CASE STUDY TOP 10 AIRLINE SOLVES AUTOMATED ATTACKS ON WEB & MOBILE

Similar documents
THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

AKAMAI CLOUD SECURITY SOLUTIONS

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

WHITEPAPER. Protecting Against Account Takeover Based Attacks

Accelerating growth and digital adoption with seamless identity trust

STEVE GOODING JUNE 15, 2018

Beyond Blind Defense: Gaining Insights from Proactive App Sec

Securing Today s Mobile Workforce

Hacking Demonstration. Dr John McCarthy Ph.D. BSc (Hons) MBCS

National Bank Minimizes Security Risk and Supports New Business with McAfee Security Solutions

RSA Web Threat Detection

Teradata and Protegrity High-Value Protection for High-Value Data

Modern two-factor authentication: Easy. Affordable. Secure.

Managed Endpoint Defense

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

The Bots Are Coming The Bots Are Coming Scott Taylor Director, Solutions Engineering

Mobile Authentication: Capitalising on China s Identity Market

Mavenir Spam and Fraud Control

Integrated Access Management Solutions. Access Televentures

Altitude Software. Data Protection Heading 2018

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

Reducing the Cost of Incident Response

A Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

Evolution of Spear Phishing. White Paper

WHAT IS MALICIOUS AUTOMATION? Definition and detection of a new pervasive online attack

SOLUTION BRIEF FPO. Imperva Simplifies and Automates PCI DSS Compliance

align security instill confidence

HP Fortify Software Security Center

An Introduction to the Waratek Application Security Platform

KEY FINDINGS INTERACTIVE GUIDE. Uncovering Hidden Threats within Encrypted Traffic

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

CASE STUDY: REGIONAL BANK

The CISO s Guide to Deploying True Password-less Security. by Bojan Simic and Ed Amoroso

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

AUTHENTICATION. Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response

The Interactive Guide to Protecting Your Election Website

Best Practices in Securing a Multicloud World

Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center

The Top 6 WAF Essentials to Achieve Application Security Efficacy

For personal use only

Attackers Process. Compromise the Root of the Domain Network: Active Directory

Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center

INSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security

White Paper. The North American Electric Reliability Corporation Standards for Critical Infrastructure Protection

IBM Security Network Protection Solutions

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

Q WEB APPLICATION ATTACK STATISTICS

Web Applications Security. Radovan Gibala F5 Networks

Challenges and. Opportunities. MSPs are Facing in Security

W H IT E P A P E R. Salesforce Security for the IT Executive

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK

Workshop on the IPv6 development in Saudi Arabia 8 February 2009; Riyadh - KSA

Enterprise D/DoS Mitigation Solution offering

How NOT To Get Hacked

Imperva Incapsula Product Overview

MOBILE DEFEND. Powering Robust Mobile Security Solutions

White paper. Keys to Oracle application acceleration: advances in delivery systems.

IDENTITY: A KEY ELEMENT OF BUSINESS-DRIVEN SECURITY

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

EBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats.

Make security part of your client systems refresh

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

CIO INSIGHTS Boosting Agility and Performance on the Evolving Internet

Microsoft Finland. Microsoft in Finland is a strong millennial, born ,000+ partners generating 8 $ revenue per each $ by MSFT

Have breaches declined since the massive Heartland Payments leak in 2008? What proportion of breaches are the result of hacking?

Security Survey Executive Summary October 2008

Streaming Prevention in Cb Defense. Stop malware and non-malware attacks that bypass machine-learning AV and traditional AV

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING

Intelligent and Secure Network

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

The Artificial Intelligence Revolution in Cybersecurity

Google Identity Services for work

with Advanced Protection

FOUR WAYS TO IMPROVE ENDPOINT SECURITY: MOVING BEYOND TRADITIONAL APPROACHES

DMARC Continuing to enable trust between brand owners and receivers

THE HIDDEN COSTS IN NETWORK BANDWIDTH

Social Engineering: We are the target Sponsor Guide

INNOVATIVE IT- SECURITY FOR THE BANKING AND PAYMENT INDUSTRY

RSA INCIDENT RESPONSE SERVICES

Accelerate Your Enterprise Private Cloud Initiative

Security Awareness. Chapter 2 Personal Security

CE Advanced Network Security Phishing I

Protect Your Data the Way Banks Protect Your Money

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

Phishing in the Age of SaaS

RSA INCIDENT RESPONSE SERVICES

Building a Threat Intelligence Program

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

Keep the Door Open for Users and Closed to Hackers

Protecting Against Online Banking Fraud with F5

SIEMLESS THREAT DETECTION FOR AWS

A custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74

Transcription:

CASE STUDY TOP 10 AIRLINE SOLVES AUTOMATED ATTACKS ON WEB & MOBILE

The Customer: Top 10 Airline CREDENTIAL STUFFING KILLCHAIN A Top 10 Global Airline that earns over $15 Billion in annual revenue and serves 20 million loyalty program members. Challenge #1: Credential Stuffing OBTAIN STOLEN CREDENTIALS SELECT A TARGET SITE PERFORM ATTACK TOOL RECONNAISSANCE ON TARGET SITE USE AN AUTOMATED SCRIPT OR ATTACK TOOL PROXY TRAFFIC The airline was facing two major types of attacks on its web and mobile applications. First, attackers were performing credential stuffing attacks, in some cases compromising nearly 1000 customer accounts in a single day. Credential stuffing is an attack in which bad actors test credentials that have been stolen from third parties en masse on a different login application. Because users reuse passwords across online services, 0.5%-2% of a stolen credential list will typically be valid on a target site, allowing the attacker to takeover user accounts. When attackers successfully took over a customer s frequent flyer account via credential stuffing, the airline s costs included the reimbursement of stolen frequent flyer points as well as any chargeback fees from unauthorized transactions made using a credit card linked to the account. Even the credential stuffing attacks themselves were costly to the airline. When an attacker attempted too many failed logins for a certain customer s account, the legitimate customer would inadvertently be locked out of their own account, forcing them to contact customer service. This consequence of credential stuffing attacks created a customer service burden as well as customer dissatisfaction, which was unacceptable to the airline. Challenge #2: Fare Scraping BYPASS SECURITY CONTROLS TAKEOVER ACCOUNT & STEAL ASSETS The airline was also facing a scraping challenge. Third parties, including online travel agencies (OTAs) and competitors, ran scripts to gather real-time fare data from applications like find flights and book now. These continual requests exceeded the infrastructure team s capacity to serve customers and also slowed down the site for legitimate customers, causing user friction.

While the airline had partnerships with some of the OTAs, some were acting in poor faith and violating the terms of their data agreements. However, because the airline could not distinguish between legitimate users and unwanted third parties, they were unable to alleviate the problem. The Decision When account lockouts peaked in June of 2017, the airline knew it needed to find a solution to credential stuffing attacks immediately. Because Shape was the only vendor that could comprehensively stop credential stuffing and fare scraping attacks while also helping the security and fraud teams prove ROI, the choice was clear. Due to the urgency of credential stuffing, the airline chose to deploy Shape Enterprise Defense first on its web login applications. Initial Results: Payback in 49 Days There are two stages to Shape deployment: observation mode and mitigation mode. In observation mode, Shape analyzes all incoming requests to the application in order to customize its defense and ensure the best possible outcome for the customer. Once Shape and the customer are confident that no legitimate WHY SHAPE? The airline selected Shape for 3 key reasons: Omnichannel Protection including web, mobile, and API solutions Long-term Efficacy against sophisticated attackers Holistic Platform allowing fraud and security teams to share data LOGIN REQUESTS DURING THE FIRST 6 MONTHS OF SHAPE S DEPLOYMENT 400000 Login Requests (per hour) 350000 300000 250000 200000 150000 100000 Mitigation Mode Enabled 50000 0 06-16 07-01 07-16 08-01 08-16 09-01 09-16 10-01 10-16 11-01 00:40 11-15 12-01 Time (days) Human Traffic Detected Attacks Blocked Attacks

human traffic will be impacted, Shape activates mitigation mode. During observation mode on the airline, credential stuffing attacks represented over 90% of all login traffic, as indicated by the yellow traffic in the above chart. After four weeks of observation, the airline gave Shape the go-ahead to activate mitigation mode. POSTs from attackers were immediately preventedfrom reaching the origin server, thereby preventing attackers from successfully logging in. Attackers will always take the path of least resistance to optimize their ROI. Thus, the vast majority of credential stuffing attackers will move on to easier targets once a defense becomes too difficult to penetrate. Accordingly, within just a week of Shape Enterprise Defense being in active mitigation mode, the sheer volume of attempts decreased by 5x, as shown by the drop-off in red traffic above. Long Term Results: Expansion to Mobile Unfortunately, easier targets does not necessarily mean unrelated targets. As more and more attackers became aware that the website was no longer an open door, many turned to the airline s mobile app. Because Shape was not protecting the airline s mobile application and thereby providing visibility into its traffic, the airline did not know the exact distribution of attacks. However, they had other compelling data that attackers had moved to mobile. A strong indicator of credential stuffing is the rate at which nonexistent usernames are being attempted on the login application. As depicted in the chart below, the number of nonexistent usernames being tried on web declined steadily after the June deployment, whereas the number of attempts rapidly increased on mobile. ATTACKERS STEADILY MOVE TO MOBILE AFTER LEARNING WEB IS DEFENDED 40M Nonexistent Accounts Attempted 30M 20M 10M OM May June July August September October November December Web Mobile

Accordingly, the airline asked Shape to expand protection to its native mobile app, and Shape s SDK solution was fully deployed within a month. The above chart also shows us that, again, the majority of attackers quickly move on to easier targets once a defense proves too strong. So once it was clear after mobile deployment that neither web nor mobile was a penetrable attack surface, the attackers all but disappeared in December, this time moving on to entirely different targets. Summary: Holistic & Omnichannel Defense Most importantly to the airline, when the credential stuffing attacks stopped, so did the corresponding fraud. The security team had known instinctively that attackers were committing fraud after compromising accounts but were unable to link the credential stuffing attacks with account takeover fraud. For the first time, the airline had complete visibility into its traffic via Shape s data dashboard, allowing the airline to directly correlate the reduction in malicious login attempts with a reduction in account takeovers and direct fraud losses. WHEN THE CREDENTIAL STUFFING ATTACKS STOPPED, SO DID THE CORRESPONDING FRAUD. Once Shape demonstrated efficacy protecting the airline s login applications, the airline quickly expanded Shape s protection to web and mobile applications being attacked by scrapers. Now that the airline has fully solved automated attacks, the security team has freed up full-time employees to focus on other strategic priorities for the business. Shape Security defends the world's largest enterprises from sophisticated cyberattacks and fraud. Shape customers include three of the Top 5 US banks, five of the Top 10 global airlines, two of the Top 5 global hotels and two of the Top 5 US government agencies. The company has raised $100M+ from Kleiner Perkins, Google Ventures, Eric Schmidt, and other leading investors to build an advanced web, mobile, artificial intelligence, and machine learning platform for global scale application defense. The Shape platform, covered by 50 issued patents and 100+ additional patent applications, prevented over $1B in fraud in the last year. Shape was named by CNBC as one of the 50 most disruptive companies in the world. Today, the Shape Network defends 1.4 billion user accounts from account takeover and protects $1B of in-store mobile payments worldwide.