SlideShare a Scribd company logo
1 of 24
After the BreachAfter the Breach
Dennis SchmidtDennis Schmidt
Director, Office of Information SystemsDirector, Office of Information Systems
HIPAA Security OfficerHIPAA Security Officer
UNC School of MedicineUNC School of Medicine
OMG, We have a breach!OMG, We have a breach!
 In late July, 2009, UNC Information Technology
employees discovered that a server which
contained sensitive information on 180,000
research subjects, including 114,000 Social
Security Numbers, had been the target of a
computer hack in 2007. The compromised
server was taken down and the data on the
server were removed.
Incident DiscoveryIncident Discovery
 OIS receives call from departmental serverOIS receives call from departmental server
admin reporting that a server would not rebootadmin reporting that a server would not reboot
after power failure.after power failure.
 OIS technician suspects virus and performs fullOIS technician suspects virus and performs full
virus scan on machine. Virus detected.virus scan on machine. Virus detected.
 Technician is told by department that server mayTechnician is told by department that server may
contain sensitive information.contain sensitive information.
 Server turned over to OIS Information SecurityServer turned over to OIS Information Security
for forensic analysis.for forensic analysis.
Forensic AnalysisForensic Analysis
-- A Long, Painful Process ---- A Long, Painful Process --
 Verification – Verify the incident occurred
 Interview the SysAdmins and other users involved
 Examine system and application logs (Snort, Tipping
Point, etc.)
 Check volatile information using forensic tools
 System Description
 Physical observation, forensic tools
 Interview SysAdmins and users, determine use
 Hardware and software system characteristics
 Hard disk geometry
Forensic Analysis (cont.)Forensic Analysis (cont.)
 Evidence Collection
 All available computer information (volatile and
non-volatile) is collected and transferred to external
media or forensic workstation to perform analysis
tasks.
 Data must be collected in order of volatility and data
integrity safeguarded by hash signature, MD5
Forensic Analysis (cont.)Forensic Analysis (cont.)
 Timeline Creation & Analysis – Use time-stamps
from internal and external sources to correlate
into timeline that traces back the system activity.
 Media Analysis – Thorough examination of the
media layers (physical, data, metadata, file system
and file name) searching for evidence.
Forensic Analysis (cont.)Forensic Analysis (cont.)
 Data Recovery – extracting unallocated data in
order to recover any deleted files. File
fragments could represent a critical piece of
information relevant to the case
 String Search – searching for specific strings or
keywords contained inside files to reveal useful
information relevant to the case.
 Reporting -- detailed report(s) of the forensic
process explaining the evidence found, together
with the techniques and methodology used.
Houston, We have a problem!Houston, We have a problem!
 Virus/worm/trojan infection for 2 yearsVirus/worm/trojan infection for 2 years
 26 files containing over 500,000 records26 files containing over 500,000 records
 180,000 unique research subjects180,000 unique research subjects
 114,000 Social Security Numbers114,000 Social Security Numbers
Qualys Scan ResultsQualys Scan Results
But, did they get anything?But, did they get anything?
 When did compromise occur? Is it still active?When did compromise occur? Is it still active?
 When were the sensitive files put on theWhen were the sensitive files put on the
machine? When were they last accessed?machine? When were they last accessed?
 Was it during the compromise window?Was it during the compromise window?
 Is there any corroborating evidence on theIs there any corroborating evidence on the
network of file downloads from the server?network of file downloads from the server?
The Antivirus DilemmaThe Antivirus Dilemma
 Full virus scan changes the last accessed time onFull virus scan changes the last accessed time on
everyevery file.file.
 It now becomes impossible to determine if theIt now becomes impossible to determine if the
malware actually accessed specific files.malware actually accessed specific files.
 e.g., If compromise occurred one week ago, and laste.g., If compromise occurred one week ago, and last
access of sensitive file was one month ago, you knowaccess of sensitive file was one month ago, you know
the data was not likely accessed by the malware.the data was not likely accessed by the malware.
 If virus scan was done yesterday, you no longerIf virus scan was done yesterday, you no longer
know when the file was last accessed.know when the file was last accessed.
No Smoking GunNo Smoking Gun
 There was no way to prove that data on theThere was no way to prove that data on the
server was accessed inappropriately.server was accessed inappropriately.
 And… there was no way to prove that data onAnd… there was no way to prove that data on
the server wasthe server was notnot accessed inappropriately.accessed inappropriately.
 The doors were unlocked and people were in theThe doors were unlocked and people were in the
house, but we couldn’t prove that they stolehouse, but we couldn’t prove that they stole
anything.anything.
Second OpinionSecond Opinion
 Magnitude of potential breach warrantedMagnitude of potential breach warranted
additional opinionsadditional opinions
 ITS Security conducted parallel investigation toITS Security conducted parallel investigation to
verify or refute initial findingsverify or refute initial findings
 Additional corroborating data searchedAdditional corroborating data searched
 Network traffic logs (only last 90 days)Network traffic logs (only last 90 days)
Notification is not an IT DecisionNotification is not an IT Decision
 University Counsel makes final recommendationUniversity Counsel makes final recommendation
based on inputs from:based on inputs from:
 IT Security (OIS & ITS)IT Security (OIS & ITS)
 University RelationsUniversity Relations
 UNC Health Care Communications/MarketingUNC Health Care Communications/Marketing
 UNC Health Care CounselUNC Health Care Counsel
 HIPAA Privacy and HIPAA Security OfficersHIPAA Privacy and HIPAA Security Officers
How do we notify 180,000 people?How do we notify 180,000 people?
 Is their address current? Do we have anIs their address current? Do we have an
address?address?
 Are they still alive?Are they still alive?
 Who writes the letters?Who writes the letters?
 Who addresses the envelopes? Licks theWho addresses the envelopes? Licks the
stamps?stamps?
 Who handles phone calls from concernedWho handles phone calls from concerned
recipients?recipients?
The Notification ProcessThe Notification Process
 UNC Hired Rust Consulting to assistUNC Hired Rust Consulting to assist
 Consultation servicesConsultation services
 Mailed notification lettersMailed notification letters
 Established and staffed Call CenterEstablished and staffed Call Center
 Responded to calls; referred problem calls to UNCResponded to calls; referred problem calls to UNC
 Received 4,144 callsReceived 4,144 calls
 450 calls referred to UNC450 calls referred to UNC
Technical ResponseTechnical Response
 Major concern: Uncontrolled serverMajor concern: Uncontrolled server
proliferationproliferation
 Determine scope of problemDetermine scope of problem
 Protect high risk machines firstProtect high risk machines first
 Develop long term strategy to mitigate riskDevelop long term strategy to mitigate risk
The Scope of the ProblemThe Scope of the Problem
 500+ machines with server OS’s on SOM500+ machines with server OS’s on SOM
networknetwork
 2200 machines running a service2200 machines running a service
 2068 File Server / File Services2068 File Server / File Services
 1989 Remote Access / Remote Management1989 Remote Access / Remote Management
 762 Web Servers762 Web Servers
 194 Database Servers194 Database Servers
Manual Data CollectionManual Data Collection
 Mandatory self reporting of serversMandatory self reporting of servers
 433 servers reported433 servers reported
 98 server admins98 server admins
 47 different OS flavors and versions47 different OS flavors and versions
 Qualys scans on all servers reporting sensitiveQualys scans on all servers reporting sensitive
information (200 machines)information (200 machines)
Long Range StrategyLong Range Strategy
 IT Simplification and Security RFP (Dell)IT Simplification and Security RFP (Dell)
 Develop Plan for streamlining IT resources in SOMDevelop Plan for streamlining IT resources in SOM
 Develop strategic virtualization architectureDevelop strategic virtualization architecture
 Develop enterprise storage architectureDevelop enterprise storage architecture
 Develop security umbrella to cover centralizedDevelop security umbrella to cover centralized
operationoperation
 Goal: Provide robust centralGoal: Provide robust central servicesservices that willthat will
get end users out ofget end users out of serverserver businessbusiness
Recovery from the breachRecovery from the breach
 Moved data to centrally managed serversMoved data to centrally managed servers
 Database encrypted behind hardware firewallDatabase encrypted behind hardware firewall
 All working files encrypted with PGP Net ShareAll working files encrypted with PGP Net Share
 All machines, including desktops, scanned with QualysAll machines, including desktops, scanned with Qualys
 Well defined procedures documented, approved by IRBWell defined procedures documented, approved by IRB
 Two person rule for manual movement of data filesTwo person rule for manual movement of data files
 Update software to automate processesUpdate software to automate processes
How much did it cost?How much did it cost?
 Average breach reportedly costs $204 per nameAverage breach reportedly costs $204 per name
 $204 X 180,000 = $36.7 Million!$204 X 180,000 = $36.7 Million!
 Other references state that a major breach costsOther references state that a major breach costs
an organization aan organization a minimumminimum of $1 Million.of $1 Million.
 Postage alone cost $75,000.Postage alone cost $75,000.
 Rust Consulting cost $260,000Rust Consulting cost $260,000
 Thousands of person hours spent on the projectThousands of person hours spent on the project
 OIS Security, ITS Security, OUC, P&A, HIPAAOIS Security, ITS Security, OUC, P&A, HIPAA
Privacy, senior leadership, etc. etc. etc.Privacy, senior leadership, etc. etc. etc.
Lessons LearnedLessons Learned
 Implementation of IT Governance is criticalImplementation of IT Governance is critical
 Decentralized server environment is high riskDecentralized server environment is high risk
 New procedures for virus investigationsNew procedures for virus investigations
involving sensitive datainvolving sensitive data
 Disconnect from networkDisconnect from network
 Do not shut downDo not shut down
 Do not perform virus scanDo not perform virus scan
 Notify IT SecurityNotify IT Security
Questions?Questions?

More Related Content

What's hot

Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Dan Morrill
 
Understanding computer investigation
Understanding computer investigationUnderstanding computer investigation
Understanding computer investigationOnline
 
Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Yuval Sinay, CISSP, C|CISO
 
Concept of physical protection and its principals
Concept of physical protection and its principalsConcept of physical protection and its principals
Concept of physical protection and its principalsRasheed Abbasi
 
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers
Introduction to Advanced Persistent Threats (APT) for Non-Security EngineersIntroduction to Advanced Persistent Threats (APT) for Non-Security Engineers
Introduction to Advanced Persistent Threats (APT) for Non-Security EngineersOllie Whitehouse
 
Future-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsFuture-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsSteven SIM Kok Leong
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9Amanda Case
 
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEWFORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEWcscpconf
 
Threats to data and information security
Threats to data and information securityThreats to data and information security
Threats to data and information securityJohn LEE
 
Persistence is Key: Advanced Persistent Threats
Persistence is Key: Advanced Persistent ThreatsPersistence is Key: Advanced Persistent Threats
Persistence is Key: Advanced Persistent ThreatsSameer Thadani
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsPeter Wood
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsSteven SIM Kok Leong
 
Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4AfiqEfendy Zaen
 
Chapter 3 cmp forensic
Chapter 3 cmp forensicChapter 3 cmp forensic
Chapter 3 cmp forensicshahhardik27
 
You Will Be Breached
You Will Be BreachedYou Will Be Breached
You Will Be BreachedMike Saunders
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)AltheimPrivacy
 

What's hot (20)

Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
 
Understanding computer investigation
Understanding computer investigationUnderstanding computer investigation
Understanding computer investigation
 
Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)
 
Concept of physical protection and its principals
Concept of physical protection and its principalsConcept of physical protection and its principals
Concept of physical protection and its principals
 
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers
Introduction to Advanced Persistent Threats (APT) for Non-Security EngineersIntroduction to Advanced Persistent Threats (APT) for Non-Security Engineers
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers
 
Future-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsFuture-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical Threats
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9
 
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEWFORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
 
Threats to data and information security
Threats to data and information securityThreats to data and information security
Threats to data and information security
 
Persistence is Key: Advanced Persistent Threats
Persistence is Key: Advanced Persistent ThreatsPersistence is Key: Advanced Persistent Threats
Persistence is Key: Advanced Persistent Threats
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threats
 
Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4
 
Chapter 3 cmp forensic
Chapter 3 cmp forensicChapter 3 cmp forensic
Chapter 3 cmp forensic
 
Iss lecture 1
Iss lecture 1Iss lecture 1
Iss lecture 1
 
You Will Be Breached
You Will Be BreachedYou Will Be Breached
You Will Be Breached
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)
 
HIPAA Preso
HIPAA PresoHIPAA Preso
HIPAA Preso
 
Network security
Network securityNetwork security
Network security
 

Similar to After the Breach

Managing Cyber Security Risks
Managing Cyber Security RisksManaging Cyber Security Risks
Managing Cyber Security RisksDavid Kondrup
 
How to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USMHow to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USMAlienVault
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threatsZscaler
 
SplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for SecuritySplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for SecuritySplunk
 
SplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for SecuritySplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for SecuritySplunk
 
Spice world 2014 hacker smackdown
Spice world 2014 hacker smackdown Spice world 2014 hacker smackdown
Spice world 2014 hacker smackdown AlienVault
 
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...centralohioissa
 
Finding the needle in the hardware haystack - HRES (1)
Finding the needle in the hardware haystack - HRES (1)Finding the needle in the hardware haystack - HRES (1)
Finding the needle in the hardware haystack - HRES (1)Tim Wright
 
Next Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and DefenseNext Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and DefenseLuca Simonelli
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic InvestigatorAgape Inc
 
Insider threat-what-us-do d-want
Insider threat-what-us-do d-wantInsider threat-what-us-do d-want
Insider threat-what-us-do d-wantSecurity Bootcamp
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightHostway|HOSTING
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemAffine Analytics
 

Similar to After the Breach (20)

NetWitness
NetWitnessNetWitness
NetWitness
 
Managing Cyber Security Risks
Managing Cyber Security RisksManaging Cyber Security Risks
Managing Cyber Security Risks
 
How to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USMHow to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USM
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threats
 
SplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for SecuritySplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for Security
 
SplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for SecuritySplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for Security
 
Splunk for Security
Splunk for SecuritySplunk for Security
Splunk for Security
 
Spice world 2014 hacker smackdown
Spice world 2014 hacker smackdown Spice world 2014 hacker smackdown
Spice world 2014 hacker smackdown
 
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
 
Finding the needle in the hardware haystack - HRES (1)
Finding the needle in the hardware haystack - HRES (1)Finding the needle in the hardware haystack - HRES (1)
Finding the needle in the hardware haystack - HRES (1)
 
Next Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and DefenseNext Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and Defense
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
Insider threat-what-us-do d-want
Insider threat-what-us-do d-wantInsider threat-what-us-do d-want
Insider threat-what-us-do d-want
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with Phirelight
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
ITPG Secure on WannaCry
ITPG Secure on WannaCryITPG Secure on WannaCry
ITPG Secure on WannaCry
 
Meletis Belsis -CSIRTs
Meletis Belsis -CSIRTsMeletis Belsis -CSIRTs
Meletis Belsis -CSIRTs
 
Regan, Keller, SF State Securing the vendor mr&ak
Regan, Keller, SF State Securing the vendor mr&akRegan, Keller, SF State Securing the vendor mr&ak
Regan, Keller, SF State Securing the vendor mr&ak
 
encase enterprise
 encase enterprise  encase enterprise
encase enterprise
 
IT forensic
IT forensicIT forensic
IT forensic
 

More from Gary Wilhelm

Transitions and Extensions – What Schools Have Learned from Sakai Migrations
Transitions and Extensions – What Schools Have Learned from Sakai Migrations Transitions and Extensions – What Schools Have Learned from Sakai Migrations
Transitions and Extensions – What Schools Have Learned from Sakai Migrations Gary Wilhelm
 
Go go gadgets! Implementing a technology collection for staff use
Go go gadgets! Implementing a technology collection for staff useGo go gadgets! Implementing a technology collection for staff use
Go go gadgets! Implementing a technology collection for staff useGary Wilhelm
 
Policy-based Data Management
Policy-based Data Management Policy-based Data Management
Policy-based Data Management Gary Wilhelm
 
Using Dataverse Virtual Archive Technology for Research Data Management
Using Dataverse Virtual Archive Technology for Research Data ManagementUsing Dataverse Virtual Archive Technology for Research Data Management
Using Dataverse Virtual Archive Technology for Research Data ManagementGary Wilhelm
 
Network Attached Storage (NAS) Initiative
Network Attached Storage (NAS) Initiative Network Attached Storage (NAS) Initiative
Network Attached Storage (NAS) Initiative Gary Wilhelm
 
IPv6: We Care So You Don't Have To
IPv6: We Care So You Don't Have ToIPv6: We Care So You Don't Have To
IPv6: We Care So You Don't Have ToGary Wilhelm
 
Supporting your remote clients with bomgar
Supporting your remote clients with bomgarSupporting your remote clients with bomgar
Supporting your remote clients with bomgarGary Wilhelm
 
Virtualization and you: where are we?
Virtualization and you: where are we?Virtualization and you: where are we?
Virtualization and you: where are we?Gary Wilhelm
 
Online Copyright Education
Online Copyright EducationOnline Copyright Education
Online Copyright EducationGary Wilhelm
 
Increasing Utilization of Software Site Licenses
Increasing Utilization of Software Site LicensesIncreasing Utilization of Software Site Licenses
Increasing Utilization of Software Site LicensesGary Wilhelm
 
Leveraging Centralized IT Support Services as a First Point of Contact
Leveraging Centralized IT Support Services as a First Point of ContactLeveraging Centralized IT Support Services as a First Point of Contact
Leveraging Centralized IT Support Services as a First Point of ContactGary Wilhelm
 
Building Cyber-infrastructure at UNC-CH
Building Cyber-infrastructure at UNC-CHBuilding Cyber-infrastructure at UNC-CH
Building Cyber-infrastructure at UNC-CHGary Wilhelm
 
Network Attached Storage Initiative
Network Attached Storage InitiativeNetwork Attached Storage Initiative
Network Attached Storage InitiativeGary Wilhelm
 
S#$% My Network Says (CTC Retreat 2010)
S#$% My Network Says (CTC Retreat 2010)S#$% My Network Says (CTC Retreat 2010)
S#$% My Network Says (CTC Retreat 2010)Gary Wilhelm
 

More from Gary Wilhelm (14)

Transitions and Extensions – What Schools Have Learned from Sakai Migrations
Transitions and Extensions – What Schools Have Learned from Sakai Migrations Transitions and Extensions – What Schools Have Learned from Sakai Migrations
Transitions and Extensions – What Schools Have Learned from Sakai Migrations
 
Go go gadgets! Implementing a technology collection for staff use
Go go gadgets! Implementing a technology collection for staff useGo go gadgets! Implementing a technology collection for staff use
Go go gadgets! Implementing a technology collection for staff use
 
Policy-based Data Management
Policy-based Data Management Policy-based Data Management
Policy-based Data Management
 
Using Dataverse Virtual Archive Technology for Research Data Management
Using Dataverse Virtual Archive Technology for Research Data ManagementUsing Dataverse Virtual Archive Technology for Research Data Management
Using Dataverse Virtual Archive Technology for Research Data Management
 
Network Attached Storage (NAS) Initiative
Network Attached Storage (NAS) Initiative Network Attached Storage (NAS) Initiative
Network Attached Storage (NAS) Initiative
 
IPv6: We Care So You Don't Have To
IPv6: We Care So You Don't Have ToIPv6: We Care So You Don't Have To
IPv6: We Care So You Don't Have To
 
Supporting your remote clients with bomgar
Supporting your remote clients with bomgarSupporting your remote clients with bomgar
Supporting your remote clients with bomgar
 
Virtualization and you: where are we?
Virtualization and you: where are we?Virtualization and you: where are we?
Virtualization and you: where are we?
 
Online Copyright Education
Online Copyright EducationOnline Copyright Education
Online Copyright Education
 
Increasing Utilization of Software Site Licenses
Increasing Utilization of Software Site LicensesIncreasing Utilization of Software Site Licenses
Increasing Utilization of Software Site Licenses
 
Leveraging Centralized IT Support Services as a First Point of Contact
Leveraging Centralized IT Support Services as a First Point of ContactLeveraging Centralized IT Support Services as a First Point of Contact
Leveraging Centralized IT Support Services as a First Point of Contact
 
Building Cyber-infrastructure at UNC-CH
Building Cyber-infrastructure at UNC-CHBuilding Cyber-infrastructure at UNC-CH
Building Cyber-infrastructure at UNC-CH
 
Network Attached Storage Initiative
Network Attached Storage InitiativeNetwork Attached Storage Initiative
Network Attached Storage Initiative
 
S#$% My Network Says (CTC Retreat 2010)
S#$% My Network Says (CTC Retreat 2010)S#$% My Network Says (CTC Retreat 2010)
S#$% My Network Says (CTC Retreat 2010)
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

After the Breach

  • 1. After the BreachAfter the Breach Dennis SchmidtDennis Schmidt Director, Office of Information SystemsDirector, Office of Information Systems HIPAA Security OfficerHIPAA Security Officer UNC School of MedicineUNC School of Medicine
  • 2. OMG, We have a breach!OMG, We have a breach!  In late July, 2009, UNC Information Technology employees discovered that a server which contained sensitive information on 180,000 research subjects, including 114,000 Social Security Numbers, had been the target of a computer hack in 2007. The compromised server was taken down and the data on the server were removed.
  • 3. Incident DiscoveryIncident Discovery  OIS receives call from departmental serverOIS receives call from departmental server admin reporting that a server would not rebootadmin reporting that a server would not reboot after power failure.after power failure.  OIS technician suspects virus and performs fullOIS technician suspects virus and performs full virus scan on machine. Virus detected.virus scan on machine. Virus detected.  Technician is told by department that server mayTechnician is told by department that server may contain sensitive information.contain sensitive information.  Server turned over to OIS Information SecurityServer turned over to OIS Information Security for forensic analysis.for forensic analysis.
  • 4. Forensic AnalysisForensic Analysis -- A Long, Painful Process ---- A Long, Painful Process --  Verification – Verify the incident occurred  Interview the SysAdmins and other users involved  Examine system and application logs (Snort, Tipping Point, etc.)  Check volatile information using forensic tools  System Description  Physical observation, forensic tools  Interview SysAdmins and users, determine use  Hardware and software system characteristics  Hard disk geometry
  • 5. Forensic Analysis (cont.)Forensic Analysis (cont.)  Evidence Collection  All available computer information (volatile and non-volatile) is collected and transferred to external media or forensic workstation to perform analysis tasks.  Data must be collected in order of volatility and data integrity safeguarded by hash signature, MD5
  • 6. Forensic Analysis (cont.)Forensic Analysis (cont.)  Timeline Creation & Analysis – Use time-stamps from internal and external sources to correlate into timeline that traces back the system activity.  Media Analysis – Thorough examination of the media layers (physical, data, metadata, file system and file name) searching for evidence.
  • 7. Forensic Analysis (cont.)Forensic Analysis (cont.)  Data Recovery – extracting unallocated data in order to recover any deleted files. File fragments could represent a critical piece of information relevant to the case  String Search – searching for specific strings or keywords contained inside files to reveal useful information relevant to the case.  Reporting -- detailed report(s) of the forensic process explaining the evidence found, together with the techniques and methodology used.
  • 8. Houston, We have a problem!Houston, We have a problem!  Virus/worm/trojan infection for 2 yearsVirus/worm/trojan infection for 2 years  26 files containing over 500,000 records26 files containing over 500,000 records  180,000 unique research subjects180,000 unique research subjects  114,000 Social Security Numbers114,000 Social Security Numbers
  • 10. But, did they get anything?But, did they get anything?  When did compromise occur? Is it still active?When did compromise occur? Is it still active?  When were the sensitive files put on theWhen were the sensitive files put on the machine? When were they last accessed?machine? When were they last accessed?  Was it during the compromise window?Was it during the compromise window?  Is there any corroborating evidence on theIs there any corroborating evidence on the network of file downloads from the server?network of file downloads from the server?
  • 11. The Antivirus DilemmaThe Antivirus Dilemma  Full virus scan changes the last accessed time onFull virus scan changes the last accessed time on everyevery file.file.  It now becomes impossible to determine if theIt now becomes impossible to determine if the malware actually accessed specific files.malware actually accessed specific files.  e.g., If compromise occurred one week ago, and laste.g., If compromise occurred one week ago, and last access of sensitive file was one month ago, you knowaccess of sensitive file was one month ago, you know the data was not likely accessed by the malware.the data was not likely accessed by the malware.  If virus scan was done yesterday, you no longerIf virus scan was done yesterday, you no longer know when the file was last accessed.know when the file was last accessed.
  • 12. No Smoking GunNo Smoking Gun  There was no way to prove that data on theThere was no way to prove that data on the server was accessed inappropriately.server was accessed inappropriately.  And… there was no way to prove that data onAnd… there was no way to prove that data on the server wasthe server was notnot accessed inappropriately.accessed inappropriately.  The doors were unlocked and people were in theThe doors were unlocked and people were in the house, but we couldn’t prove that they stolehouse, but we couldn’t prove that they stole anything.anything.
  • 13. Second OpinionSecond Opinion  Magnitude of potential breach warrantedMagnitude of potential breach warranted additional opinionsadditional opinions  ITS Security conducted parallel investigation toITS Security conducted parallel investigation to verify or refute initial findingsverify or refute initial findings  Additional corroborating data searchedAdditional corroborating data searched  Network traffic logs (only last 90 days)Network traffic logs (only last 90 days)
  • 14. Notification is not an IT DecisionNotification is not an IT Decision  University Counsel makes final recommendationUniversity Counsel makes final recommendation based on inputs from:based on inputs from:  IT Security (OIS & ITS)IT Security (OIS & ITS)  University RelationsUniversity Relations  UNC Health Care Communications/MarketingUNC Health Care Communications/Marketing  UNC Health Care CounselUNC Health Care Counsel  HIPAA Privacy and HIPAA Security OfficersHIPAA Privacy and HIPAA Security Officers
  • 15. How do we notify 180,000 people?How do we notify 180,000 people?  Is their address current? Do we have anIs their address current? Do we have an address?address?  Are they still alive?Are they still alive?  Who writes the letters?Who writes the letters?  Who addresses the envelopes? Licks theWho addresses the envelopes? Licks the stamps?stamps?  Who handles phone calls from concernedWho handles phone calls from concerned recipients?recipients?
  • 16. The Notification ProcessThe Notification Process  UNC Hired Rust Consulting to assistUNC Hired Rust Consulting to assist  Consultation servicesConsultation services  Mailed notification lettersMailed notification letters  Established and staffed Call CenterEstablished and staffed Call Center  Responded to calls; referred problem calls to UNCResponded to calls; referred problem calls to UNC  Received 4,144 callsReceived 4,144 calls  450 calls referred to UNC450 calls referred to UNC
  • 17. Technical ResponseTechnical Response  Major concern: Uncontrolled serverMajor concern: Uncontrolled server proliferationproliferation  Determine scope of problemDetermine scope of problem  Protect high risk machines firstProtect high risk machines first  Develop long term strategy to mitigate riskDevelop long term strategy to mitigate risk
  • 18. The Scope of the ProblemThe Scope of the Problem  500+ machines with server OS’s on SOM500+ machines with server OS’s on SOM networknetwork  2200 machines running a service2200 machines running a service  2068 File Server / File Services2068 File Server / File Services  1989 Remote Access / Remote Management1989 Remote Access / Remote Management  762 Web Servers762 Web Servers  194 Database Servers194 Database Servers
  • 19. Manual Data CollectionManual Data Collection  Mandatory self reporting of serversMandatory self reporting of servers  433 servers reported433 servers reported  98 server admins98 server admins  47 different OS flavors and versions47 different OS flavors and versions  Qualys scans on all servers reporting sensitiveQualys scans on all servers reporting sensitive information (200 machines)information (200 machines)
  • 20. Long Range StrategyLong Range Strategy  IT Simplification and Security RFP (Dell)IT Simplification and Security RFP (Dell)  Develop Plan for streamlining IT resources in SOMDevelop Plan for streamlining IT resources in SOM  Develop strategic virtualization architectureDevelop strategic virtualization architecture  Develop enterprise storage architectureDevelop enterprise storage architecture  Develop security umbrella to cover centralizedDevelop security umbrella to cover centralized operationoperation  Goal: Provide robust centralGoal: Provide robust central servicesservices that willthat will get end users out ofget end users out of serverserver businessbusiness
  • 21. Recovery from the breachRecovery from the breach  Moved data to centrally managed serversMoved data to centrally managed servers  Database encrypted behind hardware firewallDatabase encrypted behind hardware firewall  All working files encrypted with PGP Net ShareAll working files encrypted with PGP Net Share  All machines, including desktops, scanned with QualysAll machines, including desktops, scanned with Qualys  Well defined procedures documented, approved by IRBWell defined procedures documented, approved by IRB  Two person rule for manual movement of data filesTwo person rule for manual movement of data files  Update software to automate processesUpdate software to automate processes
  • 22. How much did it cost?How much did it cost?  Average breach reportedly costs $204 per nameAverage breach reportedly costs $204 per name  $204 X 180,000 = $36.7 Million!$204 X 180,000 = $36.7 Million!  Other references state that a major breach costsOther references state that a major breach costs an organization aan organization a minimumminimum of $1 Million.of $1 Million.  Postage alone cost $75,000.Postage alone cost $75,000.  Rust Consulting cost $260,000Rust Consulting cost $260,000  Thousands of person hours spent on the projectThousands of person hours spent on the project  OIS Security, ITS Security, OUC, P&A, HIPAAOIS Security, ITS Security, OUC, P&A, HIPAA Privacy, senior leadership, etc. etc. etc.Privacy, senior leadership, etc. etc. etc.
  • 23. Lessons LearnedLessons Learned  Implementation of IT Governance is criticalImplementation of IT Governance is critical  Decentralized server environment is high riskDecentralized server environment is high risk  New procedures for virus investigationsNew procedures for virus investigations involving sensitive datainvolving sensitive data  Disconnect from networkDisconnect from network  Do not shut downDo not shut down  Do not perform virus scanDo not perform virus scan  Notify IT SecurityNotify IT Security