERABILITY GAVE THEM ACCESS TO DATA, WHICH HAD BEEN THERE SINCE 2012. IF OUR TEAM HAD BEEN A GROUP OF HACKERS, THIS BREACH WOULD HAVE COST THE COMPANY OVER $103 MILLION IN PCI FINES ALONE.

The interesting fact about this study is that the company had been getting “penetration testing” quarterly every quarter since 2012 by various notable companies. We uncovered the information in the 4th quarter of 2016.

That is a total of 16 penetration tests by 7 different vendors that missed the vulnerability.

16 PENETRATION TESTS

How 16 Penetration Tests Missed A Vulnerability Which Could’ve Cost One Company Over $103 Million In PCI Fines | withum.com

7 DIFFERENTVENDORS

ALL MISSEDVULNERABILITY

Page 3: CASE STUDY How 16 Penetration Tests Missed A Vulnerability ...€¦ · How 16 Penetration Tests Missed A Vulnerability Which Could’ve Cost One Company Over $103 Million In PCI Fines

MOST CYBER RISKSARE HIDDENSimilar to an iceberg, most vulnerabilities are hidden from automated and compliance-driven vulnerability scanning and penetration testing. Taking an enhanced red teaming approach to advanced penetration testing finds risks “below the surface” by manually emulating the aggressive actions of a hacker. The Withum Cyber approach involves human cyber operations experience, tools, tactics, and procedures at each stage of the test. It has been determined, by comparing test results for organizations that have employed multiple testing methodologies, that applying deep hands-on technical experience towards finding organization-specific vulnerabilities is a truly comprehensive way of identifying and analyzing a network’s level of security.

How Did 16 “Pen Tests” Miss This Vulnerability?

How 16 Penetration Tests Missed A Vulnerability Which Could’ve Cost One Company Over $103 Million In PCI Fines | withum.com

Because of the way they are being tested. Each penetration test prior to ours had relied heavily on automated

tools to identify vulnerabilities. The pen testing teams would run automated scans and then perform manual

tests of the results. The problem with that is automated tools only look for publicly known vulnerabilities in

systems – leaving vulnerabilities in custom applications or undiscovered “zero day” vulnerabilities unidentified.

10%Documented and easily-detected vulnerabilities

90%Organization-specific

vulnerabilities detectedonly through advanced

penetration testing

Average time it takesan organization to

identify a cyber attack

295

Page 4: CASE STUDY How 16 Penetration Tests Missed A Vulnerability ...€¦ · How 16 Penetration Tests Missed A Vulnerability Which Could’ve Cost One Company Over $103 Million In PCI Fines

AN ENHANCED BLUE TEAM APPROACH TO ADVANCED PENETRATION TESTING EMULATES THE ACTIVITIES THAT ADVANCED PERSISTENT THREAT ACTORS (SUCH AS NATION-STATE THREATS OR ORGANIZED CRIME) WOULD CARRY OUT AGAINST YOUR ORGANIZATION.

Beyond a scan for vulnerabilities, this advanced level of testing takes advantage of the training, experience, and adaptability of our penetration testing specialists in finding, exploiting, and leveraging vulnerabilities to gain access and determine the impact of that access on the organization.

What Is Enhanced Teaming?

VULNERABILITY ASSESSMENT TRADITIONAL PENETRATION ENHANCED BLUE TEAMING/ADVANCED PENETRATION TESTING

SCOPING Limited Limited to scan results Comprehensive

SKILL LEVEL REQUIRED Tutorial Needed Training Required Advanced Degree

OBJECTIVE Broad scanning for information gathering

Utilize broad scanning to manually test a network for compliance driven

needs.

Uncover as many vulnerabilites as possible using the resources leveraged

by real attackers.

TECHNIQUES

Fully automated using software which identifies publicly known

vulnerabilities.

Driven by automation with penetration testers manually testing the findings uncovered by automated

scanning.

Human driven with a team of hackers focused on your network identifying

vulnerabilities unique to your network.

THREAT EMULSION None Partial Advanced Persistent Threat Emulation

REPORTINGComputer generated report with

unverified information and no determination of business impact.

Computer generated report which is verified by penetration tester

reducing the amount of false positives.

Narrative report with actionable remediation steps and verified

intelligence determining the business impact of all findings.

It is important to understand the difference in the complexity and depth of testing levels, and why WITHUM CYBER uses an enhanced red team approach to penetration testing.

Page 5: CASE STUDY How 16 Penetration Tests Missed A Vulnerability ...€¦ · How 16 Penetration Tests Missed A Vulnerability Which Could’ve Cost One Company Over $103 Million In PCI Fines

Key Learnings

There is a vast difference in definitions of “penetration testing.” Make sure you understand the difference in the level of testing you are receiving.

ONE TWO

As cybercrime continues to grow and being an increasing threat, you must start to conduct more comprehensive testing in order to truly remain secure and build your cyber resilience.

THREE FOUR

Becoming a “want to know” organization and proactively looking for threats and vulnerabilities is imperative.

An enhanced blue teaming approach to penetration testing is the only way to uncover organization specific vulnerabilities.

How 16 Penetration Tests Missed A Vulnerability Which Could’ve Cost One Company Over $103 Million In PCI Fines | withum.com

10101001001010010010100101010010100100000100101001010100101010010101010100101010010101010010101001010001001000010010010100100010010010101000001001001010101001001010100101001010101001001001001010010101001010010100101010100101001010010101001010000010

Page 6: CASE STUDY How 16 Penetration Tests Missed A Vulnerability ...€¦ · How 16 Penetration Tests Missed A Vulnerability Which Could’ve Cost One Company Over $103 Million In PCI Fines