SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Downloaden Sie, um offline zu lesen
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
Risk Consulting
An ethical investigation into
cyber security across the Forbes 2000
Publish and
be Damned
What does your online
corporate profile reveal?
Cyber Vulnerability Index 2012
Publish and be Damned
Foreword

Following a series of very high-profile security
breaches over the past year, executives are
quickly becoming aware of the significant
risks posed by the loss of data: competitive
advantage is eroded; organisational secrets
are stolen; corporate reputations are damaged.
Today’s cyber attack threat has evolved significantly from the
rather crude ‘full frontal attack’ method that characterised
attacks in the past. Indeed, today’s cyber threat is more
likely to come from social activists, criminals, competitors
or even national governments who use stealth tactics to
identify and exploit publicly available information with
the ultimate goal of gaining unfettered access to
networks and systems.
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
Publish and be Damned
Modern cyber attacks prey on
“information leaks” - publicly accessible
information relating to organisations and
their employees which is then used in
targeted phishing or “spear-phishing”,
elaborate social engineering and technical
attacks against entire organisations.
Due to the public nature of information
leaks, which are often inadvertent, this
phase of cyber attacker reconnaissance
typically leaves little or no footprint, yet
can allow for gathering of confidential
internal usernames, email addresses,
network details and vulnerable software
versions to list but a few examples.
Here is how it works: let’s say, for
example, that you made a donation
to a local charity, in recognition the
organisation lists your name on their
website as a sponsor. Two days later,
you receive an email from the
Fundraising Chair asking you to confirm
your donation. You open the email, fill
out the form (being careful not to include
any banking or sensitive information) and
return it to the sender. But in reality, the
email didn’t come from the charity at all;
the attachment was, in fact, a high-
quality fake containing a virus, allowing
perpetrators to seize control of your
computer, read your emails and record
your passwords. Everything you know,
they now know; everything you see,
they now see. Clearly, information
leakage is rapidly becoming a board-level
risk. But exactly how big a risk is it?
Over a six month period KPMG
performed research in this domain
focussing on the Forbes 2000: an
annual ranking of the top 2000 public
companies in the world by Forbes
magazine. At the inception of this
research the combined market
value of all Forbes 2000 companies
was US$31 trillion. The aim of this
research was to perform the same initial
steps that cyber attackers and organised
criminals would perform when profiling
a target organisation for attack, using
sophisticated techniques that are often
referred to as Advanced Persistent
Threats, or ‘APTs’.
By performing the same study across
the Forbes 2000 it was possible to
identify common themes and trends
across countries and sectors. The
research identified many security shortfalls
in the Internet-facing security posture of
organisations and specific countries. No
hacking, unauthorised or illegal actions
were performed during this research. The
information leaks gathered were sourced
from publically available information,
search engines, and public documents
located across the Forbes 2000 corporate
websites. The results provide an insight
into missing security basics which are
exposing websites, employees and
corporate data to potential cyber attack.
This report provides an overview of our
findings and paints a picture of a world that
has yet to come to terms with the threats
posed by cyber attackers. As such, these
results should provide executives with
not only a strong incentive for greater
awareness and management of their
organisation’s information, but also provide
a unique benchmark against which to
measure their security activities.
I encourage you to contact either myself or
your local KPMG office to learn more about
these findings or to discuss your organisation’s
exposure to these critical risks.
Martin Jordan
Head of Cyber Response
KPMG in the UK
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
Publish and be Damned
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
Publish and be Damned
Contents
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
01 Executive Summary
04 Collecting Meta-Data
08 Harvesting Sensitive
Locations and Hidden
Functionality
12 Gathering Data
from Popular
Search Engines
16 Web Server Software
Vulnerabilities
20 Who is Most at Risk?
24 4 Steps to Minimise
Your Exposure
1 | Publish and be Damned
Executive Summary
With so many cyber attacks in the news
recently, executives are becoming
increasingly concerned about their
organisation’s exposure to hackers.
And so they should. According to our
research, more than three-quarters
of the Forbes 2000 companies leak
potentially dangerous data.
The sources of this information 	
are varied and widespread.
Some are within the direct
control of the corporation
(websites, documents and web 

servers) and – with effort – can
be directly addressed. Other 	
channels such as popular search
engines and forums, are outside
of the usual enterprise security 	
curtain and pose a much more 

complex challenge.

Interestingly, many of the sectors that normally 

display exceptionally strong cyber security 

controls seem to be at the highest risk,
namely banks, financial services and 

telecoms companies. 

The problem is also not unique to one region or
market type in particular. Indeed, looking at the
‘Heat Map’ of global information leakage across
the Forbes 2000, higher-risk countries span both
the developed world (US, Switzerland, Japan,
and Germany to name a few) and the emerging
markets (such as Brazil,Thailand and
Saudi Arabia).
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
Figure 1
Top 10 information leaking sectors
6% Oil & GasOperations
6%
30%Banking
12%Diversified
Financials
10% Materials
8%
T elecommunications
Services
8%Utilities
Technology
Hardware&
Equipment
6%
Media
6% Construction
Insurance
8%
Executive Summary Collecting Meta-Data Harvesting Sensitive Locations
and Hidden Functionality
Gathering Data from
Popular Search Engines
Web Server Software
Vulnerabilities
Who is Most at Risk? 4 Steps to Minimise
Your Exposure
Publish and be Damned | 2
Figure 2
Heat-map of information leaking countries
Kazakhstan
Russia
Norway
Netherlands
Switzerland
Germany
Italy
Liechtenstein
Mexico
United States
Spain
United
Arab
Emirates
Thailand
Taiwan
China
Japan
Saudi Arabia Malaysia
Peru
Brazil
Very hot Hot Warm
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
3 | Publish and be Damned
“According to retrieved
version information from
document meta-data,
71 percent of the Forbes
2000 companies may be
using potentially
vulnerable and out-dated
versions of Microsoft
and Adobe software”
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
Publish and be Damned | 4

© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
Collectting MMeta-Data
78%OF FORBES 2000 CORPORATE
WEBSITES LEAK SOME FORM OF
POTENTIALLY USEFUL INFORMATION
THROUGH DOCUMENT META-DATA
5 | Publish and be Damned
Information within document
meta-data often constitutes
an information leak as it can
provide cyber attackers with
a view of corporate network
users, their email addresses,
the software versions they
use to create documents and
internal network locations
where files are stored.
By sector, the distribution shows
that technology and software
sectors appear to expose the most
information in relation to the meta-data
in documents they serve on their
corporate websites.
This part of the research quickly
demonstrated the ease with which
cyber attackers can target specific
individuals and the vulnerable software
versions that they may be using on
their computers. Sadly, it is relatively
straightforward to visit a hacking
website, pay US$200 and have a
bespoke Trojan email produced,
specifically targeted at one individual
within a company. If the target of
these attacks is lucky, their spam filter
will block the email, if not then their
corporate secrets may be revealed upon
a seemingly innocent click of a button.
What is meta-data?
Document meta-data is information ‘about’ a
document, or information on its properties.
It often informs who created a document,
when and where on a device or network.
KPMG downloaded almost 10 million publicly-
available documents across the Forbes 2000
corporate websites including common file
types such as Microsoft Office and Adobe
Acrobat PDF. Once downloaded, automated
tools were used to extract meta-data from
these files, such as the username of the creator,
the network location where the document was
created or saved and the version of software
used to create the document.
The following meta-data information leaks were collected
across all Forbes 2000 corporate websites:
Total across Average
Information leak all 2000 sites per site
Number of potential usernames 419,430 210
Number of network folders and locations 104,370 52
Number of printers and their hostnames 33,250 17
Number of software applications and versions 70,910 35
Number of email addresses 342,040 171
Figure 3. Meta-data information leaks across all sites
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
Executive Summary Collecting Meta-Data Harvesting Sensitive Locations
and Hidden Functionality
Gathering Data from
Popular Search Engines
Web Server Software
Vulnerabilities
Who is Most at Risk? 4 Steps to Minimise
Your Exposure
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
Publish and be Damned | 6
Figure 4
Number of documents on corporate websites by sector
Utilities
Transportation
TradingCompanies
TelecommunicationsServices
TechnologyHardwareandEquipment
SoftwareandServices
Semiconductors
Retailing
OilandGasOperations
Media
Materials
Insurance
HouseholdandPersonalProducts
Hotels,RestaurantsandLeisure
HealthCareEquipmentandServices
Food,Drink&Tobacco
FoodMarkets
DrugsandBiotechnology
DiversifiedFinancials
ConsumerDurables
Construction
Conglomerates
Chemicals
CapitalGoods
BusinessServicesandSupplies
Banking
AerospaceandDefence
0
200,000
400,000
600,000
800,000
1,000,000
1,200,000
1,400,000
1,600,000
1,800,000
2,000,000
Numberofdocuments
7 | Publish and be Damned
“The ‘hi-tech’ sector
publishes more documents
across websites than any
other industry”
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
Publish and be Damned | 8

© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
Harvestti Sng Sensitive
Locatioons and Hidden
Functioonallittty
15%OF THE FORBES 2000 CORPORATE
WEBSITES OFFER HACKERS ACCESS
TO TEST FUNCTIONALITY
AND PRIVATE LOGIN PORTALS
THAT POTENTIALLY ALLOW FILE
UPLOAD CAPABILITIES
9 | Publish and be Damned
Part of our research focussed
on the structure of the Forbes
2000 corporate websites
to identify any potentially
sensitive file locations or
hidden functionality that
may be useful to cyber
attackers. While navigating
the sites, we found a number
of keywords that revealed
interesting file locations
that would stimulate further
investigation by cyber
attackers (see Figure 5).
A large number of temporary files were
found across the sites, in addition to
administrative and private login portals for
webmasters. Upload functionality was
discovered on some sites which might
enable cyber attackers to upload software
to execute commands on those web
servers. Backup and test content, providing
enhanced functionality over the corporate
websites, was also discovered
in many instances.
A number of file locations marked
‘private’ were also identified, hosting
documents that were not intended for
public consumption. In particular, Banking,
Diversified Financials and Insurance
companies seem to be exposing sensitive
information and hidden functionality on
their websites (see Figure 6).
Figure 5
Top 10 keywords revealing interesting file locations on corporate websites
Number of
Keyword Occurrences Description
Temp 553 Temporary files sometime revealing test information
Data 481 Sometimes data folders including backup client or corporate data
.txt 429 Many text files found with system configuration information
Test 293 Website test functionality, sometimes providing enhanced functionality on websites
Admin 292 Administrative pages, often protected with a login
Login 246 Sometimes included login for site management and content modification
Private 233 Some files available which perhaps should be protected
Upload 111 Some instances of remote file upload capabilities
Secure 87 Often protected by a login, but highlighting areas of possible interest by attackers
Command 59 Some instances of potential to run commands on the web server
Hacker alert!
US Cyber Security response
team warn of attacks upon
the gas industry
April 2012, ICS-CERT reported a number
of cyber intrusions targeting gas pipeline
companies. Analysis of the attacks confirm
they are part of an ongoing campaign dating
back to December 2012 and confirm Spear­
phishing was used to target a number of
specific individuals acrossthe gas
pipeline industry.
When serving test, upload or hidden functionality,

many companies face the associated risk of cyber attackers defacing
websites, or assuming control of these sites. Cyber attackers may also
use this newly gained functionality to inject malware into the sites
which will infect all subsequent visitors of those sites.
Executive Summary Collecting Meta-Data Harvesting Sensitive Locations Gathering Data from Web Server Software Who is Most at Risk? 4 Steps to Minimise
and Hidden Functionality Popular Search Engines Vulnerabilities Your Exposure
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
Figure 6

Number of potentially sensitive file locations on the Forbes 2000 corporate websites by sector
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
Publish and be Damned | 10
Utilities
Transportation
TradingCompanies
TelecommunicationsServices
TechnologyHardwareandEquipment
SoftwareandServices
Semiconductors
Retailing
OilandGasOperations
Media
Materials
Insurance
HouseholdandPersonalProducts
Hotels,RestaurantsandLeisure
HealthCareEquipmentandServices
Food,Drink&Tobacco
FoodMarkets
DrugsandBiotechnology
DiversifiedFinancials
ConsumerDurables
Construction
Conglomerates
Chemicals
CapitalGoods
BusinessServicesandSupplies
Banking
AerospaceandDefence
0
20

40

60

80

100

120

140

Numberofpotentiallysensitivefilelocations
11 | Publish and be Damned
“Online discussions often
reveal details on corporate
projects and technologies in
use by companies.
They also reveal e-mail
addresses of potential
spear-phishing targets”
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
Publish and be Damned | 12
Gatherring DData
from Poopulaar
Searchh Ennggines
COMPANIES INVOLVED IN
TECHNOLOGY AND SOFTWARE POST
FAR MORE INFORMATION TO ONLINE
FORUMS AND NEWSGROUPS THAN
ALL OTHER SECTORS COMBINED
13 | Publish and be Damned
As part of many popular
search engine services,
discussions are stored
within a searchable web
cache and can be queried
for specific postings by
users. In addition to the
meta-data available,
individuals often expose
within these postings
sensitive information about
the current technologies in
use by organisations.
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
We found that technology and software
companies post far more information to
online forums and newsgroups than all
other sectors combined.
For this portion of the research, we
queried a popular search engine’s
postings written by individuals with email
addresses at Forbes 2000 organisations.
We found that, on occasion, what might
be deemed commercially-sensitive
information was found posted to public
domain forums. The top 10 organisations
in terms of number of postings in
such forums included members of the
technology, software and semiconductor
and telecommunication industries.
Figure 7
Top 10 sectors posting the most information to public forums and newsgroups.
Sector Number of newsgroup postings
Software & Services 49,965,680
Telecommunications Services 1,239,827
Technology Hardware & Equipment 769,574
Semiconductors 237,791
Conglomerates 193,118
Media 170,634
Aerospace & Defence 146,751
Drugs & Biotechnology 100,178
Oil & Gas Operations 88,681
Banking 88,527
Hacker alert!
Cyber attackers will spend time trawling
newsgroups for information relating to
potential targets. These postings often
reveal email addresses of individuals to be
targeted in spear-phishing attacks, and may
also reveal information on an individual’s
hobbies, interests or specific work areas
which can be used in targeted social
engineering attacks.
Executive Summary Collecting Meta-Data Gathering DataHarvesting Sensitive Locations Gathering Data from Web Server Software Who is Most at Risk? 4 Steps to Minimise
from Google Groupsand Hidden Functionality Popular Search Engines Vulnerabilities Your Exposure
Publish and be Damned | 14

© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
15 | Publish and be Damned
“Many instances of
un-patched and unsupported
web server software were
found to be serving some
Forbes 2000 corporate
websites”
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
Publish and be Damned | 16

© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
Web Servver Sooftware
Vulnerabbilitiieees
16%OF FORBES 2000 CORPORATE
WEB SERVERS MAY BE VULNERABLE
TO ATTACK DUE TO MISSING
SECURITY PATCHES OR OUT-DATED
SERVER SOFTWARE
17 | Publish and be Damned
Figure 8 	
Web server technologies across the 	
Forbes 2000 corporate websites	
7%
Alcam
ai
2%
Sun
26%
M
icrosoft
16%
Other
30%Apache
4% IBM	 1% Lotus
14%Unknown
As part of our research, our security
experts identified the specific web
server technologies used across
corporate sites (see Figure 8), and
correlated this data against known
security flaws, to identify the 10 sectors
vulnerable in terms of their underlying
web server technology. Of the two most
common software systems in use by
corporations, 8 percent of Apache web
servers were found to be potentially
vulnerable, and 6 percent of Microsoft
web servers were potentially vulnerable.
Looking at the results across industry
groups (see Figure 9), Utilities stand out
as the most vulnerable sector affected
by version issues of their web server
software.
We also explored web server software
security on a country basis; this revealed
that a number of countries are further
behind others with regards to software
vulnerability patching and updating
of their web servers (see Figure 10).
Hacker alert!
Any web server on the Internet running
un-patched versions of web server software
is vulnerable to remote attack – the result of
a successful attack could range from a
Denial of Service (DoS) attack on the
website, to the attacker gaining full control
of the web server and its content.
Corporate websites run on an underlying web server
technology. When accessing a website the web server often
reveals its software version which is typically hidden from
a web browser’s view. Information leakage in these web
banner software versions can prove to be of significant value
to an attacker when profiling a remote target site and server.
Executive Summary Collecting Meta-Data Harvesting Sensitive Locations Gathering Data from Web Server Software Who is Most at Risk? 4 Steps to Minimise
and Hidden Functionality Popular Search Engines Vulnerabilities Your Exposure
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
Publish and be Damned | 18
Figure 9
Number of potential vulnerabilities affecting corporate web servers
per sector
Transportation
Food,Drink&Tobacco
Chemicals
Construction
Banking
Insurance
Materials
DiversifiedFinancials
TelecommunicationsServices
Utilities
0

200

400

600

800

1000

1200

1400

Numberofpotentialvulnerabilitiesaffectingcorporatewebserverspersector
Figure 10 

Top 10 countries vulnerable to potential attack via vulnerable web
server software
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
SaudiArabia
Brazil
Israel
Australia
Germany
Liechtenstein
India
Kazakhstan
Switzerland
Japan
0

200

400

600

800

1000

1200

Numberofpotentialattacksviawebserversoftwarepercountry
19 | Publish and be Damned
“The most information leaks
by sector affect Financial
Services, Software,
Technology, Telecoms and
Banking organisations”
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
Publish and be Damned | 20

© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
Who is Moost attt Risk?
THE TOP 10 FORBES 2000 COMPANIES
LEAKING INFORMATION HAIL
FROM EITHER THE US OR JAPAN.
MOST OF THESE ORGANISATIONS
ARE IN SOFTWARE OR TECHNOLOGY­
RELATED SECTORS
21 | Publish and be Damned
Cyber attackers
and organised
crime do not
only target one
avenue of attack.
Instead, they use
a combination
of available
information leaks
to profile a target,
and map them
out their internal
systems and their
components.
Cyber attackers will devote time and effort
in profiling the entire online presence of
potential targets; as a result, the more
information volunteered about a system or
network, the more likely an attacker might
be to further explore potential avenues
of attack.
It is important to emphasise that the
processes used to gather the information
leaks for our research were not
sophisticated and are available to anyone
with access to the Internet and little more
than a web browser.
To conclude our research, we aggregated
all normalised data from the overall
information leakage survey on a per
company, per sector and per country
basis, revealing clear tends. Correlation
of all results revealed that, across the
Forbes 2000 list of companies, the
greatest number of information leaks
affect financial, software, technology
and telecoms sectors. Indeed, the banking
sector in particular seemed most exposed.
However, technology and software
sectors also seem to be at risk with
employees within these sectors appearing
to publish much information in the
form of documents and online forum
queries. As such, these sectors are at
risk of inadvertent exposure of sensitive
information relating to their technologies
and intellectual property.
While the per country figures demonstrate
the extent of the challenge being faced
around the world, there are a number
of countries (Japan and Switzerland in
particular) that seem to be more exposed.
We took the additional step of collating
the results to identify the 10 Forbes 2000
companies that offered cyber attackers the
most opportunity.
The names of theTop 10 at risk
organisations shall remain anonymous,
however our summary of these
organisations shows the sector to which
they belong and the country in which
they operate.The magnitude of each bar
represents the amount of information
leaked by that organisation (see Figure 13).
Figure 11
Top 10 information leaking sectors
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
Telecommunications
Services
8%Utilities
6%
6% Oil & GasOperations
6%
30%Banking
12%Diversified
Financials
10% Materials
8%
Media
6% Construction
Insurance
Technology
8%Hardware&
Equipment
Executive Summary Collecting Meta-Data Harvesting Sensitive Locations
and Hidden Functionality
Gathering Data from
Popular Search Engines
Web Server Software
Vulnerabilities
Who is Most at Risk? 4 Steps to Minimise
Your Exposure
Publish and be Damned | 22
Figure 12
Top 10 information leaking countries
22% Japan
9%
Spain
7%Italy
6%Brazil
4%
U.S.
4%
Saudi Arabia
3% Thailand
3% Germany
2%Malaysia
40%Switzerland
Figure 13
Top 10 exposed organisations by sector and operating country
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
TechnologyHardware&Equipment
Utilities
Software&Services
Software&Services
DiversifiedFinancials
Conglomerates
Software&Services
Banking
Software&Services
TechnologyHardware&Equipment
High
Low
LevelofExposure
23 | Publish and be Damned
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
Publish and be Damned | 24

4 Steps to Minimise
your Exposure
25 | Publish and be Damned
The world of cyber
security has tilted on
its axis. Companies
now not only face cyber
attacks from hacking
groups, script kiddies
and hactivists but also
from state-sponsored
agencies with limitless
resources, seeking a
competitive edge or
intellectual property.
Just as attacks have
evolved companies must
evolve by re-evaluating
their own ability to
detect, defend and
respond to cyber attacks.
The types of information gained as part of
our research are proven to have been of
use in real-world cyber attacks. KPMG’s
Cyber Response team has successfully
penetrated organisational defences and
perimeters using such information leaks,
as part of legitimate client engagements
around social engineering and ethical
hacking.
Whilst each company must perform a
bespoke risk assessment against their own
digital estate, the following steps will go
some way to improve cyber security and
reduce the amount of extraneous meta-data
which companies expose on the Internet.
01

ASSESS
Perform an assessment of your Internet presence. What data does your
organisation currently leak to the world?
02
SPRING CLEAN
Where possible, cleanse meta-data from your existing published documents.
Ensure all corporate devices are fully patched, not just your online web servers.
03
EDUCATE “ALL” EMPLOYEES
Everyone in the organisation – from the boardroom to the mailroom – must
understand the value and sensitivity of the information they possess and,
more importantly, how to protect it.
04
ADJUST POLICIES
Instigate a policy to minimise unintentional or undesired corporate information
appearing on the Internet.
Executive Summary Collecting Meta-Data Harvesting Sensitive Locations Gathering Data from Web Server Software Who is Most at Risk? 4 Steps to Minimise
and Hidden Functionality Popular Search Engines Vulnerabilities Your Exposure
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
Publish and be Damned | 26
Cyber Response
methodology
BENCHMARKING
We can assess your company’s
Internet profile and benchmark
performance against industry peers.
TESTING
We can perform simulated cyber
attacks and social engineering
exercises against your infrastructures
to identify your existing exposure and
failures in existing security controls
and processes.
REMEDIATION
If your company falls below
industry peers, we can initiate
remediation programmes to
identify any gaps and instigate
improvement programmes.
KPMG
We have a comprehensive Cyber
Response methodology and service
which covers all facets of proactive
and reactive cyber response:
• Prepare and Train
• Detect and Initiate
• Contain and Investigate
• Report and Improve
POLICING
We can deploy a service to
continuously monitor your presence
on the Internet.
Glossary of terms
Apache
Open source web server software
APT
Advanced Persistent Threat (APT) is
characterised by the covert penetration
of systems by unauthorised individuals
to illegally exfiltrate information of
political, military or economic value from
an organisation over a sustained period
of time, typically using information for
competitive advantage. Initial attacks
may be a precursor to later attacks on
the same organisation or used as
a stepping stone to attack another
organisation
Backdoor
A method of gaining persistent access to
resources which typically by passes security
controls
Denial of Service (DoS)
Attacks involving attempts to render
IT resources unavailable or unusable
by legitimate users
File Upload
Functionality which allows for files and
documents to be uploaded over the Internet
to a remote website or server
ICS - CERT
Industrial Control Systems Cyber Emergency
Response Team
Malware
Malicious software, deliberately written with
malicious intent, to gain unauthorised access
or cause damage to computers and networks
Meta-Data
Information within a document ‘about’
the document and its properties
Microsoft™ IIS
Closed source web server software
by Microsoft
Script kiddies
a young person with limited technical skills
who uses programs developed by more
technical individuals to attack networks
and websites
Social Engineering
Process of manipulating or fooling
individuals into divulging information
Vulnerability
A weakness or flaw in a system or
process that if exploited might result
in a compromise of resources
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network
of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
About us
KPMG Risk Consulting brings together specialists with skills focussed on the Information and Technology Risk agenda. 

We have a team of over 3,500 professionals advising clients across all markets and geographies of the technology 

and data risks they face. We are a global network of KPMG member firms with over 140,000 professionals in 150 countries.

We help our clients to prevent, identify and remediate Information and Technology failures and ensure systems are fit for the 

future. Our independent advice and advanced technology capabilities help our clients manage their technology risks and use 

their data to its full potential.

Our award winning Information Protection team helps organisations assess risk and design, test, and implement the controls 

required to protect them from security breaches, including accidents and cyber attack.

KPMG’s UK Cyber Response team is comprised of experienced, highly technical security consultants. The team is proficient 

in penetrating client IT systems in order to identify security weakness in their infrastructures and to articulate the security

risks to their business, alongside practical mitigation advice. We are also specialists in responding to cyber incidents and help 

clients effectively manage their response to cyber attack through detection, containment, recovery and Cyber Response 

improvement programmes.

Why us
• Award-winning – KPMG was awarded ‘Information Security Consultant of the Year 2012’ at the SC Magazine Europe
Awards 2012. This is the second year running that KPMG has won the award. KPMG were also highly commended for
the Information Security Project of the Year category for I-4 programme, which is the leading information security forum
for large global businesses. Our Information Protection team also received the 2010 Management Consulting Association
(MCA) Management Award for Business Strategy for our work with a leading bank on a major third-party security
assurance programme.
• Commitment - KPMG’s client relationships are built on mutual trust and long-term commitment to providing
effective and efficient solutions. We are dedicated to providing a service that is second to none.
• Industry knowledge - Through I-4 (the International Information Integrity Institute) we help the world’s leading organisations
to work together to solve today’s and tomorrow’s biggest security challenges. To learn more go to www.i4online.com
Contact us
Malcolm Marshall
Partner, Head of Information Protection
and Business Resilience
+44 (0)20 7311 5456
malcolm.marshall@kpmg.co.uk
Stephen Bonner
Partner, Financial Services, Information Protection
and Business Resilience
+44 (0)20 7694 1644
stephen.bonner@kpmg.co.uk
Charles Hosner
Partner, Corporates, Information Protection
and Business Resilience
+44 (0)7500 809 597
charles.hosner@kpmg.co.uk
Martin Jordan
Head of Cyber Response
+44 (0)776 846 7896
martin.jordan@kpmg.co.uk
www.kpmg.co.uk/security
The information contained herein is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although we endeavour to provide accurate
and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act on
such information without appropriate professional advice after a thorough examination of the particular situation.
© 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with
KPMG International Cooperative, a Swiss entity. All rights reserved.
The KPMG name, logo and “cutting through complexity” are registered trademarks or trademarks of KPMG International.
RR Donnelley I RRD-270670 I July 2012

Weitere ähnliche Inhalte

Was ist angesagt?

INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacySymantec
 
NME IT Security Survey 2016
NME IT Security Survey 2016 NME IT Security Survey 2016
NME IT Security Survey 2016 CTM360
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016Nathan CAVRIL
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
First_and_Last_Line_of_Defense_Final-v2
First_and_Last_Line_of_Defense_Final-v2First_and_Last_Line_of_Defense_Final-v2
First_and_Last_Line_of_Defense_Final-v2Alessandro Gazzini
 
7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By Stellarise7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By StellariseElena Tatarenkova
 
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Creus Moreira Carlos
 
Lashback Mailcon 2021
Lashback Mailcon 2021Lashback Mailcon 2021
Lashback Mailcon 2021LashBack, LLC
 
Coso in the cyber age
Coso in the cyber ageCoso in the cyber age
Coso in the cyber ageAmit Bhargava
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)naveen p
 
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Ashish Chauhan
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?Hayden McCall
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewMorgan Jones
 
US cost_of_cyber_crime_study_final6
US  cost_of_cyber_crime_study_final6 US  cost_of_cyber_crime_study_final6
US cost_of_cyber_crime_study_final6 CMR WORLD TECH
 
Hpesp wp ponemon_costofcybercrimestudy2012_unitedstates(1)
Hpesp wp ponemon_costofcybercrimestudy2012_unitedstates(1)Hpesp wp ponemon_costofcybercrimestudy2012_unitedstates(1)
Hpesp wp ponemon_costofcybercrimestudy2012_unitedstates(1)Zeno Idzerda
 

Was ist angesagt? (20)

INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data Privacy
 
The Future of Cybersecurity
The Future of CybersecurityThe Future of Cybersecurity
The Future of Cybersecurity
 
NME IT Security Survey 2016
NME IT Security Survey 2016 NME IT Security Survey 2016
NME IT Security Survey 2016
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
First_and_Last_Line_of_Defense_Final-v2
First_and_Last_Line_of_Defense_Final-v2First_and_Last_Line_of_Defense_Final-v2
First_and_Last_Line_of_Defense_Final-v2
 
7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By Stellarise7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By Stellarise
 
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
 
Lashback Mailcon 2021
Lashback Mailcon 2021Lashback Mailcon 2021
Lashback Mailcon 2021
 
Coso in the cyber age
Coso in the cyber ageCoso in the cyber age
Coso in the cyber age
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual review
 
sc_can0315_28373
sc_can0315_28373sc_can0315_28373
sc_can0315_28373
 
US cost_of_cyber_crime_study_final6
US  cost_of_cyber_crime_study_final6 US  cost_of_cyber_crime_study_final6
US cost_of_cyber_crime_study_final6
 
Hpesp wp ponemon_costofcybercrimestudy2012_unitedstates(1)
Hpesp wp ponemon_costofcybercrimestudy2012_unitedstates(1)Hpesp wp ponemon_costofcybercrimestudy2012_unitedstates(1)
Hpesp wp ponemon_costofcybercrimestudy2012_unitedstates(1)
 

Ähnlich wie Publish and be damned

Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...
Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...
Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...Charmaine Servado
 
FTSE350 Cyber Governance - An insight into the issues of today and tomorrow
FTSE350 Cyber Governance - An insight into the issues of today and tomorrowFTSE350 Cyber Governance - An insight into the issues of today and tomorrow
FTSE350 Cyber Governance - An insight into the issues of today and tomorrowLeona Markham
 
The Proactive Approach to Cyber Security
The Proactive Approach to Cyber SecurityThe Proactive Approach to Cyber Security
The Proactive Approach to Cyber SecurityNathan Desfontaines
 
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsNATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsBenjamin Rohé
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Adam Bulava GCC 2019
Adam Bulava GCC 2019Adam Bulava GCC 2019
Adam Bulava GCC 2019ImekDesign
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxNakhoudah
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersMerry D'souza
 
Proofpoint Email Security Award Write Up
Proofpoint  Email Security Award Write UpProofpoint  Email Security Award Write Up
Proofpoint Email Security Award Write UpClaudia Toscano
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...Judith Beckhard Cardoso
 
5 things digital media companies need to do now
5 things digital media companies need to do now5 things digital media companies need to do now
5 things digital media companies need to do nowGrant Thornton LLP
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Business Days
 
Security Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you knowSecurity Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you knowqmatheson
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9seadeloitte
 
http://www.slideshare.net/slideshow/embed_code/28627951
http://www.slideshare.net/slideshow/embed_code/28627951http://www.slideshare.net/slideshow/embed_code/28627951
http://www.slideshare.net/slideshow/embed_code/28627951N0b10111
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfBrafton
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen Hamilton
 
A New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionA New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionDevOps.com
 
The ever increasing threat of cyber crime
The ever increasing threat of cyber crimeThe ever increasing threat of cyber crime
The ever increasing threat of cyber crimeNathan Desfontaines
 

Ähnlich wie Publish and be damned (20)

Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...
Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...
Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...
 
FTSE350 Cyber Governance - An insight into the issues of today and tomorrow
FTSE350 Cyber Governance - An insight into the issues of today and tomorrowFTSE350 Cyber Governance - An insight into the issues of today and tomorrow
FTSE350 Cyber Governance - An insight into the issues of today and tomorrow
 
The Proactive Approach to Cyber Security
The Proactive Approach to Cyber SecurityThe Proactive Approach to Cyber Security
The Proactive Approach to Cyber Security
 
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsNATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-Ups
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Adam Bulava GCC 2019
Adam Bulava GCC 2019Adam Bulava GCC 2019
Adam Bulava GCC 2019
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptx
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
 
Proofpoint Email Security Award Write Up
Proofpoint  Email Security Award Write UpProofpoint  Email Security Award Write Up
Proofpoint Email Security Award Write Up
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
5 things digital media companies need to do now
5 things digital media companies need to do now5 things digital media companies need to do now
5 things digital media companies need to do now
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
Security Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you knowSecurity Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you know
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
http://www.slideshare.net/slideshow/embed_code/28627951
http://www.slideshare.net/slideshow/embed_code/28627951http://www.slideshare.net/slideshow/embed_code/28627951
http://www.slideshare.net/slideshow/embed_code/28627951
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of Directors
 
A New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionA New Year’s Ransomware Resolution
A New Year’s Ransomware Resolution
 
The ever increasing threat of cyber crime
The ever increasing threat of cyber crimeThe ever increasing threat of cyber crime
The ever increasing threat of cyber crime
 

Kürzlich hochgeladen

Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 

Kürzlich hochgeladen (20)

Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 

Publish and be damned

  • 1. © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved. Risk Consulting An ethical investigation into cyber security across the Forbes 2000 Publish and be Damned What does your online corporate profile reveal? Cyber Vulnerability Index 2012
  • 2. Publish and be Damned Foreword Following a series of very high-profile security breaches over the past year, executives are quickly becoming aware of the significant risks posed by the loss of data: competitive advantage is eroded; organisational secrets are stolen; corporate reputations are damaged. Today’s cyber attack threat has evolved significantly from the rather crude ‘full frontal attack’ method that characterised attacks in the past. Indeed, today’s cyber threat is more likely to come from social activists, criminals, competitors or even national governments who use stealth tactics to identify and exploit publicly available information with the ultimate goal of gaining unfettered access to networks and systems. © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
  • 3. Publish and be Damned Modern cyber attacks prey on “information leaks” - publicly accessible information relating to organisations and their employees which is then used in targeted phishing or “spear-phishing”, elaborate social engineering and technical attacks against entire organisations. Due to the public nature of information leaks, which are often inadvertent, this phase of cyber attacker reconnaissance typically leaves little or no footprint, yet can allow for gathering of confidential internal usernames, email addresses, network details and vulnerable software versions to list but a few examples. Here is how it works: let’s say, for example, that you made a donation to a local charity, in recognition the organisation lists your name on their website as a sponsor. Two days later, you receive an email from the Fundraising Chair asking you to confirm your donation. You open the email, fill out the form (being careful not to include any banking or sensitive information) and return it to the sender. But in reality, the email didn’t come from the charity at all; the attachment was, in fact, a high- quality fake containing a virus, allowing perpetrators to seize control of your computer, read your emails and record your passwords. Everything you know, they now know; everything you see, they now see. Clearly, information leakage is rapidly becoming a board-level risk. But exactly how big a risk is it? Over a six month period KPMG performed research in this domain focussing on the Forbes 2000: an annual ranking of the top 2000 public companies in the world by Forbes magazine. At the inception of this research the combined market value of all Forbes 2000 companies was US$31 trillion. The aim of this research was to perform the same initial steps that cyber attackers and organised criminals would perform when profiling a target organisation for attack, using sophisticated techniques that are often referred to as Advanced Persistent Threats, or ‘APTs’. By performing the same study across the Forbes 2000 it was possible to identify common themes and trends across countries and sectors. The research identified many security shortfalls in the Internet-facing security posture of organisations and specific countries. No hacking, unauthorised or illegal actions were performed during this research. The information leaks gathered were sourced from publically available information, search engines, and public documents located across the Forbes 2000 corporate websites. The results provide an insight into missing security basics which are exposing websites, employees and corporate data to potential cyber attack. This report provides an overview of our findings and paints a picture of a world that has yet to come to terms with the threats posed by cyber attackers. As such, these results should provide executives with not only a strong incentive for greater awareness and management of their organisation’s information, but also provide a unique benchmark against which to measure their security activities. I encourage you to contact either myself or your local KPMG office to learn more about these findings or to discuss your organisation’s exposure to these critical risks. Martin Jordan Head of Cyber Response KPMG in the UK © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
  • 4. Publish and be Damned © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
  • 5. Publish and be Damned Contents © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved. 01 Executive Summary 04 Collecting Meta-Data 08 Harvesting Sensitive Locations and Hidden Functionality 12 Gathering Data from Popular Search Engines 16 Web Server Software Vulnerabilities 20 Who is Most at Risk? 24 4 Steps to Minimise Your Exposure
  • 6. 1 | Publish and be Damned Executive Summary With so many cyber attacks in the news recently, executives are becoming increasingly concerned about their organisation’s exposure to hackers. And so they should. According to our research, more than three-quarters of the Forbes 2000 companies leak potentially dangerous data. The sources of this information are varied and widespread. Some are within the direct control of the corporation (websites, documents and web servers) and – with effort – can be directly addressed. Other channels such as popular search engines and forums, are outside of the usual enterprise security curtain and pose a much more complex challenge. Interestingly, many of the sectors that normally display exceptionally strong cyber security controls seem to be at the highest risk, namely banks, financial services and telecoms companies. The problem is also not unique to one region or market type in particular. Indeed, looking at the ‘Heat Map’ of global information leakage across the Forbes 2000, higher-risk countries span both the developed world (US, Switzerland, Japan, and Germany to name a few) and the emerging markets (such as Brazil,Thailand and Saudi Arabia). © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved. Figure 1 Top 10 information leaking sectors 6% Oil & GasOperations 6% 30%Banking 12%Diversified Financials 10% Materials 8% T elecommunications Services 8%Utilities Technology Hardware& Equipment 6% Media 6% Construction Insurance 8% Executive Summary Collecting Meta-Data Harvesting Sensitive Locations and Hidden Functionality Gathering Data from Popular Search Engines Web Server Software Vulnerabilities Who is Most at Risk? 4 Steps to Minimise Your Exposure
  • 7. Publish and be Damned | 2 Figure 2 Heat-map of information leaking countries Kazakhstan Russia Norway Netherlands Switzerland Germany Italy Liechtenstein Mexico United States Spain United Arab Emirates Thailand Taiwan China Japan Saudi Arabia Malaysia Peru Brazil Very hot Hot Warm © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
  • 8. 3 | Publish and be Damned “According to retrieved version information from document meta-data, 71 percent of the Forbes 2000 companies may be using potentially vulnerable and out-dated versions of Microsoft and Adobe software” © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
  • 9. Publish and be Damned | 4 © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved. Collectting MMeta-Data 78%OF FORBES 2000 CORPORATE WEBSITES LEAK SOME FORM OF POTENTIALLY USEFUL INFORMATION THROUGH DOCUMENT META-DATA
  • 10. 5 | Publish and be Damned Information within document meta-data often constitutes an information leak as it can provide cyber attackers with a view of corporate network users, their email addresses, the software versions they use to create documents and internal network locations where files are stored. By sector, the distribution shows that technology and software sectors appear to expose the most information in relation to the meta-data in documents they serve on their corporate websites. This part of the research quickly demonstrated the ease with which cyber attackers can target specific individuals and the vulnerable software versions that they may be using on their computers. Sadly, it is relatively straightforward to visit a hacking website, pay US$200 and have a bespoke Trojan email produced, specifically targeted at one individual within a company. If the target of these attacks is lucky, their spam filter will block the email, if not then their corporate secrets may be revealed upon a seemingly innocent click of a button. What is meta-data? Document meta-data is information ‘about’ a document, or information on its properties. It often informs who created a document, when and where on a device or network. KPMG downloaded almost 10 million publicly- available documents across the Forbes 2000 corporate websites including common file types such as Microsoft Office and Adobe Acrobat PDF. Once downloaded, automated tools were used to extract meta-data from these files, such as the username of the creator, the network location where the document was created or saved and the version of software used to create the document. The following meta-data information leaks were collected across all Forbes 2000 corporate websites: Total across Average Information leak all 2000 sites per site Number of potential usernames 419,430 210 Number of network folders and locations 104,370 52 Number of printers and their hostnames 33,250 17 Number of software applications and versions 70,910 35 Number of email addresses 342,040 171 Figure 3. Meta-data information leaks across all sites © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved. Executive Summary Collecting Meta-Data Harvesting Sensitive Locations and Hidden Functionality Gathering Data from Popular Search Engines Web Server Software Vulnerabilities Who is Most at Risk? 4 Steps to Minimise Your Exposure
  • 11. © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved. Publish and be Damned | 6 Figure 4 Number of documents on corporate websites by sector Utilities Transportation TradingCompanies TelecommunicationsServices TechnologyHardwareandEquipment SoftwareandServices Semiconductors Retailing OilandGasOperations Media Materials Insurance HouseholdandPersonalProducts Hotels,RestaurantsandLeisure HealthCareEquipmentandServices Food,Drink&Tobacco FoodMarkets DrugsandBiotechnology DiversifiedFinancials ConsumerDurables Construction Conglomerates Chemicals CapitalGoods BusinessServicesandSupplies Banking AerospaceandDefence 0 200,000 400,000 600,000 800,000 1,000,000 1,200,000 1,400,000 1,600,000 1,800,000 2,000,000 Numberofdocuments
  • 12. 7 | Publish and be Damned “The ‘hi-tech’ sector publishes more documents across websites than any other industry” © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
  • 13. Publish and be Damned | 8 © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved. Harvestti Sng Sensitive Locatioons and Hidden Functioonallittty 15%OF THE FORBES 2000 CORPORATE WEBSITES OFFER HACKERS ACCESS TO TEST FUNCTIONALITY AND PRIVATE LOGIN PORTALS THAT POTENTIALLY ALLOW FILE UPLOAD CAPABILITIES
  • 14. 9 | Publish and be Damned Part of our research focussed on the structure of the Forbes 2000 corporate websites to identify any potentially sensitive file locations or hidden functionality that may be useful to cyber attackers. While navigating the sites, we found a number of keywords that revealed interesting file locations that would stimulate further investigation by cyber attackers (see Figure 5). A large number of temporary files were found across the sites, in addition to administrative and private login portals for webmasters. Upload functionality was discovered on some sites which might enable cyber attackers to upload software to execute commands on those web servers. Backup and test content, providing enhanced functionality over the corporate websites, was also discovered in many instances. A number of file locations marked ‘private’ were also identified, hosting documents that were not intended for public consumption. In particular, Banking, Diversified Financials and Insurance companies seem to be exposing sensitive information and hidden functionality on their websites (see Figure 6). Figure 5 Top 10 keywords revealing interesting file locations on corporate websites Number of Keyword Occurrences Description Temp 553 Temporary files sometime revealing test information Data 481 Sometimes data folders including backup client or corporate data .txt 429 Many text files found with system configuration information Test 293 Website test functionality, sometimes providing enhanced functionality on websites Admin 292 Administrative pages, often protected with a login Login 246 Sometimes included login for site management and content modification Private 233 Some files available which perhaps should be protected Upload 111 Some instances of remote file upload capabilities Secure 87 Often protected by a login, but highlighting areas of possible interest by attackers Command 59 Some instances of potential to run commands on the web server Hacker alert! US Cyber Security response team warn of attacks upon the gas industry April 2012, ICS-CERT reported a number of cyber intrusions targeting gas pipeline companies. Analysis of the attacks confirm they are part of an ongoing campaign dating back to December 2012 and confirm Spear­ phishing was used to target a number of specific individuals acrossthe gas pipeline industry. When serving test, upload or hidden functionality, many companies face the associated risk of cyber attackers defacing websites, or assuming control of these sites. Cyber attackers may also use this newly gained functionality to inject malware into the sites which will infect all subsequent visitors of those sites. Executive Summary Collecting Meta-Data Harvesting Sensitive Locations Gathering Data from Web Server Software Who is Most at Risk? 4 Steps to Minimise and Hidden Functionality Popular Search Engines Vulnerabilities Your Exposure © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
  • 15. Figure 6 Number of potentially sensitive file locations on the Forbes 2000 corporate websites by sector © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved. Publish and be Damned | 10 Utilities Transportation TradingCompanies TelecommunicationsServices TechnologyHardwareandEquipment SoftwareandServices Semiconductors Retailing OilandGasOperations Media Materials Insurance HouseholdandPersonalProducts Hotels,RestaurantsandLeisure HealthCareEquipmentandServices Food,Drink&Tobacco FoodMarkets DrugsandBiotechnology DiversifiedFinancials ConsumerDurables Construction Conglomerates Chemicals CapitalGoods BusinessServicesandSupplies Banking AerospaceandDefence 0 20 40 60 80 100 120 140 Numberofpotentiallysensitivefilelocations
  • 16. 11 | Publish and be Damned “Online discussions often reveal details on corporate projects and technologies in use by companies. They also reveal e-mail addresses of potential spear-phishing targets” © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
  • 17. © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved. Publish and be Damned | 12 Gatherring DData from Poopulaar Searchh Ennggines COMPANIES INVOLVED IN TECHNOLOGY AND SOFTWARE POST FAR MORE INFORMATION TO ONLINE FORUMS AND NEWSGROUPS THAN ALL OTHER SECTORS COMBINED
  • 18. 13 | Publish and be Damned As part of many popular search engine services, discussions are stored within a searchable web cache and can be queried for specific postings by users. In addition to the meta-data available, individuals often expose within these postings sensitive information about the current technologies in use by organisations. © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved. We found that technology and software companies post far more information to online forums and newsgroups than all other sectors combined. For this portion of the research, we queried a popular search engine’s postings written by individuals with email addresses at Forbes 2000 organisations. We found that, on occasion, what might be deemed commercially-sensitive information was found posted to public domain forums. The top 10 organisations in terms of number of postings in such forums included members of the technology, software and semiconductor and telecommunication industries. Figure 7 Top 10 sectors posting the most information to public forums and newsgroups. Sector Number of newsgroup postings Software & Services 49,965,680 Telecommunications Services 1,239,827 Technology Hardware & Equipment 769,574 Semiconductors 237,791 Conglomerates 193,118 Media 170,634 Aerospace & Defence 146,751 Drugs & Biotechnology 100,178 Oil & Gas Operations 88,681 Banking 88,527 Hacker alert! Cyber attackers will spend time trawling newsgroups for information relating to potential targets. These postings often reveal email addresses of individuals to be targeted in spear-phishing attacks, and may also reveal information on an individual’s hobbies, interests or specific work areas which can be used in targeted social engineering attacks. Executive Summary Collecting Meta-Data Gathering DataHarvesting Sensitive Locations Gathering Data from Web Server Software Who is Most at Risk? 4 Steps to Minimise from Google Groupsand Hidden Functionality Popular Search Engines Vulnerabilities Your Exposure
  • 19. Publish and be Damned | 14 © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
  • 20. 15 | Publish and be Damned “Many instances of un-patched and unsupported web server software were found to be serving some Forbes 2000 corporate websites” © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
  • 21. Publish and be Damned | 16 © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved. Web Servver Sooftware Vulnerabbilitiieees 16%OF FORBES 2000 CORPORATE WEB SERVERS MAY BE VULNERABLE TO ATTACK DUE TO MISSING SECURITY PATCHES OR OUT-DATED SERVER SOFTWARE
  • 22. 17 | Publish and be Damned Figure 8 Web server technologies across the Forbes 2000 corporate websites 7% Alcam ai 2% Sun 26% M icrosoft 16% Other 30%Apache 4% IBM 1% Lotus 14%Unknown As part of our research, our security experts identified the specific web server technologies used across corporate sites (see Figure 8), and correlated this data against known security flaws, to identify the 10 sectors vulnerable in terms of their underlying web server technology. Of the two most common software systems in use by corporations, 8 percent of Apache web servers were found to be potentially vulnerable, and 6 percent of Microsoft web servers were potentially vulnerable. Looking at the results across industry groups (see Figure 9), Utilities stand out as the most vulnerable sector affected by version issues of their web server software. We also explored web server software security on a country basis; this revealed that a number of countries are further behind others with regards to software vulnerability patching and updating of their web servers (see Figure 10). Hacker alert! Any web server on the Internet running un-patched versions of web server software is vulnerable to remote attack – the result of a successful attack could range from a Denial of Service (DoS) attack on the website, to the attacker gaining full control of the web server and its content. Corporate websites run on an underlying web server technology. When accessing a website the web server often reveals its software version which is typically hidden from a web browser’s view. Information leakage in these web banner software versions can prove to be of significant value to an attacker when profiling a remote target site and server. Executive Summary Collecting Meta-Data Harvesting Sensitive Locations Gathering Data from Web Server Software Who is Most at Risk? 4 Steps to Minimise and Hidden Functionality Popular Search Engines Vulnerabilities Your Exposure © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
  • 23. Publish and be Damned | 18 Figure 9 Number of potential vulnerabilities affecting corporate web servers per sector Transportation Food,Drink&Tobacco Chemicals Construction Banking Insurance Materials DiversifiedFinancials TelecommunicationsServices Utilities 0 200 400 600 800 1000 1200 1400 Numberofpotentialvulnerabilitiesaffectingcorporatewebserverspersector Figure 10 Top 10 countries vulnerable to potential attack via vulnerable web server software © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved. SaudiArabia Brazil Israel Australia Germany Liechtenstein India Kazakhstan Switzerland Japan 0 200 400 600 800 1000 1200 Numberofpotentialattacksviawebserversoftwarepercountry
  • 24. 19 | Publish and be Damned “The most information leaks by sector affect Financial Services, Software, Technology, Telecoms and Banking organisations” © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
  • 25. Publish and be Damned | 20 © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved. Who is Moost attt Risk? THE TOP 10 FORBES 2000 COMPANIES LEAKING INFORMATION HAIL FROM EITHER THE US OR JAPAN. MOST OF THESE ORGANISATIONS ARE IN SOFTWARE OR TECHNOLOGY­ RELATED SECTORS
  • 26. 21 | Publish and be Damned Cyber attackers and organised crime do not only target one avenue of attack. Instead, they use a combination of available information leaks to profile a target, and map them out their internal systems and their components. Cyber attackers will devote time and effort in profiling the entire online presence of potential targets; as a result, the more information volunteered about a system or network, the more likely an attacker might be to further explore potential avenues of attack. It is important to emphasise that the processes used to gather the information leaks for our research were not sophisticated and are available to anyone with access to the Internet and little more than a web browser. To conclude our research, we aggregated all normalised data from the overall information leakage survey on a per company, per sector and per country basis, revealing clear tends. Correlation of all results revealed that, across the Forbes 2000 list of companies, the greatest number of information leaks affect financial, software, technology and telecoms sectors. Indeed, the banking sector in particular seemed most exposed. However, technology and software sectors also seem to be at risk with employees within these sectors appearing to publish much information in the form of documents and online forum queries. As such, these sectors are at risk of inadvertent exposure of sensitive information relating to their technologies and intellectual property. While the per country figures demonstrate the extent of the challenge being faced around the world, there are a number of countries (Japan and Switzerland in particular) that seem to be more exposed. We took the additional step of collating the results to identify the 10 Forbes 2000 companies that offered cyber attackers the most opportunity. The names of theTop 10 at risk organisations shall remain anonymous, however our summary of these organisations shows the sector to which they belong and the country in which they operate.The magnitude of each bar represents the amount of information leaked by that organisation (see Figure 13). Figure 11 Top 10 information leaking sectors © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved. Telecommunications Services 8%Utilities 6% 6% Oil & GasOperations 6% 30%Banking 12%Diversified Financials 10% Materials 8% Media 6% Construction Insurance Technology 8%Hardware& Equipment Executive Summary Collecting Meta-Data Harvesting Sensitive Locations and Hidden Functionality Gathering Data from Popular Search Engines Web Server Software Vulnerabilities Who is Most at Risk? 4 Steps to Minimise Your Exposure
  • 27. Publish and be Damned | 22 Figure 12 Top 10 information leaking countries 22% Japan 9% Spain 7%Italy 6%Brazil 4% U.S. 4% Saudi Arabia 3% Thailand 3% Germany 2%Malaysia 40%Switzerland Figure 13 Top 10 exposed organisations by sector and operating country © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved. TechnologyHardware&Equipment Utilities Software&Services Software&Services DiversifiedFinancials Conglomerates Software&Services Banking Software&Services TechnologyHardware&Equipment High Low LevelofExposure
  • 28. 23 | Publish and be Damned © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
  • 29. © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved. Publish and be Damned | 24 4 Steps to Minimise your Exposure
  • 30. 25 | Publish and be Damned The world of cyber security has tilted on its axis. Companies now not only face cyber attacks from hacking groups, script kiddies and hactivists but also from state-sponsored agencies with limitless resources, seeking a competitive edge or intellectual property. Just as attacks have evolved companies must evolve by re-evaluating their own ability to detect, defend and respond to cyber attacks. The types of information gained as part of our research are proven to have been of use in real-world cyber attacks. KPMG’s Cyber Response team has successfully penetrated organisational defences and perimeters using such information leaks, as part of legitimate client engagements around social engineering and ethical hacking. Whilst each company must perform a bespoke risk assessment against their own digital estate, the following steps will go some way to improve cyber security and reduce the amount of extraneous meta-data which companies expose on the Internet. 01 ASSESS Perform an assessment of your Internet presence. What data does your organisation currently leak to the world? 02 SPRING CLEAN Where possible, cleanse meta-data from your existing published documents. Ensure all corporate devices are fully patched, not just your online web servers. 03 EDUCATE “ALL” EMPLOYEES Everyone in the organisation – from the boardroom to the mailroom – must understand the value and sensitivity of the information they possess and, more importantly, how to protect it. 04 ADJUST POLICIES Instigate a policy to minimise unintentional or undesired corporate information appearing on the Internet. Executive Summary Collecting Meta-Data Harvesting Sensitive Locations Gathering Data from Web Server Software Who is Most at Risk? 4 Steps to Minimise and Hidden Functionality Popular Search Engines Vulnerabilities Your Exposure © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
  • 31. Publish and be Damned | 26 Cyber Response methodology BENCHMARKING We can assess your company’s Internet profile and benchmark performance against industry peers. TESTING We can perform simulated cyber attacks and social engineering exercises against your infrastructures to identify your existing exposure and failures in existing security controls and processes. REMEDIATION If your company falls below industry peers, we can initiate remediation programmes to identify any gaps and instigate improvement programmes. KPMG We have a comprehensive Cyber Response methodology and service which covers all facets of proactive and reactive cyber response: • Prepare and Train • Detect and Initiate • Contain and Investigate • Report and Improve POLICING We can deploy a service to continuously monitor your presence on the Internet. Glossary of terms Apache Open source web server software APT Advanced Persistent Threat (APT) is characterised by the covert penetration of systems by unauthorised individuals to illegally exfiltrate information of political, military or economic value from an organisation over a sustained period of time, typically using information for competitive advantage. Initial attacks may be a precursor to later attacks on the same organisation or used as a stepping stone to attack another organisation Backdoor A method of gaining persistent access to resources which typically by passes security controls Denial of Service (DoS) Attacks involving attempts to render IT resources unavailable or unusable by legitimate users File Upload Functionality which allows for files and documents to be uploaded over the Internet to a remote website or server ICS - CERT Industrial Control Systems Cyber Emergency Response Team Malware Malicious software, deliberately written with malicious intent, to gain unauthorised access or cause damage to computers and networks Meta-Data Information within a document ‘about’ the document and its properties Microsoft™ IIS Closed source web server software by Microsoft Script kiddies a young person with limited technical skills who uses programs developed by more technical individuals to attack networks and websites Social Engineering Process of manipulating or fooling individuals into divulging information Vulnerability A weakness or flaw in a system or process that if exploited might result in a compromise of resources © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved.
  • 32. About us KPMG Risk Consulting brings together specialists with skills focussed on the Information and Technology Risk agenda. We have a team of over 3,500 professionals advising clients across all markets and geographies of the technology and data risks they face. We are a global network of KPMG member firms with over 140,000 professionals in 150 countries. We help our clients to prevent, identify and remediate Information and Technology failures and ensure systems are fit for the future. Our independent advice and advanced technology capabilities help our clients manage their technology risks and use their data to its full potential. Our award winning Information Protection team helps organisations assess risk and design, test, and implement the controls required to protect them from security breaches, including accidents and cyber attack. KPMG’s UK Cyber Response team is comprised of experienced, highly technical security consultants. The team is proficient in penetrating client IT systems in order to identify security weakness in their infrastructures and to articulate the security risks to their business, alongside practical mitigation advice. We are also specialists in responding to cyber incidents and help clients effectively manage their response to cyber attack through detection, containment, recovery and Cyber Response improvement programmes. Why us • Award-winning – KPMG was awarded ‘Information Security Consultant of the Year 2012’ at the SC Magazine Europe Awards 2012. This is the second year running that KPMG has won the award. KPMG were also highly commended for the Information Security Project of the Year category for I-4 programme, which is the leading information security forum for large global businesses. Our Information Protection team also received the 2010 Management Consulting Association (MCA) Management Award for Business Strategy for our work with a leading bank on a major third-party security assurance programme. • Commitment - KPMG’s client relationships are built on mutual trust and long-term commitment to providing effective and efficient solutions. We are dedicated to providing a service that is second to none. • Industry knowledge - Through I-4 (the International Information Integrity Institute) we help the world’s leading organisations to work together to solve today’s and tomorrow’s biggest security challenges. To learn more go to www.i4online.com Contact us Malcolm Marshall Partner, Head of Information Protection and Business Resilience +44 (0)20 7311 5456 malcolm.marshall@kpmg.co.uk Stephen Bonner Partner, Financial Services, Information Protection and Business Resilience +44 (0)20 7694 1644 stephen.bonner@kpmg.co.uk Charles Hosner Partner, Corporates, Information Protection and Business Resilience +44 (0)7500 809 597 charles.hosner@kpmg.co.uk Martin Jordan Head of Cyber Response +44 (0)776 846 7896 martin.jordan@kpmg.co.uk www.kpmg.co.uk/security The information contained herein is of a general nature and is not intended to address the circumstances of any particular individual or entity. Although we endeavour to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act on such information without appropriate professional advice after a thorough examination of the particular situation. © 2012 KPMG LLP, a UK limited liability partnership, is a subsidiary of KPMG Europe LLP and a member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative, a Swiss entity. All rights reserved. The KPMG name, logo and “cutting through complexity” are registered trademarks or trademarks of KPMG International. RR Donnelley I RRD-270670 I July 2012