JP Morgan Breach Affects Millions, Shows the Need for Secure Web Apps - Noticias de seguridad (2024)

JP Morgan Breach Affects Millions, Shows the Need for Secure Web Apps - Noticias de seguridad (1)The breach of investment banking firm JP Morgan Chase in October has caused the leak of one of the largest number of records to date. It affected an estimated 76 million households and 7 million small businesses, the resulting total of which is already half the total number of households in the United States.

In an SEC statement, the company disclosed the compromise of user contact information, which includes the names, addresses, phone numbers, email addresses, and others. The company found no evidence that account information—such as account numbers, passwords, user IDs, dates of birth or Social Security numbers – was compromised

Though the time frame of the actual breach is unclear, it was believed that the attacks focused on servers housing sensitive information of customers who accessed the sites chase.com or jpmorgan.com these past years. Threat actors were able to find ways to infiltrate the memories of more than 90 servers of the company. They also got their hands on a list of apps and programs used in JP Morgan systems, which they likely double-checked for available flaws they can use.

For companies whose business relies heavily on strict customer information policies, breaches like this have big consequences. Apart from its initial response after the breach, JP Morgan seeks to positively restore its brand reputation by doubling their security spending from US$ 250 million (£156 million) annually in 2014 to US$ 500 million (£311 million) in five years.

Meanwhile, authorities started to investigate the JP Morgan attack last August, following a possible trend of coordinated attacks against other financial institutions. Apart from financial institutions, similar breaches of this magnitude have been constantly on the front pages, following the predicted pattern of one major data breach happening every month.

Upon closer scrutiny, the breach was indeed accomplished through flaws found in web applications used by the bank. More specifically, they attacked through a zero-day vulnerability or a new flaw which was present in the affected websites then. This flaw has since been patched.

What stands out in the JP Morgan breach (along with a couple of other recent, notable breach incidents) is the attackers’ point of entry: flaws in web applications.

Web applications are popular among business owners for a number of reasons. For one, they are convenient and easy to use, especially for facilitating common business operations such as managing customer relations, maintaining internal communications among employees, or digitizing business records. As they are housed in Internet servers, web applications are also accessible for employees who wish to work whenever and wherever they want—another picture of how common mobility and the cloud run most businesses today.

What’s Wrong with Web Apps?

The JP Morgan Chase breach is not an isolated incident. We have been seeing an ongoing trend of companies being attacked using flaws found in web apps. This often leads to business disruption, tampered brand image, or loss of critical information.

Since the tech buzzword “Web 2.0” was born, the Internet has evolved into a space that appears to be free, more open, and “stateless” in nature. Curiously, web applications developers has translated this into focusing first on the glitz and glamour of producing shiny new software. Security almost always comes in second, if not an afterthought.

A number of the reported breaches and DDoS incidents in the second quarter of 2014 were results of web app vulnerabilities.

Reported data breaches and DDoS incidents, 2Q 2014 [click to enlarge]

Conducting business via web apps on the Internet introduces a plethora of risks that are damaging to companies. Critical and complex business processes are becoming more dependent on applications that connect to the Internet, essentially putting multiple copies of data at risk.

Users may encounter issues they can't solve with web applications that developers no longer support. The same goes for users of legacy applications that are prone to flaws. Problems also arise from web apps that lack security checks, developed in-house, or are coded without security in mind.

From what we’ve seen of recent attacks, focusing on web app flaws alone still won't be enough. Web servers themselves are open to attacks, as we’ve seen in August 2014 when users from Japan who thought they were adding script for social media sharing buttons on their sites. They ended up adding script of a Flash exploit kit hosted in an external server instead.

Servers of web applications have also become victim to similar attacks. The Verizon 2014 Data Breach Investigation Report reveals that 35% of breaches they tracked in 2013 were due to web application attacks.

Security First Approach

Web apps and servers are mainstays in the business world. Because of this, the problem calls out for actions from everyone who may be involved in creating and using them.

To secure web applications, IT admins need to enforce good baseline web, application, and database server security practices. Ask if you really need all the services that are set to run on web servers, if only relevant ports are enabled, if passwords are strong, and access is limited.

Of course, updating security patches is an established security standard. However, in cases that involve widespread impact or scenarios where patching is difficult and costly, vulnerability and application shielding comes in handy. This can take advantage of technologies like Intrusion Prevention (IPS) to protect from external attacks while companies wait for official patches. Adding a web application firewall and regularly scanning for known and potential bugs can also help form a multi-layered approach to security.

From what we have learned of threats like Shellshock and Heartbleed, taking proactive steps that go beyond traditional perimeter security and basic patching is the key to protecting web applications.

HIDE

Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).

Image will appear the same size as you see above.

Publicado en Cyber Attacks, Data Breach, Vulnerabilities

JP Morgan Breach Affects Millions, Shows the Need for Secure Web Apps - Noticias de seguridad (2024)

FAQs

What happened in the 2014 JPMorgan Chase data breach? ›

In October 2014, JP Morgan Chase experienced a data breach that affected millions of users. The incident involved unauthorized access to the bank's servers, compromising user contact information. The breach underscored the importance of implementing secure web applications to safeguard sensitive customer data.

Has there been a data breach with Chase bank? ›

JPMorgan Chase Suffers Data Breach Affecting Personal Information of 451,809 Customers. JPMorgan Chase says it has discovered a data breach affecting the personal information of nearly half a million customers.

Why does J.P. Morgan keep calling me? ›

We are aware of a number of scams and attempted frauds through phone calls and emails claiming to be from a representative of J.P. Morgan offering an investment opportunity. If you have concerns about an approach, please contact us.

What is the biggest impact of security breaches? ›

Direct Financial Losses

Companies face direct costs associated with breach mitigation, legal fees, and compensations, alongside indirect costs like loss of business and diminished share value. For individuals, the risk of identity theft and financial fraud can have long-lasting financial consequences.

How did JPMorgan get hacked? ›

Upon closer scrutiny, the breach was indeed accomplished through flaws found in web applications used by the bank. More specifically, they attacked through a zero-day vulnerability or a new flaw which was present in the affected websites then.

What did JPMorgan get in trouble for? ›

JPMorgan Chase was fined $348.2 million by the Federal Reserve Thursday over an “inadequate program to monitor firm and client trading activities for market misconduct,” the Fed's Board and Office of Comptroller of Currency announced Thursday.

How do I know if I have been data breached? ›

Check for suspicious logins into your accounts and activate notifications for them if the service you use provides them. Be on the lookout for misleading password retrieval emails and messages and only change your credentials by logging into the account from the official website.

What happens when your bank and account have been breached? ›

If money has been taken they will protect your account and make sure no more money can be taken. Even if no money has been taken your bank will take action by changing your security details and cancelling your cards.

Can I sue my bank for a data breach? ›

To address any harm you endured, the law gives you the right to seek financial compensation following a data breach. You can and should seek legal recourse from a company that exposed your data, and you can file a lawsuit to obtain payment for your losses.

How do I know if my Chase alert is real? ›

If you're ever in doubt about the legitimacy of a message that claims to be from Chase, log in to your Chase account online or through the app. If there's an issue with your account, you'll see an alert there.

How does Chase notify you of suspicious activity? ›

We monitor for fraud 24/7 and can text, email or call you if there are unusual purchases on your credit card. To assist us, please update your phone number in case we need to contact you quickly.

Will Chase refund me if I get scammed? ›

Customers often ask if they can get money back if they paid by bank transfer, or if they can get it back if they pay by BACS. The answer is yes, victims of scams may be able to get their money when they paid by either of these methods.

What is the most hacked bank? ›

The 10 Biggest Data Breaches in the Finance Sector
  • Equifax Data Breach. ...
  • Heartland Payment Systems Data Breach. ...
  • Capital One Data Breach. Date: March 2019. ...
  • JPMorgan Chase Data Breach. Date: October 2014. ...
  • Experian. Date: August 2020. ...
  • Block. Date: Apr 2022. ...
  • Desjardins Group. Date: June 2019. ...
  • Westpac Banking Corporation. Date: June 2013.
Apr 21, 2024

What is the #1 cause of security breaches? ›

Although hacking attacks are frequently cited as the leading cause of data breaches, it's often the vulnerability of compromised or weak passwords or personal data that opportunistic hackers exploit. Statistics show that four out of five breaches are partially attributed to the use of weak or stolen passwords.

What is the largest data breach in 2024? ›

Mother of All Breaches (MOAB): January 22, 2024

This massive data leak of over 26 billion records from various platforms emphasized the importance of cybersecurity globally.

What was the breach of cyber security in 2014? ›

The number and intensity of cyber-attacks grew in 2014. More than 750 data breaches were recorded in 2014, according to the Identity Theft Resource Center. Those breaches gave cybercriminals access to valuable corporate data and the personal information of millions of consumers across the world.

What did JPMorgan do in the financial crisis? ›

During the 2008 crisis, JPMorgan bought failing investment bank Bear Stearns for $1.4 billion with assistance from the Federal Reserve and much of the assets of troubled lender Washington Mutual for $1.9 billion.

What is the JPMorgan Chase and Co scandal? ›

JPMorgan Chase & Co has been fined $348.2 million by a pair of U.S. bank regulators over its inadequate program to monitor firm and client trading activities for market misconduct, the Federal Reserve announced on Thursday.

Did JPMorgan Chase reveal massive data breach affecting 76m households? ›

The 2014 JPMorgan Chase data breach was a cyberattack against American bank JPMorgan Chase that is believed to have compromised data associated with over 83 million accounts—76 million households (approximately two out of three households in the country) and 7 million small businesses.

Top Articles
Latest Posts
Article information

Author: Jamar Nader

Last Updated:

Views: 5595

Rating: 4.4 / 5 (75 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Jamar Nader

Birthday: 1995-02-28

Address: Apt. 536 6162 Reichel Greens, Port Zackaryside, CT 22682-9804

Phone: +9958384818317

Job: IT Representative

Hobby: Scrapbooking, Hiking, Hunting, Kite flying, Blacksmithing, Video gaming, Foraging

Introduction: My name is Jamar Nader, I am a fine, shiny, colorful, bright, nice, perfect, curious person who loves writing and wants to share my knowledge and understanding with you.