Categories
Cyber Security

ATM FRAUDSTERS IN KOLKATA PERFORM MITM ATTACK, STEAL AROUND TWO CRORES

ATM FRAUDSTERS IN KOLKATA PERFORM ‘MAN-IN-THE-MIDDLE ATTACK”, STEAL AROUND TWO CRORES.

Man in the middle attack, atm hacking

The Kolkata Police has found ATM fraudsters steal around two crores from at least ten unguarded ATMs around the city between the 14th and 22nd of May, 2021. The police report that the hackers have stolen the money by intercepting the two-way encrypted messaging between the ATM and the bank server. They have used a method which the experts refer to as “Man-in-the-middle attack” (MITM attack).

Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big business.
Man in the middle attack, atm hacking

A MITM attack is a cyber-attack where the hackers alter communication between two parties, where the ATMs and the bank servers. These two parties believe that they are directly communicating with each other. But in reality, there is a middle-man interrupting and manipulating the communication illegally to their benefit. The attackers get access to sensitive data, then they manipulate the content of the transmitted messages. The ten unguarded, not updated ATMs lose an amount between 2 to 20 lakhs each.  The fraudsters have targeted the same private bank to which all these ATMs belong.

The two suspects caught in the camera have carried out a similar crime in Faridabad of the Delhi/NCR region around two months back. It was a physically orchestrated mission where the camera has caught them installing a “black box” like device into the machines. They stayed for around 30 minutes to an hour. The joint commissioner of police (Crime Department), Mr. Murlidhar Sharma tells the reporters that the company that loads the money will incur the losses. 

Kolkata faces a highly sophisticated cyber-attack like this for the first time. The first attacks were in the machines located in the New Market, Jadavpur, and Cossipore police stations. Due to the lack of recent updates in the operating system, there is a loss of around 40 lakhs initially.

There are two ways in which the hackers have performed the breaching between the ATMs and the bank servers. First, the hackers have placed proxy bank servers. So the encrypted messages from the ATM switch reach the proxy bank servers instead of the valid bank server. Then the fraudsters would insert dummy cards to dispense the cash that the proxy bank server allows. In the second one, the fraudster tampers the ATM LAN connection. Here, the external device manipulates the encrypted messages from the bank server authorizing the transaction before it bounces back to the ATM switch. 

We can avoid these sophisticated MITM attacks by upgrading the security system with lesser loopholes that would restrict the fraudsters hacking into systems, thus preventing the spewing of cash unethically.

Categories
Cyber Security

ENCRYPTION KEY MANAGEMENT SERVICES

5 eNCRYPTION KEY BEST PRACTICES IN 2021

encryption key management

Data breaches have skyrocketed cyberspace with the growing competition for sensitive information. In the whole data life cycle, data encryption is one of the best ways which ensures confidentiality by providing a secure method of cyber threat protection by avoiding losses and exploitation of data.

With the growing sophistication of cyber-attacks, cryptographic key management provides a safe and secure way to control massive data breaches. It helps in reducing the risk in the cybersecurity architecture of your company.

At TeamCognito, a leading cybersecurity company in Kolkata, we ensure the full protection of electronic communications and financial transactions in the fast-growing modern world. Our encryption key management services in Kolkata include creation, storage, protection of existing and expired keys, distribution, replacement, and destruction of encryption keys.

There are two types of encryption: one that will prevent your sister from reading your diary and one that will prevent your government.
data breach, cybersecurity, data protection
There are three primary key management approaches 
  1. Decentralised key management – In this type of key management, the end-users are responsible for their key management. The organization does not handle the governance of the key.
  2. Distributed key management – In this type of key management, each team or department in the organization is responsible for handling its key management protocol according to its process and policies. They have the option of contacting or coordinating with other departments.
  3. Centralised Key management – In this type of key management, there is one policy throughout the organization. All the team and department of the company follow it. 

In the key management server, the encryption key is created and stored along with its various attributes which include its name, size, ability to delete, activation date, mirroring, key access, etc. The encryption key manager keeps track of the encryption key’s current and previous uses. The key manager would allow the administrator to change the attribute of the keys.

There are four basic types of encryption keys 
  1. Symmetric encryption – A single encryption key is used for both data encryption and decryption in this type of cryptography. This type of encryption is used to secure data and is also a quick algorithm.
  2. Asymmetric encryption – Both keys are paired and created simultaneously in this type of cryptography. Public and private keys are the two types of symmetric encryption.
  3. Public keys – These keys are only used to encrypt the data and not to decrypt it.
  4. Private keys – These keys are used to decrypt the data. The encrypted data can be decrypted by this only key. It should be password-protected.
With the size and complexity of the environment, the key management system gets challenging. When a key has been compromised, it is quite difficult to identify the threats until it is exploited. These are some major threats that can be considered:
  1. Weak keys: Complex keys help in securing and protecting sensitive data for a while.
  2. Incorrect use of keys: For a specific purpose/task only one key should be generated.
  3. Reuse of keys: When the keys are reused for multiple purposes, it can be dangerous and put the organization at high risk.
  4. Inappropriate storage of keys: Keys should never be stored on a server or a database.
  5. Improper protection of keys: Keys should be made available in unencrypted form within a secure tamper-protected environment.
  6. Insecure moment of keys: To move keys safely between systems, we wrap the key under a pre-shared transport key which is either a symmetric or asymmetric key.
Ensuring data security is every employee’s business. Here are a few best practices for encryption key management 
  1. Secure key stores: Complex keys should be used to achieve optimal security and protect key stores. They must be protected when stored, when in transit, and during backup. The loss of all data is mainly due to improper key storage.
  2. Access to key stores: There should be policies governing key stores which use separation of roles to help in controlling access. The entity of a given key and a stored key shouldn’t be the same. All-access to these entities should be limited to particular access.
  3. Key backup and recoverability: Secure data backup and recovery solutions must be followed in case there is an accidental loss of the key. A loss of the key would mean the loss of data that was protected by the key, and this might create havoc in the company if the data was deleted unintentionally.
Here are the five factors that should be considered while choosing a good key management solution:
  1. User-friendly interface: There can be accidents in configuring or misusing features in a poorly designed interface. This can compound numerous security problems. A well-designed and user-friendly interface is the solution for any kind of mismanagement in protecting and securing the data.
  2. Key storage: We should be well aware of where the encryption key is stored and who has access to it. For example, if the solution in question requires encryption keys to be available to the cloud infrastructure, then it shouldn’t be considered secured.
  3. Key rotation and destruction: Key rotation is when a new key is generated periodically. It is set as the primary key. The data is then encrypted with a new and different encryption logic using the primary key.
  4. Key generation granularity: The keys are kept within a secure environment that is divided at the highest possible level with the help of a zero-trust approach. Granular access control should be allowed by the KMS to manage access at the lowest hierarchy within the scope of the department/role/user/device.
  5. Automation: Mistakes can be prevented from occurring when the key of the lifecycle events can be automated. Automation should be offered to repetitive tasks. It should be flexible enough to be easily modified if any conditions change.

Being the top cybersecurity company in Kolkata, Teamcognito helps in maintaining the best practices in encryption key management by providing credible services. It is advised that the monitoring team investigate the access logs from time to time and secure sensitive areas to reduce the exploitation of data in cyberspace. At our cybersecurity solutions company in Kolkata, we provide our clients with a robust encryption key management system to protect the entire data life cycle.