Data Breach: Weak Configuration – Financial Services Firms
John Iacono • November 6, 2018

November 6, 2018

Weak Configuration: An Open Invitation for Cyber Exploitation

Technology devices don’t have a corner on weak configurations. System network configurations can be just as weak – especially when it comes to password protection. Weak configurations can be devastating to institutions holding large amounts of (sensitive) data such as financial services firms.

The Verizon Data Breach Investigation Report (DBIR) , in fact, reported that four out of five breaches can be traced back to easily guessable passwords (e.g. a ‘123456’ password), and/or the lack of a static authentication system.

Even established institutions are prone to fall short in their efforts to mandate secure password best practices. Poor configurations are responsible for four major modes of attacks, including:

1. SQL Injection

Hackers can use an injection attack to bypass a web application’s authentication and verification mechanisms to access private data.

Malicious code is inserted, or “injected,” into strings that are passed to an SQL server for parsing. Thisdata breach financial firms_fairdinkum consultingtricks the application into changing data or executing unintended commands – giving attackers full access to a database for the purpose of releasing its information or holding it hostage. An estimated one out of three Web attacks are launched via SQL injections.

To learn more about the danger of SQL injection you might want to read:  A Brief SQL Injection History Lesson

2. CMS Compromise

Many institutions rely on some form of content management system (CMS) – WordPress or Joomla, for example – to share, publish and edit content. Unfortunately, these systems may contain vulnerabilities that are often exploited when left unpatched. These openings provide an entry point for attackers to install backdoor programs.

WordPress, despite being the most common CMS, is also one of the most vulnerable. One study revealed that 73% of all WordPress installations had one or more vulnerabilities that could have easily been detected using automated tools.

CMS solutions are inherently vulnerable because of their open frameworks. Many operators also use weak passwords, leaving their system susceptible to brute force attacks.

3. Backdoor Access

“Backdoor” essentially refers to any intrusion tactic that goes unnoticed. Hackers can use backdoor access to install malicious software or record user keystrokes, which gives them what they need to move freely around the unsuspecting victim’s network.

Systems are especially vulnerable to backdoor attacks when networks are accessed by multiple users. Attacks normally occur in stages, and backdoors are often used as a second point of entry or the third command-and-control stage of the attack process.

“Cyberattacks against  financial services firms  increased by over 70 percent in 2017, which reflects that the financial services sector is currently vulnerable to such attacks,  states a recent report from Market Expertz. In the previous year, cyberattacks against the sector had increased by 60 percent.

The global cybersecurity in financial services market is expected to expand at an annual growth rate of 9.81 percent, leading to  a global revenue of $42.66 billion  by 2023, the report estimates.

Still,  a Deloitte survey of 51 CISOs  at U.S. financial services institutions in May suggests financial institutions  aren’t spending enough  to adequately defend against attacks.”

Source: BizTech

4. DNS Tunneling

dns tunneling_Fairdinkum consultingDomain name system tunneling is a way of encoding the data of other programs in DNS queries a nd responses. It is used to establish unintended communication channels to a C2 server and enact dataexfiltration.

Since the DNS protocol is not intended for data transfer, it is often overlooked by security monitoring programs. As a result, the infiltration may go unnoticed for some time.

Don’t allow a data breach to occur due to weak network configurations. Fairdinkum employs a combination of cutting-edge techniques to keep your network and data safe including security scans and monitoring, penetration tests, and security training to ensure that your data is safe with us.

Download Fairdinkum’s Financial Services Cyber Security Audit Checklist to make sure you are as cyber secure as you can be.

Related Articles:

Contact us now for a free, no-obligation consultation.

By John Iacono August 1, 2025
For growing businesses, IT challenges can be unpredictable. One moment everything is humming along; the next, there’s a server failure, a phishing attack or a sudden compliance audit on your doorstep. If you have internal IT staff, you may assume you’re fully prepared, but the reality is that internal IT teams often get stretched thin,... The post How an Outsourced MSP Can be the Missing Piece for Your Tech Needs appeared first on Fairdinkum.
By John Iacono July 23, 2025
Not to play on stereotypes, but Geoff Corbett, professional services manager, says he fits the “nerdy IT person” label. For the past 18 years – and really throughout his life – Geoff has propelled his love of gaming and technology into a career. And we’re grateful to have him at Fairdinkum! His wide knowledge of... The post Geoff Corbett: Professional Services Manager appeared first on Fairdinkum.
By John Iacono July 21, 2025
As more businesses shift toward cloud-first operations, moving your company’s file systems from on-premise servers to a cloud platform like Microsoft SharePoint might seem like an obvious next step. But this type of migration is not a simple “drag and drop.” It requires strategic planning, technical alignment and user preparation to ensure the transition improves... The post Strategic Steps for a Seamless Cloud File System Migration appeared first on Fairdinkum.
Show More →