Largest Data Breach Disclosed During Inauguration 168
rmogull writes "Brian Krebs over at the Washington Post just published a story that Heartland Payment Systems disclosed what may be the largest data breach in history. Today. During the inauguration. Heartland processes over 100 million transactions a month, mostly from small to medium-sized businesses, and doesn't know how many cards were compromised. The breach was discovered after tracing fraud in the system back to Heartland, and involved malicious software snooping their internal network. I've written some additional analysis on this and similar breaches. It's interesting that the biggest breaches now involve attacks installing malicious software to sniff data — including TJX, Hannaford, Cardsystems, and now Heartland Payment Systems." One bit of good news out of this massive breach is that, according to Heartland's CFO, "The nature of the [breach] is such that card-not-present transactions are actually quite difficult for the bad guys to do because one piece of information we know they did not get was an address." Heartland just put up a press release on the breach.
Suckers (Score:5, Funny)
Re: (Score:3, Funny)
Neither do I. Unless I'm posing as you.
Re: (Score:2)
Agreed, I stopped using computers years ago, never been happier!
Missing Address (Score:5, Insightful)
"The nature of the [breach] is such that card-not-present transactions are actually quite difficult for the bad guys to do because one piece of information we know they did not get was an address," Baldwin said.
Because as we all know it is impossible to get someone's address by having only their full name and credit card number.
They are trying to down play a very serious incident by disclosing the breach on a day heavily focused on the inauguration. Then they have the nerve to say "don't worry they didn't get your address" as if to say someone smart enough to embed malicious software which gathers credit card numbers is not smart enough to find someone's address. Common!
Re:Missing Address (Score:5, Informative)
Let's also not overlook that while some stores/merchants may have a policy to ask for address when doing Cardless Transactions, the processing houses (at least the ones I've used) will more than happily process the transaction successfully without anything more than the card number and the expiration date.
Some processors will refuse to process transactions within the month that the card expires, but you simply add 4 years to the date and it'll go through just fine.
The Credit Card companies have pushed very hard and very long to make credit transactions more painless than cash. You have to drop some safeguards to do that though.
Re: (Score:2)
Slightly OT, but FYI:
Both of the first points are relative...it depends on the processor, and the product on which they are processing. The address verification (AVS) gives the merchant better pricing, but is not a mandatory knock-out rule with Visa/MC to get an authorization. Some processing platforms will force a reject if the AVS match fails, some will let it go through at the higher rate.
The expiration is relative, too...some platforms do a literal verification, some just check to see if it matches [0-1
Re: (Score:2)
And most velocity check systems will pick up on expiry skipping (+1/mo or +1/year) transactions. But yeah, you think agreements between card holders and the respective issuer is fine print, take a look at those between a merchant and an ISO/acquirer.
AVS can get discount rates and/or better chargeback conditions for card-present transactions. To really get the best protection you need to use Verified by Visa or similar programs. Of course, they are a pain to implement, have horrible card holder participation
Re:Missing Address (Score:4, Funny)
Hmmm...B.H. Obama. Jeffery, get out the phone book. We need to determine where this guy lives.
Re: (Score:2)
ID thief: Hi, I've moved recently, and I just wanted to check you guys have my new address.
Every time I've done that with my bank, they've asked for my full name, date of birth, and account number (or if I go through the automated channel, the only ID I need is my phone or online banking pin). After those are provided, they tell me what address they have on file.
Re: (Score:2)
Standard practice in the finance industry these days is to send a notification whenever an address is changed - to both the new and old address. It wouldn't stop them from making the transaction, but it would notify the cardholder that something is up and make it pretty easy to dispute charges.
It's a blog post! (Score:2)
The guy posted to his blog about it. On the same day as the inauguration.
Seriously, the tone of the summary is dumb as fuck. The press release is from today, as is the blog post. It's not even a fucking newspaper article.
Re: (Score:2)
Did he? I would RTFA, but I've given up trying to read white-on-black web pages. Seriously, whoever thought that dense white text on a black background is easily readable?
I'll agree that it is a little more readable on LCD monitors than it was on slightly old CRT monitors, but it still isn't easily readable.
Re: (Score:2)
Dunno; I don't have much problem with white on black text. I prefer green or amber on black, though, but that's mostly nostalgia for the VT-220s I spent so much time in front of.
what the bad guys didn't steal (Score:5, Informative)
Re: (Score:2, Funny)
Re: (Score:2)
If they managed to buy one of those databases, suddenly they have a massive amount of data-mining information available to them.
"Actually quite difficult"? (Score:3, Informative)
The nature of the [breach] is such that card-not-present transactions are actually quite difficult for the bad guys to do because one piece of information we know they did not get was an address.
Because we all know that it's impossible to spoof the magnetic strip on the credit card.
Re: (Score:2)
I'm not sure what you mean ...
The magnetic stripe doesn't have anything to do with card-not-present transactions. CNP basically means internet: you type in your name, card number, expiry date, possibly security code. It's not clear whether they got the security code, but I guess they did, otherwise the company would be touting that as another up-side.
The magnetic stripe has its own security code, which is not printed on the card. This means that you can't make counterfeit cards given only knowledge of t
Re: (Score:2)
The point is that it's really amazingly easy to make a fake credit card that looks just like the real thing. The only hard part is the hologram and you can just get some holographic sticker and scuff the crap out of it and convince most people if you can distract them away with social engineering (and if the card works the first time.) Not that I would ever do this, I'm about as sneaky as Baby Huey.
Re: (Score:2)
You don't have to make a fake credit card, just rewrite the magstripe on an existing expired/stolen card.
This is why CC zero-liability is a good thing. (Score:2)
When stuff like this happens, it is not the consumers who end up paying, but Visa / MC - who end up putting pressure on these guys to get their act together.
Re:This is why CC zero-liability is a good thing. (Score:5, Informative)
Some clueless person says this every time there is a story on credit cards.
Visa/MC do not end up paying. Merchants on the receiving end of fraudulent transactions do. Visa/MC may even profit from it as the fees they charge merchants for chargebacks can be quite steep.
Re: (Score:2)
Re: (Score:3, Informative)
Save that Visa and Mastercard rules prohibit the merchant from validating the identity of the person using the credit card. For instance, a merchant is prohibited from requiring the customer to present ID (such as a driver's license) before they'll take the card. If a merchant refuses to take cards without identification, Visa/MC will terminate their merchant account.
Re: (Score:3, Informative)
Re: (Score:2)
Same applies for cash, too, which isn't quite the same as writing a check.
How many people would present identification for a cash purchase that wasn't age restrict
Re: (Score:2)
But it is possible. :)
Re: (Score:2)
slightly OT, but since I own an only-slightly-larger-than-mom-and-pop business, I have to say, this sort of thing is becoming a real consideration. 10 years ago, my business was 60/40 cash/cc, now it's reversed and getting worse (because of the ubiquity of debit cards, and those stupid commercials that try to make people feel bad for paying cash...how stupid is that?). I'm seriously considering giving a cash discount just to avoid or reduce the:
1) costs of cc transactions
2) the hassle of securly storing so
Re: (Score:2)
Re: (Score:2)
yeah, I'm aware. What's amazing is how many small shops do charge a fee, or a minumum amount, both of which are violations of the merchant agreement. I'm always curious how they get away with it... probably no one bothers to report it and life goes on.
Re: (Score:2)
You're right about the rules, but nine times out of ten, large retailers will deny you if you don't show ID
Let me guess, you're were buying tobacco, alcohol, or porn, weren't you? Or you look extremely creepy, since usually the retailer won't even look at the signature [zug.com] unless you buy an expensive big screen tv [zug.com].
Re: (Score:2)
Everyone pays. Consumers deal with losses and ID theft, merchants deal with lost customers and higher fees and time to deal with the issue, acquirers and issuers pay fines and fees and hire people to work the issues and fix the problems, the card brands have to pay people to sort through the problem, ensure the current regulations were adequate and who is at fault, hire lobbyists to keep themselves from being slammed in Washington. Everybody, at all points of the industry, loses.
Why don't merchants do more over this (Score:2)
Given how much it costs merchants when someone issues a chargeback (they loose the money they got paid for the goods, they likely loose the goods AND they have to pay fees to Visa/MC/etc), why aren't the merchants doing more to pick up on fraudulent transactions? And why aren't they doing more to apply pressure to Visa/MC/etc to change the rules (e.g. get rid of the rules that make it harder for them to do ID checks etc to pick up the fraud)
I have no clue how much money, say, Wal-Mart is out annually becaus
who pays for security ? (Score:2)
It's the consumers who pay for it with higher charges to pay for things like the chip-and-pin upgrade. Similar to how the consumers pay for shop-lifting
solution to CC breeches .. (Score:5, Insightful)
Re: (Score:2)
Please mod parent up. I have mod points, but posted elsewhere. Having just gone through PCI compliance (which is frankly a joke), there needs to be a better system out there.
Re: (Score:2)
I was just thinking the same thing today. Blizzard is offering this for WOW players to protect accounts. A loss in convienience is a small price to pay at this point to address the ever growing insecurity (not to mention costs to businesses) of the credit card system.
Re: (Score:2)
That's what EMV [wikipedia.org] and chip and PIN [wikipedia.org] with end-to-end encryption [wikipedia.org] is generally all about. All that US companies need to do is stop postponing it and finally make the switch to that technology like companies in many other countries already did.
Re: (Score:2)
Re: (Score:2)
Hmmm ... I walked through the Barclays demo pages, and one thing I noticed was that the URL always started with "http://". So what's to prevent my ISP or anyone else along the data path from extracting all the data from the packets and adding it to their database? In particular, I noticed that the protocol involved typing in the recipient's account number and name, which could be useful data to anyone watching the conversation.
Re: (Score:2)
The technology exists. The US credit card companies have zero incentive to implement it. They pass off all the costs of fraud to mostly their merchants and occasionally their cardholders.
A well-funded insurgent could start making some headway, but then they'd finally have reason to switch. So, good luck getting that company funded.
why were they even (Score:2)
Re:why were they even (Score:5, Informative)
Because they are the ones processing the transactions. We don't use heartland, but when take online orders through our website, we don't store the credit card information, our CC Processor does. The processors are the one that actually run the transactions, take money from the customers account, take a percentage, then deposit to the merchants account. And they have to keep records of all that.
In order for CC payment to work someone has to store that data somewhere.
Re: (Score:2)
This happened to a processing company called CardSystems a few years ago. After that, it came out that "CardSystems had been keeping data that it was contractually obligated to delete" (quoting wikipedia [wikipedia.org]) and it lead to VISA and MasterCard firing the company.
So what is different here?
Re: (Score:3, Informative)
I don't think they were necessarily storing it, from the press release. To me, it basically says a network sniffer picked up network traffic on the wire. That can happen whether you store the info or not.
Re: (Score:2)
Card not present transactions (Score:2, Informative)
This is BS. Anyone with a card terminal can key the number in, or the card could be cloned. I discovered that FIA categorizes keying the number into the terminal as a "card present" transaction, when I tried to dispute an unrecognized charge. They then use this as a reason that the charge was legitimate, even when the card was not in fact present.
AVS is optional (Score:2)
AVS is not necessary to process a transaction.
Anyone with a merchant account has the full ability to control their scrub by adjusting their AVS settings, from full matching, partial or none at all.
Biometrics: When, How (Score:2)
We have been going through these issues for years. These problems are not created by consumers, but by the companies that want to legitimately take their funds in return for goods, yet the consumers wind up having their share of problems from this.
At some point facial, iris, thumbprint readers (of pattern or blood vessels) or something is going to have to be implemented.
Given that most computers/cellphones have cameras now, when will it happen?
The best lie... (Score:2)
"The nature of the [breach] is such that card-not-present transactions are actually quite difficult for the bad guys to do because one piece of information we know they did not get was an address."
Hah.
Addresses in card-not-present transactions can in fact be gotten, and if they use AVS then at the least the AVS data is readily available.
In other words, you're getting pwned even if it was card-not-present.
For those not in the know, most Internet transactions, phone orders, mail orders, and eBay/PayPal transc
First in a long line of discoveries to come (Score:5, Interesting)
Those who claim to be perfect but never admit mistakes usually are covering up for massive mistakes.
And the missing million emails we know of are just the observable symptom, as are the transactions in this health data breach.
The old truisms of data security still apply:
1. It's usually insiders that provided or passed on information used to get access.
2. Those who cover up problems only create even larger problems, due to the system of trust.
3. You can stop 99 percent of attacks with reasonable security measures, but a determined attacker willing to use human intelligence methods will almost always get through the other 1 percent - the trick is knowing what measures will dissuade the 99 percent and implement those, and use reporting to discover the other 1 percent instead of measures that will be defeated anyway.
100 million (Score:2)
Why are we assuming 100 million transactions?
TFA says "100 million transactions per month". But they have no idea how long the malware was in place. It could have been a week; that's 25 million transactions. It could have been six months. Hell, the TJX breach happened over the course of several years (although they weren't stealing data continuously). It sound like it'll definitely be big, and it could be the biggest ever (TJX clocks in at around 45 million transactions stolen), but we don't have any i
HUH?? CNP not hard to do? (Score:2)
"The nature of the [breach] is such that card-not-present transactions are actually quite difficult for the bad guys to do because one piece of information we know they did not get was an address."
So... of the 300-million-plus transactions they KNOW have been exposed, NONE of them were card-not-present(CNP) transactions that included address verification data?
Address verification data might not be enough for identify theft -- but then it might -- but it SURE as hell is enough to forge more CNP transactions.
Re:WTF??? (Score:5, Insightful)
I would say it may have quite a lot to do with it... it's either a pretty big coincidence, or they are trying to bury the news by releasing it when the networks actually have something else to report on.
What's your bet on?
Re:WTF??? (Score:5, Informative)
Same reason Clear Channel laid off 8% while this was going on. :-)
Re:WTF??? (Score:4, Funny)
Re: (Score:3, Informative)
Thats nothing a certain middle eastern country broke it's fragile ceasefire, the night of the US election, that was more than just a good time to leak the news. TBH im surprised that a UK official got in trouble for saying 9/11 was a good day to get rid of bad news, this shit has been going on for years.
Re: (Score:2, Insightful)
im surprised that a UK official got in trouble for saying 9/11 was a good day to get rid of bad news
She didn't get in trouble for saying it; she got in trouble because the media found out she said it.
Re: (Score:2, Informative)
Re:WTF??? (Score:5, Informative)
The implication is that they timed the announcement to occur when no one is paying attention.
Re:WTF??? (Score:5, Insightful)
"Legal reviews": "Holy crap, we're gonna get our butts sued off if this breach becomes a big news story! You have to delay this until we can start a war or something to distract the press!"
"Will the inauguration hype of the first African-American President of the United States work as a distraction?"
"Brilliant!"
Re:WTF??? (Score:5, Interesting)
The first instinct of Heartland is to save itself and the first instinct of the banks will be that it can rate jack its customers if the new activity has put them overlimit.
Only after leaking of the news is inevitable and can no longer be delayed will Heartland grudgingly try to sneak it out under the radar and then in a general, untargeted sense, not directly to the customers involved. Nothing will be done to avoid spreading the pain to a card holder or to a vendor.
I dare say most of the legal wrangling was in how to spin this as a justification to claim from TARP.
Re:WTF??? (Score:4, Interesting)
Re:WTF??? (Score:4, Interesting)
Re: (Score:2)
Their timing of the announcement is more than a little coincidental and at the least does nothing to help with their public image. Their main concern is that they don't want to lose their customers over this. By not revealing the names of the retailers involved, there won't be any public backlash from customers.
Ok, so this *one* transaction company 100 million transactions/month. There are several other competing companies. This incident is the result of a data breach without accounting for daily fraudulen
Re:WTF??? (Score:5, Insightful)
Today. During the inauguration. WTF??? What does the inauguration have to do with this?
Well, somebody who is inclined toward cynicism might conclude that the company deliberately chose to release this information when public attention would be diverted elsewhere.
Re: (Score:3, Interesting)
Ahh...now I get it. Still, there was that plane that landed in the Hudson a few days back, yesterday was MLK day, the Super Bowl will be in a couple of weeks. Not to mention that it would seem that it would be in their best interests to get the word out to minimize losses.
Re:WTF??? (Score:5, Interesting)
Not to mention that it would seem that it would be in their best interests to get the word out to minimize losses.
Oh, they've already got that covered:
In other words, "Yeah, technically it was a breach, but you know, not enough data got released for us to actually be provably liable. So if your CC gets raped, you know, it's not our fault. Really. Trust us. ;)"
In related news, now we know what happened to the Iraqi Information Minister: He changed his name and became President and CFO of a large credit card payment processing company.
Re:WTF??? (Score:4, Informative)
Re: (Score:2)
As the banks are not giving out credit any more he's probably safe on this one for a while ;)
Re: (Score:2)
All of those other incidents (MLK day, super bowl, etc.) are in passing. They are temporary, at best. The inauguration is going to echo through the media for a loooong time to come. Even if someone publicly calls them out on this (more than just on /.) and there is an attempt to generate an uproar over this, in the end, the inauguration will far outweigh the breach when it comes to face-time in the news.
I'm the cynical type, and I reckon they succeeded at hiding this one in plain sight.
Re:WTF??? (Score:5, Interesting)
Well, somebody who is inclined toward reality
No need to thank me.
Also, FTFA:
Heartland called U.S. Secret Service and hired two breach forensics teams to investigate. But Baldwin said it wasn't until last week that investigators uncovered the source of the breach...
Meaning they knew about it long enough to hire some forensics teams, do the research, figure out where the breach came from, etc. and they finished all that up last week...and then decided to wait until NOON today to release the news to the public? Sorry, but that's plain bullshit, no cynicism involved. If they were interested in disclosure, they would've released the news sooner. At the very latest, they would've released it as soon as they found out how it happened (so they could say they had already closed the breach.)
Instead, they wait until noon (they're a New Jersey company) when the inauguration is happening? Why not sooner in the day? Why wait until what would arguably be lunch time usually? Who discloses breaches at lunch? Answer: nobody. On the other hand, who discloses breaches during a HUGE national (and arguably international) event? Answer: someone trying to hide something.
Again, I say inclined toward reality, not cynicism.
Re: (Score:3, Informative)
My own government is guilty of the very same [bbc.co.uk] - "a good day to bury bad news" as the infamous leaked e-mail went. As he said, rooted in reality.
Re: (Score:3, Insightful)
My comments were based on the article itself. What more do you expect? The article claims the disclosure occured during the inauguration. Regardless, waiting for inauguration day is "interesting" enough.
Also, just a little heads up: "nothing to do with reality" and "incorrect on the point of exact timing" are not synonymous. It will help lend credence to your position in the future if you learn the difference.
Re: (Score:2)
Re:WTF??? (Score:4, Funny)
"Researcher says Linux is better than Windows on Pedantic Asshole day."
There, is that better?
Re:WTF??? (Score:5, Funny)
Re: (Score:3)
If that was their plan, then that's a foolish one. It would have to be an EXTREMELY slow news day for this to get picked up on by the major news outlets, and even slower for most viewers to bother understanding it. And it's going to be picked up by people who are interested, like here, reguardless.
Burying it effectively would be waiting for something like the newest release of some major open source software, or waiting until China or Australia or other nation did something major about censorship.
Re: (Score:2)
Well, considering the pummeling TJMaxx got for a smaller breach, they may be trying to keep their brand from becoming synonymous with some nefarious concept like 'security breach', 'stolen credit cards', etc
Re: (Score:2)
Re:First CC (Score:5, Funny)
Then prove it - what is the security code on the back?
It's 999, everyone knows that! (Score:2)
I'm smarter, so I just won't let you know the order of the numbers ...
Re: (Score:2)
Thanks...I needed a new one to renew my 2600 sub.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Do you have any citations for that?
'A piece of malicious software [washingtonpost.com] planted on the company's payment processing network that recorded payment card data as it was being sent for processing to Heartland by thousands of the company's retail clients'
Re: (Score:2)
And this is somehow anything to do with the server? We're talking about a payment processor, who has to comply with PCI DSS. One thing that requires is that the server managing payment data be isolated from all the client PCs, and run appropriate security software etc. If anything, this is Heartland's fault (and their PCI assessors, of course). Nothing to do with Microsoft, who for the most part make good servers (even if everything else sucks).
Re: (Score:2)
Damn straight. Just ask any malicious software author what their server platform of choice is.
Re: (Score:2)
Uh, Linux?
Re: (Score:2)
Did you check the security certificate that is being used by that Microsoft site before posting? I'm sure you understand what role these certificates serve in relation to https connections.
Of course, the connection to their site might be being intercepted by aliens who are replacing a valid certificate with a bad one. Or maybe they're using an old skool coal fired server and forgot to shake down the clinkers.
I'll just use Occam's Razor here - and the simplest explanation is that that server is running Win
Re: (Score:2)
Re: (Score:2)
Actually, they can. It isn't invalid at all, it was merely issued by Microsoft's certification authority (which itself has a CA certificate issued by GTE CyberTrust). The problem is your browser (my Firefox 3 didn't even blink twice at it).
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Hi, you must be new here. Welcome to-
Fuck it.
Re: (Score:2)
>> Users who install software on their workstations.
>> In a perfect world, software makers wouldn't write software that demands that it run with administrator privileges.
Both of the above statements seem to indicate that you're running MS Windows. If I were you I'd be thinking about how to change that.
Linux has a much stronger security model and generally does not require users to run apps as root.
Also, 99.999% of virusses are windows-only.
Also, most basic users aren't even going to be able to g
Re: (Score:2)
Yes, I can dream of the day I could get users over to something else...
Sometimes people are just stuck until something better comes along. But I'll say this much: When Autodesk starts making CAD for MacOSX again, I'm pushing for change.
Re: (Score:2)
I'd say it is up to the card company. Under no circumstances is it the cardholder's problem, and never could be. Also, it is unlikely any merchant that takes reasonable care is really going to be taken.
Good and Bad are Relative (Score:2)
As icky as this might sound, the longer it takes before we crash the higher the population.
Crashing sooner involves fewer people suffering.