Millions of T-Mobile customers exposed in Experian breach

Slides:



Advertisements
Similar presentations
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
Advertisements

Red Flag Rules: What they are? & What you need to do
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
Parachute Neighborhood Watch Presentation February 9, 2010.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Identity Theft Presented by Christina Williams and Lazaro Juarez Orange County’s Credit Union.
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
1 Personal Health Information Data Breach. What Happened? March 10, 2012: Computer hackers illegally access a Department of Technology Services (DTS)
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
Discussion Topics What is Identity Theft? Ways to Commit Identity Theft How Identity Thieves uses Victim’s Information Guarding your personal Information.
2015 ANNUAL TRAINING By: Denise Goff
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime,
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
Protecting Your Assets By Preventing Identity Theft 1.
Government Agency’s Name April  At the end of this course, the learner will be able to: ◦ Define personally identifiable information ◦ List examples.
Government Agency’s Name April Identity Theft is when someone steals your personal information and uses it as their own, usually for some financial.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
What lessons can we learn from other data breaches? Target Sentry Insurance Dynacare Laboratories 1 INTRODUCTION.
 Did YOU Know?!?  Tennessee is bordered by 8 states: Alabama, Arkansas, Georgia, Kentucky, Mississippi, Missouri, North Carolina and Virginia - more.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
©2015 Experian Information Solutions, Inc. All rights reserved. Experian and the Experian marks used herein are trademarks or registered trademarks of.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Protecting Your Assets By Preventing Identity Theft
IDENTITY THEFT.
You’ve Been Hacked! What to do when your personal information has been compromised Paul T. Yoder, Information Systems Security Specialist.
Take Charge of your Finances
Small Business and Personal Credit
Gift Card Risk Mitigation – Presentation A
Common Methods Used to Commit Computer Crimes
Protection of CONSUMER information
Fraud Mobility Ken Meiser VP- Identity Solutions.
Protecting Your Identity:
Take Charge of your Finances
Tax Identity Theft Presenter Date
MIS 5121: Real World Control Failure - TJX
Updates in the World of Consumer Credit
Securing Information Systems
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
By: Johnathan Rowse, Jacob Palmer, Kayla Morgan, Paige Frasier
Protecting Your Identity:
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Red Flags Rule An Introduction County College of Morris
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Identity Theft Prevention Program Training
Protecting Your Company’s Most Valuable Asset
Clemson University Red Flags Rule Training
Cyber Security: What the Head & Board Need to Know
INFS 452 – Computer Ethics & Society
Take Charge of your Finances
Company Name | Phone Number | Website | Address
Colorado “Protections For Consumer Data Privacy” Law
Anatomy of a Common Cyber Attack
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Millions of T-Mobile customers exposed in Experian breach Ming Hu Abhay Kshirsagar Ariana Levinson Victoria A. Johnson Jianhui Chen Binu Anna Eapen

Overview Experian is a global information services company, it provides data and analytical tools to assist clients in managing consumer credit risk. T-Mobile is a major wireless network operator, it provides wireless and data services in the United States. T-Mobile hired Experian to process it’s credit applications Experian was allowed to host related data It’s an outsourcing relationship between T-Mobile and Experian

What happened Event reported: Sept. 15, 2015: An unauthorized party accessed T-Mobile data housed in an Experian server. Data at risk: Records containing name, address, Social Security number, date of birth, identification number (driver’s license, military ID, or passport number) and additional information used in T-Mobile's credit assessment of current customers and consumers who applied for T-Mobile USA postpaid services from 1st September 2013 through Sept 16, 2015 were accessed. Data not lost : Payment card/banking information,Experian’s customer database was not accessed. http://www.t-mobile.com/landing/experian-data-breach.html

What happened(continuation) Steps taken by Experian: Ensuring web application firewalls are working as intended Enhancing security of encryption keys Limiting authorized access to the server Engaging U.S. and international law enforcement and cyber crime authorities Increased monitoring of the affected servers and associated systems Notifying the affected customers and offering free credit monitoring for 2 years and identifying resolution services as long as the customer needs Data Misuse: There is no evidence at this time that the data has been used inappropriately. http://www.t-mobile.com/landing/experian-data-breach.html

How it happened T-Mobile and Experian both acknowledged that encryption may have cracked by intruders. It has not been confirmed as to what encryption was used. Due to the intruder's ability to break into the Experian systems designed for keeping information encrypted and safe, is the reason they were able to steal encrypted data. http://www.computing.co.uk/ctg/news/2428901/experian-t-mobile-hack-shows-encryption-no-panacea-for-security-warns-tor-co-founder

Impact T-Mobile USA’s consumer unit wasn’t hit. Experian, a vendor who processed credit applications for T-Mobile was hit. Customers: Individuals who applied for T-Mobile services from September 1, 2013 to September 16, 2015 15 million people hit by the breach PII Risks: Identity Theft, Utility Fraud, Tax Fraud, Medical Fraud T-Mobile: Legal: Six lawsuits filed against T-Mobile and Experian accusing companies of negligence and violations of consumer protection laws, claim the stolen data is already appearing for sale in corners of the Internet known as the dark web. Financial: Shares were down 1.3% Consumer unit wasn't hit, it was the vendor (experian) who possessed the credit application. So T-Mobile was using Experian to process their credit applications. That means if you applied for service or device financing with T-Mobile between September 1, 2013 and September 16, 2015, you may be affected even if you’re not currently a T-Mobile customer. The 15 million people hit by the breach represent more than a quarter of Bellevue, Washington-based T-Mobile's 58.9 million customers, although some of the affected are no longer subscribers. The stolen data includes names, birth dates, addresses, and Social Security and drivers' license numbers, but not credit card or payment information. The information that was exposed could lead to an increased risk of identity theft. Although Experian has no evidence suggesting your personal information has been misused, they take their obligation to help you protect your information very seriously, and deeply regret that this has happened. Experian encourages all eligible individuals to enroll in the complimentary identity resolution services Experian has offered. Utility fraud All it takes to set up an account with most utility companies is a street address and a Social Security Number (SSN). From there, thousands of dollars in gas, electric and other bills can be amassed quickly if a customer’s SSN falls into the wrong hands. Tax fraud Victims of PII theft have reported instances of tax returns filed in their names to claim tax refunds. Aside from the obvious financial issues this causes, the false returns can hurt a person’s standing with the IRS for years to come. Medical fraud Using stolen PII to claim prescriptions and accrue other medical expenses is becoming more common. People have received notices of prescription drug charges and emergency room stays they never used, all because some of their personal information was compromised.

Root cause analysis T-Mobile stored its customer data on third party vendor-- Experian As a research shows there is up to 63% of all data breaches is caused by a third party vendor. Vulnerabilities: Vulnerabilities were identified in encryption algorithm used. Possibly the encryption technology was not updated timely or needed more enhanced algorithms. The web application firewall not working as intended. The ineffective detective control:   The hacker could hack the existing controls in place and get up to 15 million customer information. http://blog.eiqnetworks.com/blog/the-experian/t-mobile-breach-is-it-possible-to-predict-big-hacks http://blog.securityscorecard.com/2016/07/20/third-party-vendor-breaches-2016/

Controls to remediate security and lessons learned Experian Implement a vulnerability management tool (Qualys, Nessus, etc.) Scan regularly and often. When updates or patches are pushed out, they should be applied within 30 days. Limit the number of people with physical and logical access to the servers. Carefully test all changes, patches, and configurations before implementation in Production, to ensure they are not unintentionally undermining the established security controls. ALL Personally Identifiable Information (PII) i.e. Name, DoB, SSN, Addresses, Phone #s, etc. should be strongly encrypted within the systems they are stored in. Should a breach occur and data stolen, that data should not be readable. T-Mobile Caught between a rock and a hard place - Credit checks and a limited marketplace

Thank you Q&A