Welcome to the MacNN Forums.

If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.

You are here: MacNN Forums > News > Tech News > Report: one neglected server caused JP Morgan Chase data leak

Report: one neglected server caused JP Morgan Chase data leak
Thread Tools
NewsPoster
MacNN Staff
Join Date: Jul 2012
Status: Offline
Reply With Quote
Dec 23, 2014, 09:52 PM
 
Back in July, five bank networks were hacked, the most notable of which was JP Morgan Chase, which resulted in more than 76 million households' information being leaked. At first, it was suspected that a "zero-day" exploit had been utilized to gain access, but an unidentified source has indicated the real story is somewhat more mundane.

In an interview with the New York Times, the source indicated that a single server, which lacked two-factor authentication, was the weak link that allowed the attackers entry. Two (or more) factor authentication relies on multiple factors to add levels of security, hence the name.

The attackers were able to obtain login credentials from an employee of the firm, and (either coincidentally or deliberately) began the attack during a period of high turnover among JP Morgan Chase's cybersecurity team, many of which left to take new jobs at payment processor First Data. Even with the stolen credentials, the source said, the attack could have been prevented if the server had used simple two-factor authentication.



A growing variation for high-security enterprise logins involves three factors: something the user knows, something the user has, and/or something the user is. A passcode is obviously something a user would know. Something a user would have is a key-fob or computer the system recognizes as being the one the user always logs on from. Something a user is involves biometric information, such as a fingerprint.

The server that was part of JP Morgan Chase's vast network of new and legacy systems, collected over years of operations and mergers, should have been enabled with a second factor of authentication, but had been overlooked. This, coupled with the employee's stolen username and password, appears to be what caused the massive breach, affecting 90 servers.
     
just a poster
Forum Regular
Join Date: Jun 2004
Status: Offline
Reply With Quote
Dec 24, 2014, 10:57 AM
 
It's surprising they even knew a breach occurred.
     
Mike Wuerthele
Managing Editor
Join Date: Jul 2012
Status: Offline
Reply With Quote
Dec 24, 2014, 01:43 PM
 
They denied it forever.
     
HappyPhil
Fresh-Faced Recruit
Join Date: Dec 2009
Status: Offline
Reply With Quote
Dec 25, 2014, 02:30 AM
 
Let's see if I have got this right...The people who set up the security systems and should most likely know what server they had left unprotected, went to work for someone else and surprise, surprise, that unprotected server was hacked but the identity of the hacker remains a mystery to investigators? Is that the gist of the story?
     
Mike Wuerthele
Managing Editor
Join Date: Jul 2012
Status: Offline
Reply With Quote
Dec 25, 2014, 10:04 AM
 
In essence. Remarkably like what happened to Sony.
     
   
 
Forum Links
Forum Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts
BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Top
Privacy Policy
All times are GMT -4. The time now is 04:42 AM.
All contents of these forums © 1995-2017 MacNN. All rights reserved.
Branding + Design: www.gesamtbild.com
vBulletin v.3.8.8 © 2000-2017, Jelsoft Enterprises Ltd.,