Fidus Information Security are a CHECK and Tiger Scheme approved UK Penetration Testing consultancy with our specialists holding some of the most recognised certifications in the industry, including CREST certifications.
With so many nodes, your network offers plenty of potential attack surfaces. An infrastructure assessment will help you identify those weaknesses.
Web and mobile applications potentially expose data outside the network perimeter. Let us help you identify weaknesses.
Using advanced techniques, our team cybersecurity experts will conduct a real-world penetration test to assess all of your security provisions.
Are your payment systems meeting PCI DSS standards? Find out for sure with a payments-focused Pen Test assessment.
Have you ever considered your exposure if a company devices goes missing or is stolen? Let our team ascertain your exposure for you.
Sometimes direct attacks are the most effective - hackers will try to gain physical access to your offices and data centre. Are they secure?
How is your business handling personal data? Does it meet the requirements of GDPR, or are you risking a potentially massive fine?
Who is really targeting your organisation?
What’s the best way to test your network security? To attack it using the same tools and techniques a hacker does.
Penetration Testing is the systematic process of identifying and exploiting vulnerabilities in your applications, networks, mobile devices and wireless networks. The goal is to identify and fix these issues before they are exploited by a hostile third party.
Penetration Testing services from Fidus will evaluate each of these vulnerabilities to see whether exploitation is possible and how much of an impact there is to the Confidentiality, Integrity and Availability (CIA) of your data.
Using a mixture of automated and manual technologies, each Pen Test identifies and exploits issues which could compromise network assets. You will then have a complete understanding of network weaknesses – and a prioritised action list for dealing with them.
Fidus consultants mimic the techniques currently used by cyberattackers to establish an accurate representation of your security posture. Unlike criminals however, we do this without causing damage and with minimal disruption to your day-to-day operations.
For any business conducting their first security assessment, we suggest starting with network and applications – the most common attack points. Alternatively, a red team engagement test will help you assess preparedness for dealing with a sophisticated advanced persistent threat (APT) attack.
You can also assess employee readiness for dealing with social engineering attacks. Our highly realistic phishing campaigns look and feel like a real attack – perfect for understanding what workers would do in a similar situation.
Penetration testing reveals your most sensitive network vulnerabilities – so you need a partner you can trust. Fidus Information Security are an NCSC CHECK Green Light and TIGER scheme approved consultancy. Our cybersecurity experts hold some of the most recognised certifications in the industry, including CREST Certified Tester and Senior Security Tester. Fidus is also a Cyber Essentials verified company. Every assessment we perform is carried out according to UK industry approved methodologies (OWASP, PETS, NIST) along with our own internal testing frameworks.
More than just identifying security vulnerabilities, our cybersecurity experts are on hand to help you fix them too.
Certified Security Consultants
Our CREST and TIGER approved team holds a range of industry-leading security certifications including OSCP, CCT, SST and CISSP
Easy to Understand Reports
We’ll ensure that your executives and technical teams properly understand our assessment findings using plain-English reporting.
Fixed Price Proposals
The price you’re quoted is the price you’ll pay. Our quotes are broken down into a detailed costing table so you know exactly what to expect.
Other approaches we've witnessed have included convoluted steps and commonly ends with incorrect information being handed to the consultant assigned to the engagement.
Our approach to security involves a qualified security consultant through the entire process to ensure quality, accuracy and consistency.
Penetration Testing ‘tools’ are used as part of engagements to help assess, identify and exploit commonly found vulnerabilities. There are numerous different kinds of tools used within every engagement, each with a different use and varying popularity – like most things, people have a preference!
Whilst these tools are effective at finding what they’re able to, it’s important to ensure your provider does not simply run automated tools and issue a report. Many vulnerabilities cannot be identified simply by running an automated tool without some form of manual verification and, in some cases, manual exploitation too. Our consultants at Fidus focus on manual testing where possible and whilst some of these tools are used to aid assessments, they will never be the focal point of the engagement.
Commonly seen tools include; NMap, Metapsloit, SQLMap, Nessus, Qualys, Nikto, SSLScan, Cobalt Strike and many, many more.
The end goal of a Pen Test varies from client to client and has many underlying factors, such as; complexity of application and/or network, whether there have been previous tests, what kind of data the application/network holds and the size of the organisation.
The most frequent goal we are given by clients is “Can you obtain our customer information?”. However, it is also important to not overlook other issues which could lead to things such as loss of business reputation if the customer facing website is compromised.
Penetration Testing should NOT become a Pass/Fail assessment for your organisation It should be seen as an exercise to evaluate your current security posture with the aim to make as many improvements as possible.
At Fidus, we ensure the client is able to extract as much value from the assessment as possible. As such, our reports contain sections for both the executive team which is aimed at the risks to the business and a technical section for the development and IT teams. We provide enough information for the C-Level staff members to fully understand the report and enough information for the technical team to be able to locate, reproduce and fix all issues discovered.
Initiation / Scoping – Ensuring the delivery of work is exactly as you require and the correct amount of time is allocated to your engagement.
Pre-Assessment – Confirmation that your environment is accessible and ready for testing and all requirements have been completed.
Assessment – Conducting the engagement as per the Scope of Work.
Post-Assessment – Collection of all results and ensuring the tested environment has been tidied up where possible.
Reporting – Compilation of results for the final deliverable.
Remediation Discussion and Support – Discussion and explanation of all issues where required and further support for implementing changes as recommended within the deliverable.
The time it takes to conduct each assessment is dependent on the scope of the engagement. There are multiple factors which can impact the length of the engagement, such as; network size, complexity of applications, size of organisation and whether the assessment is internal or external.
The main benefit of is the proactive approach to finding serious vulnerabilities before attackers do. These vulnerabilities can lead to numerous scenarios such as; reputational damage, loss of user data and financial fines.
Penetration Testing is also a key factor to becoming compliant in multiple standards, such as Cyber Essentials Plus, PCI DSS and ISO 27001.
Evaluate Current Security Controls
A pen test allows you to evaluate current security controls which are in place. These could be Intrusion Prevention Systems (IDS), Intrusion Protection Systems (IPS), Firewalls and Web Application Firewalls (WAF). We commonly see mis-configuration of these devices, sometimes rendering them ineffective at their main job, keeping your data safe.
Avoid The Cost of Network Downtime
Have you ever worked out how much it would cost your business if you had even a day downtime because of a cyber attack? This is not simply the loss of a day wages for all employees, it may also include; legal fees, incident response, customer protection and damage control activities.
A security assessment also allows you to establish the level of exposure if a specific area of your company gets breached, such as the main user web application, and ascertain how sensitive the data held within is. Currently, sensitive breaches must be reported to the Information Commissioner’s Office (ICO) with fines sometimes reaching 6 figures. However, with the upcoming General Data Protection Regulation (GDPR) law, these fines are set to multiply and only give organisations 72 hours to discover and report a breach. The easiest way to avoid a breach is to proactively defend against one.
Penetration Testing should be performed on a regular basis to ensure newly discovered threats and previously recommended implementations are evaluated. In addition to this, penetration testing should occur when there’s a big change to network infrastructure, a new web application is deployed, during/before mergers and Phishing assessments should take place upon expansion of your team.
The kind of assessment you require has many underlying factors. Some questions such as “We’re about to deploy a new web application, what kind of testing do you recommend?” are much easier to answer than “We’ve never had a Penetration Test before, what do you recommend?”.
For the latter question, there are a series of questions which need to be answered first. Such as; What are your key assets? What would cripple your business if stolen? (Signing keys, source code, customer data etc), How many employees do you have? What is your budget?
It is important to have all of the information to be able to evaluate what would have the best return on investment for your Penetration Test.
If you would like to talk through the different kind of paths you could take, please get in touch.
Recently members of the Fidus team noticed an interesting blog post on the OnePlus forum by an individual discussing recent fraudulent attempts made on two of their credit cards. The forum user states that the only place both cards were used was on the OnePlus website in November 2017, they go on to ask whether other members of the community have had the same issue (spoiler:they had). OnePlus are currently using the Magento eCommerce platform, which is a common platform in which credit card hacking takes place.
These findings do not confirm OnePlus have suffered a breach. Instead, they look into the current structure of the payment flow and how it could have been achieved.
A further update has been posted at the bottom of this blog post.
We stepped through the payment process on the OnePlus website to have a look what was going on. Interestingly enough, the payment page which requests the customer’s card details is hosted ON-SITE. This means all payment details entered, albeit briefly, flow through the OnePlus website and can be intercepted by an attacker. Whilst the payment details are sent off to a third-party provider upon form submission, there is a window in which malicious code is able to siphon credit card details before the data is encrypted.
Straight away there are two issues that stand out:
Credit card fraud is not new to the Magento eCommerce platform. Sucuri blogged about this very issue back in 2015.
The other method commonly used by attackers, as described in the Sucuri blog, is modification of the app/code/core/Mage/Payment/Model/Method/Cc.php file. This method requires shell access to the server and indicates a serious compromise.
The Cc.php file handles the saving of card details on the eCommerce website. Regardless if card details are actually saved or not, the file is called regardless. Attackers are able to place code within this file which allows for payment details to be compromised and sent to an off-site location controlled by the attacker. Since this takes place within the prepareSave() function within Cc.php, the card details are not yet encrypted and are at risk. An example of malicious code can be seen below:
The below image highlights exactly where an attacker is able to compromise raw credit card data.
As it stands, the poll on the OnePlus forum regarding affected users has over 39 users complaining of recent fraudulent attempt. Numerous users of Reddit have also complained of the same issue.
Users of twitter have also started to question this potential issue.
The safest option to prevent credit card fraud is to use an OFF-SITE payment processor, or a processor who offers iFrame integration with checkout pages. Third-party payment providers have created PCI compliant sandboxes for the very purpose of securely taking card payments; utilise it.
Furthermore, it is highly recommended to conduct regular penetration testing assessments against your eCommerce websites to highlight any security risks.
Upon further review of the payment system, it should be noted that OnePlus are currently making use of the CyberSource Magento add-on, as can be seen below.
CyberSource note on their Magento marketplace page that all data submission is done within the client’s browser and never touches the eCommerce infrastructure (Fidus do not currently have an environment to test this statement).
If this is true, this leaves 2 potential avenues for attack and rules out the Cc.php theory:
It is also worth noting CyberSource have a statement within their Data Sheet PDF which states:
Secure Acceptance Silent Order POST limits your exposure to payment data, which reduces your PCI DSS scope, because many of the controls may no longer be applicable. For certain businesses, this can mean having to complete the PCI-DSS Self-Assessment Questionnaire (SAQ) versus a full scale audit. No payment solution, however, negates the need to validate compliance. You should consult with your acquiring bank to uate the level compliance required for your organization.
An update posted on the OnePlus website and an e-mail sent out to affected customers has confirmed a breach did occur and 40,000 customers had their payment details stolen.