Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Failed Electronic Payroll Heist Demonstrates Value Of Information Credentials

Imperva : 12 August, 2010  (Technical Article)
Imperva uses the recent hacking incident at Regeneron to illustrate the potential value of captured information to cyber criminals
A payroll hijacking incident in New York State - in which a Westchester County-based pharmaceuticals company, Regeneron, computer was hacked and cybercriminals attempted to divert salary deposits to their own mule bank accounts - has been called a classic stolen credentials case by Imperva, the data security specialist.

In this incident, hackers stole the online credentials to a payroll processing application belonging to an employee working for the pharmaceutical company.

Amichai Shulman comments "By using the stolen credentials from Regeneron, the attackers were able to gain access to Ceridian's online management system. The credentials were likely to belong to an accounting manager, or any other administrator responsible for Regeneron's finances, since the hackers then attempted to transfer the direct deposit salary of nine other employees, to their accounts."

"This is a classic case of stolen credentials." he added, "These are direct credentials to a processing application. In this case the thieves didn't need to steal social networking credentials in an attempt to gain payroll details, they already had these credentials to hand. Past research has shown that many people use the same credentials for multiple sites; people need to start being more cautious of what credentials they are using for different sites. To stop unauthorized access to other applications, we urge everyone to use different, strong credentials for multiple sites to avoid cases like these reoccurring in other applications."

And, he says, "This latest incident should raise a concern within Regeneron not only with respect to employee data but also with respect to other sensitive data processed by the company such as clinical trial data. This in terms may be sensitive for people outside of Regeneron as well"
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo