Casinos are also an e-Target
By Charles Parker, II
Casinos are no different than an accounting firm, hospital, or manufacturer in at least one sense when cybersecurity is the common thread. These entities hold data that people want to steal. This data is then sold or otherwise leveraged for their own uses to generate revenue or simply sold. One industry not researched at length has been the casinos.
These businesses tend to focus more on physical security as the workers handle mass amounts of cash, the chips, and playing cards. Granted this is exceptionally important.
Without a robust physical security program in place, the physical items of value would simply walk out. The risk of physical theft is a completely viable area to secure, as much as possible. As part of the overall security program, data security also should be addressed and implemented.
Although the risk of physical theft is present, data security risk is ever-present. The person(s) do not have to be physically present on-site to steal money or to sabotage the system. This attack may be exercised from virtually anywhere in the world with an adequate internet connection.
Casinos are just as likely as other entities to be a victim of a breach. This was the case with the Grey Eagle Casino in Calgary when their employee data was compromised.
The entry point for the attack was a computer in the Human Resources office that had been compromised. The data and information were stolen consisted of confidential letters and files. These did have dozens of employee’s names and personal information.
To authenticate this, the data was posted online from approximately 12 documents affected over 12 employees. Although the entry point was a Human Resources computer, the method utilized, by the attacker, was a phishing attack. The form was a phishing email with a malicious link or the user ended up logging into a malicious website.
Although this compromise was embarrassing enough, this compromise could have been much worse. This incident was isolated from one system. In theory, it would have not been too far of a bridge for the attackers to branch out and infect other computers on the network or the servers. Other data could have been harvested. The casino could also have been a victim of widespread ransomware.
This was a serious attack with serious consequences. To work towards this not occurring any time soon, the casino may implement employee training sessions. These would need to be regular and applicable. If videos were to be used, these would not consist of the same bland ones shown for the last ten years.
This attack made it rather apparent that the email system’s security was rather out of date or just not functioning well. The filter for phishing, spam, and other malware should red flag and quarantine these. To further decrease the opportunity for this to happen again, phishing campaigns should also be completed.
With these in place, the user will increase their awareness in the last a bit, which in certain instances, all that is needed. This may be accomplished with training, videos being viewed, and other methods. The business may also send emails with written training with a questionnaire at the end of the email to verify the material was read and understood.
Attacks will come from many sources throughout the globe. At times, if the attackers know there is a vulnerability, the business will have a rather large bulls-eye on it and attacks would only increase.
Globalnews.ca. (2017, January 27). Security experts call grey eagle casino security breach to wake up call. Retrieved from https://reportca.net/2017/01/security-experts-call-grey-eagle-casino-security-breach-a-wakeup-call/
Sosiak, M. (2017, January 25). Grey eagle casino employees information leaked in a major privacy breach. Retrieved from http://www.newslocker.com/en-au/region/casino/grey-eagle-casino-employee-information-leaked-in-major-privacy-breach-globalnewsca/view/
Tighe, T. (2017, January 26). Security experts call grey eagle casino security breach a wake-up call. Retrieved from http://globalnews.ca/news/3208546/security-experts-call-grey-eagle-casino-security-breach-a-wake-up-call/
About The Author
Charles Parker, II began coding in the 1980s. Presently CP is an Information Security Architect at a Tier One supplier to the automobile industry. CP is presently completing the Ph.D. (Information Assurance and Security) in the dissertation stage at Capella University. CP also is an adjunct faculty at Thomas Edison State University. CP’s interests include cryptography, SCADA, and NFC.
He has presented at regional InfoSec conferences. Charles Parker, II may be reached at email@example.com and InfoSecPirate (Twitter).