The Department of Motor Vehicles (DMV) may not be many people’s favorite place, but in South Carolina, it has apparently become a magnet for hackers.
Last week, South Carolina DMV Executive Director Kevin Shwedo told a panel of senators the FBI visited DMV recently to identify vulnerabilities in its computer system which will need to be fixed with new firewalls, as well as investments in encryption to secure sensitive data.
“I get pinged virtually every night from countries like China, Pakistan, the Czech republic, Syria and others,” he was quoted as saying by the Greenville News.
How the attacks had been attributed to those countries was not revealed, but some say the situation underscores the reality that organizations of all shapes and sizes can come under attack – and that means IT professionals need to take measures to assess their security posture.
“Security is a process, not a product,” said Scott Waddell, vice president of technology at iovation. “So you really have to think in terms of securing what you’ve got, monitoring that security, testing it regularly – ideally through third-party, internal and external security assessments – and then making sure you’ve got executive buy-in to effect change to improve security following the best practices that come from both the consultants and the dedicated staff you have on the team to focus on that day in and day out.”
According to reports, the DMV has been hit with about 90 intrusion attempts between Jan.1 and Feb. 2, all of which the agency said it has deflected.
“Nobody should be surprised if they are targeted online, especially those organizations that collect and store sensitive data,” said Josh Shaul, CTO of database security firm Application Security. “DMVs and other agencies that issue official identification will always be prime targets for attack. Their comment about having had around 90 intrusion attempts this year is very vague. That sounds like a small number, but who knows what they count as an ‘attack’. The more interesting question for me is how do they know? Could there have been other attacks that they didn’t detect and therefore didn’t stop?”
The agency will never succeed in protecting their databases simply by adding more firewalls as there are too many ways “around and through the network perimeter for that to be an effective measure,” he said.
Though he agreed it was hard to assess the report of 90 attacks without more information, Rapid7 researcher Marcus Carey also noted that the FBI does not typically pay an onsite-visit to the DMV unless there is a significant issue. When it comes to organizations assessing their security posture, Carey suggested implementing a vulnerability management program and configurations to identify all assets, software and what their risks are. Organizations should also develop incident response and business continuity capabilities, including organization-wide security threat awareness training for security administrators, management and users.
“Encryption and masking are also often considered a silver bullet for database security, but only solve a few specific problems,” Shaul said. “The truth is there is no silver bullet for databases. To keep them secure, its takes good hygiene. That means scanning for vulnerabilities, misconfigurations, and access controls, fixing the problems you find. Of course it is not realistic to believe that everything will be fixed, so what isn’t fixed must be monitored, so if and when something goes wrong, you know it immediately and can respond before damage is done.”
Shwedo noted that other state and federal agencies are consistently under attack. So are companies in the private sector. Last week, ICS-CERT (Industrial Control System Computer Emergency Readiness Team) issued an alert to warn critical infrastructure companies of secure shell (SSH) scans of Internet-facing control systems. According to ICS-CERT, an electric utility reported experiencing unsuccessful brute force activity against their networks.
“You’ve got to stay abreast of network security issues,” Shwedo said. “We’re going to do everything we can to prevent an intrusion. And we’re going to make sure we’ve got the right hardware and the right software and the right encryption to protect that information.”
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- What if the Current AI Hype Is a Dead End?
- Microsoft Makes SMB Signing Default Requirement in Windows 11 to Boost Security
- Zyxel Urges Customers to Patch Firewalls Against Exploited Vulnerabilities
- Gigabyte Rolls Out BIOS Updates to Remove Backdoor From Motherboards
- SBOMs – Software Supply Chain Security’s Future or Fantasy?
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
- Cybersecurity M&A Roundup: 36 Deals Announced in May 2023
- Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech
