Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security IT

Details Emerge of 2006 Wal-Mart Hack 66

plover writes "Kim Zetter of Wired documents an extensive hack of Wal-Mart that took place in 2005-2006. She goes into great detail about the investigation and what the investigators found, including that the hackers made copies of their point-of-sale source code, and that they ran l0phtCrack on a Wal-Mart server. 'Wal-Mart uncovered the breach in November 2006, after a fortuitous server crash led administrators to a password-cracking tool that had been surreptitiously installed on one of its servers. Wal-Mart's initial probe traced the intrusion to a compromised VPN account, and from there to a computer in Minsk, Belarus.' Wal-mart has long since fixed the flaws that allowed the compromise, and confirmed that no customer data was lost in the hack — which is why they did not need to report the breach publicly earlier." This intrusion happened around the same time that Albert Gonzalez's gang was breaking into Marshall's and its parent company, TJX. The MO was quite similar: researching and closely targeting the point-of-sale systems in use. But the article notes that "There's no evidence Wired.com has seen linking Gonzalez to the Wal-Mart breach."
This discussion has been archived. No new comments can be posted.

Details Emerge of 2006 Wal-Mart Hack

Comments Filter:
  • by SomeJoel ( 1061138 ) on Tuesday October 13, 2009 @07:37PM (#29739081)
    when you can just pay for everything with a million dollar bill [usatoday.com]?
  • by Shakrai ( 717556 ) on Tuesday October 13, 2009 @07:37PM (#29739083) Journal

    Someone had installed L0phtcrack, a password-cracking tool, onto the system, which crashed the server when the intruder tried to launch the program.

    Linux would not have crashed from a mere userspace program ;) Windows saved the day! Hooray!

    • by Hyppy ( 74366 ) on Tuesday October 13, 2009 @08:02PM (#29739289)
      One word: Forkbomb.
      :(){ :|:& };:
      Yeah, I know any competent admin can protect against it, but still.
    • by blhack ( 921171 ) on Tuesday October 13, 2009 @08:20PM (#29739407)

      Linux would not have crashed from a mere userspace program ;)

      I have a forkbomb that disagrees with you.

    • Re: (Score:1, Redundant)

      That means with Linux the poor hackers would have been stuck with using the compromised VPN account to take over the entire system, with no crash or any other evidence...
    • by melmut ( 968751 )
      I don't think this is true. And I don't think linux is safer. Just give some evidence, please. Or don't say talk about what you don't know. Please.
      • The evidence is in the billions of dollars that corporate America has spent on prevention and recovery from exploits. For more evidence, tally up the cost that homeowners have paid for prevention and recovery - and don't forget to attach some value to all the time spent re-installing Windows. Again, we are looking at billions of dollars. Every time a Windows based online bank is exploited, you can add to the overall figure.

        Only a fool would try to convince you that Linux can't be exploited - but, what ha

        • Re: (Score:2, Insightful)

          by melmut ( 968751 )

          Only a fool would try to convince you that Linux can't be exploited - but, what has been the total cost of Linux exploits in the past 10 years? A mere drop in the bucket, compared to Windows exploited systems.

          Again, there isn't any evidence. Why would this be? I use the same basic rules for every os I manage, and guess what? I never have to reinstall. Never.

    • by w0lo ( 943113 )
      To dump the SAM hashes from a live system, you need debug priv (admin) and inject a dll or some code into a key windows process, if anything goes wrong and the process dies, windows BSoD's to protect itself
  • Surely they could have dumped the user accounts from AD (like the SAM under NT) and crack all the accounts on a remote machine. Then maybe it wouldn't have even been noticed. And if the POS software was secure, it should not matter if someone downloaded the source code.

    • by syousef ( 465911 ) on Tuesday October 13, 2009 @07:49PM (#29739175) Journal

      And if the POS software was secure, it should not matter if someone downloaded the source code.

      That depends on whether the source code was stored separately to certificates/key files and how well the passwords were externalised. You'd be surprised how modern security systems allow and even encourage awful practices in this regard. For example Spring web services and spring security have a bad tendancy of including such things in their config file, which are often bundled up in the application.

      It's actually not a trivial problem. If you include everything required for the app to run in the application package/bundle, you inevitably include such things somewhere they shouldn't be (even if that's just a build machine). The best solution I've seen is hardware security modules that don't allow keys and certificates to be exported. They aren't cheap but if you're running a large organisation and have been trusted with potentially millions of credit card numbers it's not exactly beyond the call.

      • by Anonymous Coward on Tuesday October 13, 2009 @08:16PM (#29739377)

        Forget the POS software and whether it was secure or not.. looks like Wal-Mart did not follow some basic security practices

        According to this blog [blogspot.com]:

        housed complete backup copies of transaction logs on network-connected UNIX servers, which included at least four years’ worth of unencrypted credit card numbers, cardholder names and expiration dates

        used the same usernames and passwords across every Wal-Mart store nationwide

        And ofcourse, the intrusion could be traced back to the VPN account of a system administrator who had left the company but his account was not shut down (the report does not implicate the employee)

      • by plover ( 150551 ) * on Tuesday October 13, 2009 @08:29PM (#29739477) Homepage Journal

        There's never a reason to have the private keys stored in the Point-Of-Sale application. The credit card data should be encrypted in the POS system using a public key borne on a verified certificate. It doesn't ever have to be decrypted at POS for any reason. Decryption should happen only at the point of authorization, and at the point of settlement with the bank. Those private keys are only in centrally located machines that can be much more easily secured than the thousands of cash registers located in thousands of stores.

        The hardest part is ensuring the certificate signatures are valid. You have to ensure the encryption certs weren't replaced with evil certs, and that no rogue root certificate was installed on the POS system.

        Now, if you are encrypting at a PIN Entry Device (PED), it's a bit different. PINs are most commonly encrypted using TDES, not public key cryptography. Because those devices actually store secret keys, they fall under the PCI PED guidelines. They store a master key used in a protocol called DUKPT (Derived Unique Key Per Transaction.) The device must pass various tests and analysis, and be physically hardened against an attacker attempting to retrieve the master key. The older ones I've examined used a combination of trip wires, sensor switches, epoxy, 10-layer PC boards, and soldering techniques (BGA packaging) to thwart the bad guys. I'm not saying they're impregnable, but they're physically pretty well secured.

        • Even Better: Don't store CC numbers once you have the payment authorization and transaction ID. It's that damn simple. Once Visa/Master Card/Dinner Club/AmEx authorizes the transaction, the only thing you need is the transaction Authorization ID along with the amount and it's what I don't understand about the entire Credit Card PCI process. Push for this and you'd eliminate many of the reasons to hack Merchant systems for card numbers and I suspect Visa/MasterCard/AmEx would save lots of money on bad charge

          • Yeah, that's not always true, depending on the processor. But, yes merchants should find a processor that limits the merchant's need to store that info.
          • What about a system like the one at my workplace that doesn't charge the card right there, but rather does it in a batch at the end of the day? It's useful because I can easily invalidate a transaction a few minutes later if I key in an error, without swiping the card again, instead of having to issue a chargeback. Also, what about machines that are operated offline (eg. a travelling booth). They're pretty common.

            • Then it would store it until the batch is processed—which would be the point at which you have the payment authorization and transaction ID.
        • Re: (Score:3, Interesting)

          by syousef ( 465911 )

          There's never a reason to have the private keys stored in the Point-Of-Sale application.

          Way to mis-read what I said. I gave an example that wasn't strictly related to POS terminals of how frameworks encourage poor security practices. Whether it's a certificate, key or password having it embedded in the configuration or the application package is poor security design but also the standard way things work.

          The credit card data should be encrypted in the POS system using a public key borne on a verified certif

          • by plover ( 150551 ) *

            The hardest part is ensuring the certificate signatures are valid. You have to ensure the encryption certs weren't replaced with evil certs, and that no rogue root certificate was installed on the POS system.

            Huh? That's the whole point of a certificate. If it's replaced with an "evil" certificate it won't authenticate at the other end. You'd have to replace them at both ends.

            You're assuming the certificate is used immediately to establish a connection. Point of sale terminals are not always on-line, and when they are off-line they must encrypt the authorization request and store it until it can be sent to the settlement system once they're back on-line. In that case, the terminal really needs to assure itself that the certificate is valid, because it might not be able to attempt the decryption until long after the customer has left with your merchandise and their charge card.

            • You're assuming the certificate is used immediately to establish a connection.

              No, I'm not. Where did I say that?

              Point of sale terminals are not always on-line, and when they are off-line they must encrypt the authorization request and store it until it can be sent to the settlement system once they're back on-line.

              Encryption and authentication (signing) are two different things. You almost certainly want both but you can encrypt without authenticating and vice versa.

              In that case, the terminal really needs

              • by plover ( 150551 ) *

                I don't think we're speaking on the topic in exactly the same way here.

                I'm trying to solve the problem of "how do I know if this certificate (and signing CA root cert) on this cash register are good? How do I know they are not forgeries?" If I'm on-line, I can use the cert to authenticate a connection to a host, and assuming* I'm not also the victim of a simultaneous man-in-the-middle attack, I can trust that the cert is valid.

                *Big assumption here.

                But if I'm off-line, I simply have to trust the certs in m

                • by syousef ( 465911 )

                  But if I'm off-line, I simply have to trust the certs in my possession.

                  You are way too focused on the cers. If you're off line and your certs have been compromised, so could your code. In which case game over. Any test can be bypassed. If you don't trust your register is secure, require it to be online.

                  Yes a HSM is the best test you can have. It provides non-repudiation provided you're willing to do forensics to prove the POS terminal hasn't been compromised. So it's a very partial solution. As soon as you

                  • by plover ( 150551 ) *

                    For the most part I'm not worried about attackers because I can't worry about them. As you say, the attacker could bypass any test. Even on-line isn't a guarantee of assurance, as the attacker could be providing me with a false host that matches my false certs. There is no way to determine (or even prevent) compromise on a box I don't physically control. And cash registers aren't of any business value if they're locked up in a secure data center.

                    The reason I focus on the certs is mostly because I need t

                    • by syousef ( 465911 )

                      I certainly meant no offense with that first posting. It was not intended as an attack. I'm sorry it came across that way.

                      I think for the most part we agree and I'm also sorry if I defended my position too vigorously and made it more personal than it needed to be.

  • ...no customer data was lost in the hack.

    Surely they didn't simply notice it quickly enough that the hacker didn't have time to grab anything... So why go through all the trouble if he's not going to take anything?
    Was it just for lols?

  • I can't help but wonder if it was related to this:

    http://www.orlandosentinel.com/news/local/breakingnews/orl-bk-walmart-safe-heist-100909,0,3026268.story [orlandosentinel.com]

  • Walhack? (Score:3, Funny)

    by fenix849 ( 1009013 ) on Tuesday October 13, 2009 @07:57PM (#29739251)
    Did anyone else jump to the same conclusion or have i been gaming too much? Now i might RTFA. :o
  • This what they for have the lowest cost IT workers and outsourcing IT work.

    • This what they for have the lowest cost IT workers

      I that you a verb or two.

    • I hope English isn't your first language.

      This what they for have....

      I assume you mean "This is what they get for having...."

      In which case, you're absolutely right.

  • But, why would the Attorney General have wanted to hack WalMart? What can this mean? Conspiracy theories abound...
  • Wal-mart's Chief Privacy Officer http://www.microsoft.com/presspass/features/2004/oct04/10-28privacy.mspx [slashdot.org]">took home a privacy innovation award for non-profits while Microsoft took home the corporate award when she worked for USPS.
  • by Jeian ( 409916 ) on Tuesday October 13, 2009 @09:11PM (#29739817)

    Albert Gonzalez, not to be confused with the former US Attorney General, Alberto Gonzalez.

  • to use green backs. Also cultivate the habit of not spending the money you don't have...

  • Is this information about POS backends still valid?

    FTA:
    "Wal-Mart has thousands of servers nationwide, and any one of them crashing would ordinarily be a routine event."

    "Someone had installed L0phtcrack, a password-cracking tool, onto the system, which //crashed the server// when the intruder tried to launch the program." [emph. added]

    From http://www.sco.com/company/success/story.html?ID=21 [sco.com] :
    "Nearly all of the 350 chains using PDI/RMS are deployed on SCO UNIX® technology [...]"

    "McLane Co., Wal-Mart's wh

    • Re: (Score:2, Interesting)

      by thejynxed ( 831517 )

      Dunno, but I know Walmart switched over to RHEL a few years ago for servers and using Fedora/CentOS for workstations.

      Even their computerized applicant system is running a modified version of Fedora in many locations. It crashes quite a bit though, so that's how I found out - they run a Windows-based VB6 program via WINE.

      I think in some of the newer stores, they've just swapped over to running a Win2k VM inside of VirtualBox or something on Linux and running the app that way.

  • mainpc cory # emerge walmart-hack
    Calculating dependencies... done!
     
    emerge: there are no ebuilds to satisfy "walmart-hack".
     
    mainpc cory # _

    Damnit!

    Oh well, I tried. I guess I have to pay for stuff now.

  • What does "compromised VPN account" mean? did the hackers find the password of the user? the article does not explain that.

  • One of the first things that stood out, they said was, that a Canadian employee that was let go that still had an active account.
    Then another, then another, seems the Canadian admins are not doing their jobs properly, hopefully this was rectified, and scripts were created for easy deletion / or suspension of accounts of employees let go.

  • confirmed that no customer data was lost in the hack

    That's exactly what the data thieves wanted them to confirm.
  • Ehm, WTF, I don't think customers wouldn't be all to miffed about all that data these chains collect on them being lost. I wouldn't care, I would actually love the option to have them NOT KEEP DATA ON ME. What customers would love to hear and need to be made aware about is if the hackers copied all that data, who gives a freck if it was lost.

Beware of Programmers who carry screwdrivers. -- Leonard Brandwein

Working...