Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More

Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More

Services
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Microsoft Security
Unlock the full power of Microsoft Security
Offensive Security
Solutions to maximize your security ROI
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

Why Retail and Hospitality Businesses Need to Welcome Incident Readiness and Response

Let me tell you a story about a recent DFIR investigation I was fortunate enough to be involved with.

The target was a relatively large restaurant chain with multiple locations throughout the United States and some internationally. It considered itself to be rather mature in its security posture, meaning it had a CISO and some cybersecurity staff on board and was outfitted with the traditional security components like firewalls, IDSes/IPSes, VPNs and anti-virus.

Trustwave had recently published a threat brief providing indicators of compromise (IOCs) found from a recent criminal campaign in the wild: Carbanak. This company's CISO had read the threat brief and quickly realized he had seen some similar activity in his network. Luckily this company had an IR retainer on file and called it in.

In less than 24 hours he had a team of experts on site hunting the threat. It turns out the company was also in the process of rolling out a new managed endpoint detection solution (MDRe). This was critical, as this allowed the IR team to discover that there was in fact cybercrime activity present in the network, and it was actively stealing data.

These advanced and persistent criminals were on to the investigators, so they were also moving laterally to avoid detection. As the crooks played cat and mouse, the company quickly finished its endpoint protection rollout, which helped enable the IR team to contain the activity and stop it from further damage. What came next was particularly blood chilling.

Post cleanup, the IR team was huddled in the CISO's office for follow up, when a phone call came in. The CISO answered, then put the call on speaker. The voice was a strong eastern European accent: "Just wanted you to know, good job, but we will be seeing you again," the caller said. 

The attackers called the CISO. That's just incredible right there. And the criminals did return, through another wave of phishing attacks. The IR team returned and had it contained within a few days, again.

The positive aspect of the story is that, through a series of incident response planning and consulting engagements prior to the Carbanak activity, the company had followed advice to isolate different processing systems, which made it harder for the criminals to ever get to the really valuable data. Without having invested in incident readiness and response this company may have lost everything.

In the cybersecurity world, it's all about cutting your losses, because you will get hacked. If you are prepared, you won't lose as much. That's why, at a minimum, you need to have a digital forensics and incident response (DFIR) team on call 24/7/365, also known as the IR retainer.

There are two types of organizations out there - ones that are prepared for a security breach and ones that aren't. If you are prepared, you're smart because you are protecting your company and your job. Cybercriminals are getting away with billions, and few get caught. Even if they do, the losses aren't recoverable.

If you are sitting on the fence about getting an IR retainer, here is why you should reconsider:

Incidents are Common

According to the 2018 Trustwave Global Security Report, retail and hospitality make up two of three most compromised industries (the other is finance). These two, public-facing verticals are particularly prone to financially motivated, targeted attacks because they handle so much sensitive information, conduct business through often-vulnerable network pathways like e-commerce platforms and point-of-sale terminals and often lack adequately trained security staff. And, make no mistake, organized crime groups behind certain attacks, such as Carbanak, are very good at what they do as well.

Talent is Short

A certain amount of DFIR can be automated, but even that can only be done with highly skilled, experienced and confident IR staff, something many industries, especially retail and hospitality, are lacking. You need to look at the bigger picture because there are things that cannot be automated such as determining the intent behind new indicators of compromise, industry and target specific threat patterns, complex use-case correlation, knowledge about where critical data resides, attack vectors and the ability to devise response and containment strategies on the fly.

Time is Money

Negotiating an IR retainer is a purchasing process like anything else. First there's the meeting of the minds and then the quote (and hopefully you don't have to do an RFP because that could take months.) In addition, there's legal involvement, red lining and purchasing. If you are under attack and only then purchasing IR services, then you are behind the eight ball. When you finally get the IR team on site, it has to rush through a cram session to understand your environment, which means it will take longer to remediate an incident than it should have to begin with.

Craig Ellrod is a systems engineer at Trustwave.

ABOUT TRUSTWAVE

Trustwave is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.

Latest Intelligence

Discover how our specialists can tailor a security program to fit the needs of
your organization.

Request a Demo