Image from ctvnews.ca.
Cross-posted to the Blue Coat security blog.
In the previous post, I discussed how the Deep Web was starting to surface. One of the things that shows that this will occur was the Target breach. The malware found in the Point-of-Sale (PoS) systems in the Target breach was using Tor to transmit the data that was stolen. (In that respect, I was fairly confident in predicting that the Deep Web would start to surface. 😉 )
The real issue with the Target breach though was how the perpetrators actually got in – they got in through a third party, apparently a contractor who had access to Target’s internal systems. Once they breached the third party, they then got into the intranet, and from there, were able to infect the PoS systems.
There is a growing trend that businesses will need to secure their supply chains, and this is not news. With the Target breach, I see this trend increasing to include all third parties. If you’re giving anyone access to any part of your network, then you’ll have to start having some kind of checks or security certification that they and their networks have been secured before you do so. This will be difficult, especially given the proliferation of mobile technologies, but given the likely fallout from not doing it, companies will have to start.