Sunteți pe pagina 1din 13

THE BIG STORY / OCTOBER 2016

Today’s
Hackers Use
S
‘ oft’
APPROACH
BY STEVE FINLAY

S
tanding on stage and
behind a bank of four
computers, former mas-
ter hacker and ex-con
Kevin Mitnick shows
how he can break into digital sys-
tems to steal data.
OCK
TOC

He makes it look easy during


KSTO
NKS
HIINK T

the presentation entitled “Cyber


THI
K//TH
H N

Security: Art of Deception” at the


TO
STO CK/
OCK
C K

American Financial Services Assn.’s


55// iST
ER5/ T

annual Vehicle Finance Conference.


THE
CYYT
SCY

Steve Wosniak, an Apple co-


SC
H ©S C

founder, introduces him at the con-


RIGGHT
GH

Turnover for
OPYYRI

ference, saying “He can hack into


COP YR
R

female sales
O CO
CO

consultants 90%,
OTO
PHO
HO

NADA says.
PH
THE BIG STORY

any system.” For the next hour, “People think it happens to


Mitnick, who now runs a cyber- them, rather than them unknow-
security consulting firm, shows ingly doing something that allows
and tells how. it to happen,” she
But few of his human errors says.
that let hackers in
means of entry The better-than-
• Losing a laptop
involve a blunt-force bad news is that if
frontal assault. • Plugging in a flash drive
most cybercrime
Typically today, with • Opening a legitimate- threats to deal-
looking email attachment
systems as secure erships involve
as they are, hack- • Duped by a cybercriminal
human error at the
impersonating a colleague
ers need help to get or vendor stores “I stress to
the job done. And dealers that’s the
often, the helpers easiest thing to fix
are employees at a through training
place of business who innocently and processes,” Plaggemier says.
become aiders and abettors. The unwitting human goof-ups
It’s enough for dealerships to include a dealership employee
take notice of who’s doing what losing a laptop; plugging in a
on the store’s computer system. flash drive that allows a hacker
“Ninety-nine percent of the to monitor every click and key
time the hacking is done through stroke; opening a legitimate-look-
an innocent human being who ing email attachment that ends
becomes a victim through things up spreading a malicious infec-
like phishing and malware,” says tion; and getting duped into giv-
Lisa Plaggemier, security director ing sensitive security and finan-
for CDK Global, a major dealership cial information to a cybercrimi-
information technology provider. nal impersonating a colleague or

2 | october 2016
WardSAuto

WHEN IT COMES TO CYBERSECURITY,


IT’S A JUNGLE OUT THERE.

PUT SECURITYFIRST WITH CDK GLOBAL AT


WWW.CDKGLOBAL.COM/SECURITYFIRST © 2016 CDK Global, LLC / CDK Global is a
registered trademark of CDK Global, LLC. 16-1041
THE BIG STORY

vendor on the telephone. battering-ram tactic less often,


Studies indicate that those “soft in part because system fortifica-
attacks” by far represent the big- tions have become so strong.
gest cybersecurity “The automated systems have
threats, says Brad gotten so good,” Miller says. “You
Miller, the National may get in, but you won’t be able
Automobile Dealers to mess around in there for a long
Assn.’s director-legal time.
and regulatory affairs. “However if you get in through
“I’ve had conversa- a soft method, you may be able
tions with the FBI to do damage for quite a while
(cyber task force) before people realize what’s hap-
on this,” says Miller, pening. A bad guy can do more
NADA’s point man on damage that way.”
“Every the matter. “These are the biggest Still, no one has yet to build
expert in security problems and most prof- absolutely hack-proof protection.
this field
will tell you
itable area for the criminals across “Every expert in this field will
there is no all industries: the efforts to gain tell you there is no impervious
impervious information through what looks system,” Miller says. He cites a
system,” like legitimate means.” financial institution that spent
Miller says.
He adds, “It is not a blunt-force $200 million a year on cyberse-
hacker who is breaching your sys- curity, and still sustained a data
tem without you knowing about breach last year.
it. It is trying to get in through A failsafe security system is
another door.” something of a digital unicorn, say
members of the defense team.
Frontal Attacks “We’re doing as much as possible
Rare These Days to prevent (a breach),” says Peter
The risk of an unaided frontal Ord, national sales director for
attack on a system is real, say DealerSocket, a firm that provides
cybercrime fighters. dealers with customer-relationship-
But digital criminals use that and dealership-management soft-

3 | WardSAuto
october 2016
THE BIG STORY

ware. “We’ve mitigated it to the But even the best of employees


highest possible extent, but noth- can cause problems. For exam-
ing is 100%. Hackers are hackers.” ple, diligent staffers using com-
Brian Allan agrees. He is direc- pany laptops and mobile devices
tor of business development for to do after-hours work can pose
Galpin Motors, a dealership group an unwitting threat. The threat


in California. Of cybersecurity, of a hack attack increases if an
employee puts sensitive informa-
tion on a mobile device and logs
onto a public Wi-Fi hotspot.
Sometimes “Obviously, you want to make
it is a question of sure your system is password-
an enemy within, protected, encrypted and
secure,” says Miller. “But the big-


or a larcenous employee. gest problems are things like lost
laptops or folks sending informa-
tion they shouldn’t over insecure
emails. Those represent an ongo-
he says: “Here’s what we know: ing effort dealers need to focus
Nothing is fool-proof.” on in training and processes.”
Sometimes it is a question of Some major information technol-
an enemy within, or a larcenous ogy companies such as Reynolds
employee. and Reynolds that provide deal-
“A big scare is that the leak ership-management system soft-
occurs on the dealership side,” ware to dealers have expressed
says David Brotherton, a consul- security concerns over dealers
tant for the National Independent contracting with a third-party
Automobile Dealers Assn. digital-service providers who, in
“Employees have access to deal- turn, plug into the main system.
ership computer equipment. Even The fear is that the risk of a
if they can’t download something, breach is increased when various
they can write it down.” third-party providers piggyback on

4 | WardSAuto
october 2016
THE BIG STORY

the DMS. One concern is of a poten- Dealer Trevor Gile, a partner at


tial domino effect that could occur Motorcars Honda in Cleveland
if a provider gets hacked and the Heights, OH, says, “I’d rather have
infection spreads to the DMS. a cloud-based major company
That said, dealers can feel rea- protecting my data than me try-
sonably assured their information ing to do that. I feel way more


is safe with an IT provider, cer- comfortable having them do it.”
tainly safer than if they were to
keep it themselves.
“The risk is greater if data resides
in the server at a dealership and
The risk is greater
the dealer has to provide both the
if data resides in


physical and connectivity secu-
the server at a dealership.
rity for that data,” says Sharon
Kitzman, Dealertrack’s vice presi-
dent and DMS general manager.
“Because we are cloud-based,
security compliant and have peo- The cloud heightens security, but
ple monitoring our network and it’s not infallible, Ord says. “Cloud
server against an attack or breach is preferable but that is not to say
and defending ourselves 24/7, we there aren’t risks with cloud. But it
take the fear away from the dealer.” is much better than dealers stor-
DealerVault bills itself as the first ing the information themselves.”
cloud-based system designed to It would be bad enough if hackers
WHEN IT COMES TO empower dealerships with control break into a dealership’s computer
CYBERSECURITY,
IT’S A JUNGLE over the syndication and distribu- system and start helping them-
OUT THERE. tion of their DMS data. selves to proprietary information.
PUT SECURITYFIRST DealerVault CEO Steve Cottrell But the real jackpot would be
WITH CDK GLOBAL AT
says the 3-year-old company has the customer information that
WWW.CDKGLOBAL.COM/
SECURITYFIRST put a lot of money into data secu- dealers keep. That often takes
rity and “making sure our platform the form of confidential financial
is secure.” information, collected for credit-

© 2016 CDK Global, LLC / CDK Global is a


registered trademark of CDK Global, LLC. 16-1041
5 | WardSAuto
october 2016
THE BIG STORY

application purposes. Armed with wall when I can persuade some-


that, an identity thief would be one to give me their username
off to the races. and password?”
“Dealerships become the meet- He tells how he does that. “Go
ing point for a lot of stuff,” says to a company website and get
one industry insider. contact names, phone numbers
NADA’s Miller says dealers do a and titles. You don’t even have
pretty good job there. “They have to go to the website, just go to
had consumer transactional and LinkedIn. I look for marketing
relationship data for 100 years. and sales people, not tech types
Because of what they do, dealers because they’re too aware.”
get very sensitive and valuable He then calls them, posing as
information. Privacy is something a colleague, vendor or someone
dealers handle well, especially otherwise legitimate and talks
given the regulatory framework them into giving him the digital
they work under.” keys to the kingdom.
Social-networking websites also
Going Around contain information a hacker can
the Firewalls put to ill-use, Miller says, offering
Still, cybercrime experts say this scenario.
auto retailing needs to focus on “Your Facebook update shows
those soft attacks through the you were in Las Vegas last week.
likes of so-called spear phishing Then you get an email saying
(personalized emails with infec- ‘Nice to see you in Vegas. Check
tious attachments) and social out this attachment.’”
engineering (collecting informa- An unsuspecting recipient
tion about someone from social- opens it. The computer is infect-
media websites and the like). ed. The cybercriminal can track
Mitnick says if firewalls are too everything that person does,
formidable, he’ll simply opt to go from keying in a password to
around them. entering a bank-account number.
“Why bother bypassing a fire- “They are able to tie these

6 | WardSAuto
october 2016
THE BIG STORY

pieces together for spear phish- Laptops have microphones and


ing or to otherwise make their cameras, he notes. Hacked into a
approaches more realistic-look- laptop, he can turn on the web-
ing,” Miller says. It is the social cam. “I can see who I hacked.”
engineer, the spear phisher who Dealership employees in the
is able to gain the trust of an front office are particularly
employee to get information. vulnerable to a spear phishing
“What they want is money, attempt, Plaggemier says.
whether it is by getting into your “Spear phishing emails are sent
bank account to take it or tricking with a specific goal,” she says. “A
you into paying them,” he says. cybercriminal goes on a dealer
There are variations on that. A website and finds out who the
common one is they’ll pose as a office manager is.
vendor, saying they have a new “That person is sent an email
bank-routing number. They may that looks like an order confir-
even include a legitimate-looking mation for something she didn’t
phone number. order. She clicks the attachment
It’s not like the old days when to cancel it, and the hacker ends
an illicit email from an alleged up getting into a bank account.”
Nigerian prince wanting to share Dealers are vulnerable to cyber-
millions of dollars was rife with crimes because of the nature of
misspellings and other glaring their business. They are techni-
signs of fraud. cally considered small businesses
Today’s phishing emails look but they’re big-small.
much more legitimate, even “Sixty percent of all attacks are
though their infectious attach- on small businesses,” Plaggemier
ments are as toxic as ever. Some says. “If someone is going to tar-
are particularly alluring. “If the get a small business, it probably
attachment says ‘payroll 2016,’ at won’t be the local clothing store.
least one employee will open it Dealers are the more likely targets
up to take a look,” Mitnick says. because they employ a lot of peo-
“That’s all I need, one employee.” ple, have a high staff turnover and

7 | WardSAuto
october 2016
THE BIG STORY

have a lot of operating money.” organization cannot continue to


access the system. Amazingly,
What’s a Dealer to Do many of them are.
What can a dealer do? “It’s people, processes and
“You just have to raise the level technology,” she says in describ-
of awareness,” Miller ing the best way to thwart the
says. “It’s a cat-and- hackers of the world.
mouse game. It is Do dealers she meets show a
doing the reasonable healthy concern or a disturbing
things, getting techni- apathy towards cybercrime?
cal pieces in place – “They definitely are concerned,”
such as firewalls and Plaggemier says. “A dealer told
intrusion-detection me a vast majority of them have
software that stops the experienced some sort of security
virtual attacks – and issue. But it is not something they
then just being smart. like to talk about a lot.”
“People think “There are technical fixes to She grabs their attention when
it happens to implement, but it is also being she gives real-world examples
them, rather
than them aware of this stuff, spotting the during her group presentations.
unknowingly red flags and knowing what to do.” “If I have six or seven dealers
doing Plaggemier’s CDK duties include afterwards come up and talk to
something
serving as a “client advocate” to me about it, that’s a good sign.”
that allows it
to happen,” help dealers understand cyber- Mitnick says his hacking was just
says CDK’s crime risks and know what pre- for fun. The tomfoolery ended
Plaggemier. cautions to take. after the FBI sent him to prison.
She periodically speaks to “Being a fugitive? I’ve been there,
groups of dealers on how they can done that. It’s no fun.”
protect their computer systems. Most hackers are in it for more
Her advice ranges from training than just a lark, whether they are
employees how to spot malicious from the U.S., China, Russia or
material to having a process to sub-Sahara Africa. “They want
make sure staffers who leave the your money,” Miller says. wa

8 | WardSAuto
october 2016
WITH CDK GLOBAL

$5.9M IS THE AVERAGE COST OF A DATA BREACH*


WHEN IT COMES TO CYBERSECURITY, IT’S A JUNGLE OUT THERE.

In this jungle, your reputation is everything. When you partner with CDK Global,
we’ll help you protect your data, financials and reputation by providing the
expertise, partnership and industry-specific support your business needs.

PUT SECURITYFIRST WITH CDK GLOBAL AT WWW.CDKGLOBAL.COM/SECURITYFIRST

© 2016 CDK Global, LLC / CDK Global is a registered trademark of CDK Global, LLC. 16-1041 *Source: “Security Risk,” F&I and Showroom, February 2015
THE BIG STORY

Show You’re Trying,


Illustration copyright © ojogabonitoo/iStock/ThinkStock

Says Dealership Executive

P
art of an effective dealer- group that includes the world’s
photo copyright © joe wilssens

ship cybersecurity plan top-volume Ford store.


is showing you care, says He talks with WardsAuto about
Brian Allan, business develop- how the company systematically
ment director at Galpin Motors, a defends itself against system
Southern California automotive hackers and their ilk.

10 | WardSAuto
october 2016
THE BIG STORY


HERE’S WHAT WE KNOW
NOTHING
IS FOOL-PROOF.

WardsAuto: Cybersecurity for


dealers involves protecting their
information and their customers’

GALPIN’S
BRIAN ALLAN

The biggest advantage a dealer


can have today is to have a com-
pliance system that is a docu-
information. Your dealership is mented process that shows you
one of the biggest in the world. are trying to do the right thing.
How do you do it?
Allan: Galpin has a full compli- WardsAuto: What would be a
ance department. That includes couple examples?
part of our legal team and com- Allan: In the cyber end, it
pliance coordinators. We’ve set involves password issues. We
up what we call a safe-harbor sys- do password audits. Now, the
tem where you take all the guide- passwords are more difficult, but
lines and instill a process to check also where different machines
those. We have monthly reviews, are utilized, they are turned off
looking for areas of concern. with no activity. It’s having those

11 | WARDSAUTO
WARDS AUTO
OCTOBER 2016
THE BIG STORY

check-the-box compliance ele- WardsAuto: Galpin seems like it


ments that help insulate you from is run like a corporation.
potential fines or even criminal Allan: Absolutely.
action.
WardsAuto: So presumably you
WardsAuto: Worse case, a hack- really have a defensive strategy.
er breaks into your system and Allan: We do. Of course, every
gets all sorts of information on system will have weaknesses that
customers. are just part of the human link.
Allan: Here’s what we know: Oddly, humans are the problems
Nothing is fool-proof. But if you when it comes to cybersecurity.
at least show the due diligence, You have to have faith in your
that you made every reasonable employees, but it’s like the old
attempt to protect that data, adage, “Trust but verify.”
you are pretty much protected Again, a documented process
from (claims of) gross will give you the best possible
negligence. And that’s protection, recognizing that noth-
the key. As ing is 100%.
we know,
multi-bil- WardsAuto: Is this method of
lion-dollar defense something you set up as
firms can get a response to a hack attempt or
their accounts breach or was it more proactive?
hacked. Allan: It’s more learning from
The key is that others’ mistakes. That’s the
you didn’t do cheapest way to learn. It’s keep-
something ing up to date on bulletins, what’s
stupid, like happening, where are areas of
having every weaknesses that others have
employee use experienced and then mapping
“password” as their pass- out a protection plan to insulate
word. yourself. wa – Steve Finlay

12 | WardSAuto
october 2016
THE BIG STORY

10 Ways Dealers
Can Live in a Safer
Cyber World
Cybersecurity experts recommend dealership personnel take these precautions,
among others, to fight hack attacks and protect data:

1 Do not allow employees to


take home sensitive customer
system information with anyone. Monitor
employee computer use.

6
information that’s contained on laptops, Put in place policies and
memory sticks or the like. Despite the best procedures. That will reduce poten­tial
intentions of devoted staffers working threats. If everyone knows it’s inappropriate
after hours, that practice runs risks. to take home customer information, it turns
Increased use of mobile devices can infect everyone into human firewalls.
a dealership network if they are taken
off site and connected to insecure public
Wi-Fi hotspots.
7 Change passwords regularly and
have stronger passwords then, say,
dealer1234.

2 Dealership Wi-Fi networks should


be segmented into in-store hotspots
from the main network to thwart such
8 Click on anti-virus protection
for PCs, including updates. “Those
updates typically are to fix security
cross infection.
vulnerabilities, although they don’t say

3 Understand applicable regulations,


in particular the Gramm-Leach-Bliley
that,” says Lisa Plaggemier, CDK Global’s
director-business security.

9
Act and the Federal Trade Commission’s
Scrub systems of user names and
Safeguards Rule that require dealers to
passwords of former employees. Don’t
protect collected customer information.
just get the front-door keys from them, get

4 Understand security risks. Consider them out of the system.

10
having a network assessment done Be on the lookout for phishing
to probe for weaknesses so you can emails in which cyber crooks pose
remediate. as legitimate companies. Opening an

5 Educate employees not to share


passwords or other confidential
attachment that claims to be a payment
or invoice can infect your system.

13 | WardSAuto
october 2016

S-ar putea să vă placă și