Korean Banks Forced to Compensate Hacking Victims 154
An anonymous reader writes "A brief story over on Finextra reveals that the Korean government is introducing new legislation that will force banks to compensate customers who have been victimized by identity theft even if the banks are not directly responsible. This action obviously will not stem identity theft but the hope is that this will push banks into security improvements that will make identity theft much harder."
All too brief... (Score:5, Informative)
From TFS: 'Brief' is right...'skimpy' is the adjective that comes to my mind.
A much more detailed report on this story can be found at The Korea Times [hankooki.com].
Reading through the above referenced story, two things pop out at me:
Given these two paragraphs, this looks like I'm going to be paying higher systems costs because others can't be bothered to practice responsible computing (when this initiative moves out of Korea into the rest of the world, that is...).
Re:All too brief... (Score:2)
Re:All too brief... (Score:4, Interesting)
Sounds like you're talking about RSA's SecurID products [rsasecurity.com].
These things are expensive to purchase and deploy. Who's gonna foot that bill? Just the users who can't get the hang of responsible computing....or all of us?
Besides, SecureID does have its flaws [homeport.org]...no panacea here.
Re:All too brief... (Score:2)
There are better ways to pick on SecurID than that.
The reality is it changes the mix for the banks just enough to be useful. Not cheap though.
Re:All too brief... (Score:2)
Re:All too brief... (Score:3, Insightful)
Or for that matter a phishing site that passes through the authentication info that you type in, including the number from your dongle...which now that I think about it, is the more likely scenario.
The answer will never really be in authenticating the *person*, that c
Re:All too brief... (Score:1)
Re:All too brief... (Score:4, Informative)
There are many factors which are prompting this in SK. I am not a native but I have been residing in South Korea for 2 years.
-This place is the mecca of broadband internet access. I mean anywhere and everywhere in the country, everyone is connected at speeds that would humble first world nations. Not that SK isn't first world, economically they are, socially it's another story...
-Everyone and their mother, uncle, step-sister uses IE explorer. Most Korean sites are designed for IE and don't work with any other browser.
-The networks are dirty, before I had a physical firewall, ZoneAlarm was registering 1000+ intrusion attempts a day on my system.
Put your average mom and pop who don't know any better, in an online banking situation in this environment, and you are asking for disaster.
It will probably set a precedent for many online banking SOPs in the west.
For those idiot western media brainwashed idiots who don't know a thing about Korea, get a clue, nobody gives a damn about eating dogs or even hears about North Korea more than once a month here, just listen to your dear leader dog tell you who to attack next.
Re:All too brief... (Score:3, Interesting)
Yes, gov stepping into corporate arena is a bad thing, but it seems to be keeping their Starcraft players happy enough.
Re:All too brief... (Score:2)
This is also why SBC only sells DSL to 14,500 feet regardless of how good your copper is. At least, that's the case in California. They used to sell to 17,000 feet but then the FCC started fining the shit out of them if their DSL was slow. So, existing customers got to stick around, bu
If it is a cost, it is a cost. (Score:2)
The question is whether the benefits will be worth that cost. Or whether there is another option that will provide secure transactions without the cost.
Either way, the people most motivated to find the solution would be the banks IF they were held accountable as this seems to say they will be.
Re:All too brief... (Score:2)
Most phishing sites have nothing to do with the original institution, other than nipping off enough
Re:All too brief... (Score:2)
Well, you're making two rather large assumptions, firstly that the precident will spread, and second that this would be a bad thing for your bottom line. But many large banks already cover identity theft, and that money comes from somewhere (hint: you). If the net result is
And where will the money come from? (Score:5, Insightful)
Great! (Score:3, Insightful)
Any way you cut it, with this legislation the bank is the one who loses if they don't get their act together when it comes to security.
*Every* industry should have this type of legislation. It should not be the customers responsibility to research the security policies of their prospective banks/stores/whatev
Not Great (Score:2)
Bollocks (Score:3, Insightful)
Even so, if my bank started charging me a monthly service fee, I would jump ship with no hesitation.
I mean, it takes all of 5 minutes to reigster 10 or 15 accounts online. It is not rocket science.
The biggest pain would be swtiching the directd eposit at work, and only because it would take a few days to go through probably.
Not much of a deterrent IMO.
Freudian Slip?? (Score:2)
Re:Great! (Score:2)
i agree! i'm tired of all of these mailings that my bank sends me to tell me how to protect my identity. aside from not giving out personal info to people i don't trust, i should not have to be responsible for prote
Re:Great! (Score:2)
Credit card companies have always (or for quite some time anyway) been on the hook for fraudulent charges, just as banks have always been on the hook for stolen money.
Why the rise of the internet should allow them to offer a service protecting you is nonsense,
Re:And where will the money come from? (Score:5, Insightful)
The fault here lies with two parties, the bank for not doing enough, and end users for not caring enough about security. I feel that end users should still be partially responsible for their actions. I mean, there are people out there that, despite repeated warnings, will keep getting themselves hacked and scammed. I think most of us know people like that. And really, the only remedy for them is to yank out their computers and never let them go online again.
It's one thing to make banks more responsible for security breaches, but it's another to force them to be completely at fault, when there are so many points of entry for a crook. From the internet router from the ISP, to the user's home line, to his computer, to his keyboard, to the telephone, etc.
Re:And where will the money come from? (Score:5, Insightful)
Would it be too gratuitous to mention that at least some percntage of the fault lies with the unethical idiots actually doing the theft?
Re:And where will the money come from? (Score:2)
Re:And where will the money come from? (Score:2)
Re:And where will the money come from? (Score:2)
Would it be too gratuitous to mention that at least some percntage of the fault lies with the unethical idiots actually doing the theft?
No, it isn't their fault that it was easy, it was their fault that they did it.
Re:And where will the money come from? (Score:2)
???
I'm sorry, I missed the leap of logic which allowed you to make this statement. Tytpically speaking as the cost of a given thing increases the likelihood that someone will do that particular thing decreases, all else being equal. Care to enlighten me?
Re:And where will the money come from? (Score:2)
Think ATM machines....these things were UB
Re:And where will the money come from? (Score:2)
Why?
Re:And where will the money come from? (Score:2)
It's not really price fixing. They just keep raising the prices, but due to competition they have to keep them relatively the same...and I mean relative....if one bank charges 1.75, and across the street they charge 2.50 --- that is a big difference.
Banks ATM fees are determined by region (poorer areas are cheaper then more affluent areas).
Also, profits do not determine if companies are price-fixing - there is no
Re:And where will the money come from? (Score:5, Insightful)
The whole "identity theft" terminology is screwed up; it's not your "identity" you're protecting--you're still you after someone else manages to clear out your checking account. What the "identity thief" has done is to fool the bank's authentication system into thinking their transactions were authorized by you. You do have some control over whether this happens, by your choice of password, choice of when to type it in, etc. But the decisions with the greatest affect on the security of that authentication system are completely in the bank's hands: e.g. the decision to authenticate you by asking you to enter a password into a form on a web page.
The decision to make banks responsible for losses isn't because of a preference for consumers over banks--as you point out, expenses may be passed on to customers either way--it's because the best way to make the banking system more secure is to make sure that the entities with the most power to fix the system are the ones that see the incentives to fix it.
This is the same reason we limit consumer's liability for credit card losses--it's the credit card company that's in the best position to detect and prevent fraud, and if we pass on the cost to them then we enable them to weigh the costs of fraud against the costs of improved security infrastructure, something that's impossible for an individual consumer to do.
Re:And where will the money come from? (Score:3, Insightful)
That's exactly right. "Identity theft" is a very misleading label -- what we're talking about is good old-fashioned fraudulent transactions. The implementation is different, and facilitated by technology -- especially stupidly-used technology -- but the crime isn't that different in essence from a forged check.
In that light, we should remember that the bank is 100 perce
Re:And where will the money come from? (Score:2)
Or better yet - the decision to authenticate purchasers by having merchants ask users for a 16-digit number which is transmitted in the clear to the merchant and later relayed to the bank. Credit card numbers are a system that should have abandoned ages ago. Imagine an email system wher
Re:And where will the money come from? (Score:2)
I would have thought so too, but the credit card companies (ast least in the US) seem to have been happy enough just paying the price of fraud for a long time now....
Also
Re:And where will the money come from? (Score:2)
Re:And where will the money come from? (Score:2)
And this is because the credit card companies make money coming and going. They make vast sums from merchants, by charging a few percent of the purchase price when you buy something. That's how some card companies can give you 1% back on purchases -- if they're skimming 3% off the top, and returning 1% to you, they're still skimming 2%. Fraud is just a cost of doing business to them, and as the
Re:And where will the money come from? (Score:2)
Sure. But that doesn't prevent them from wanting to make even more money if they could.
So if they could save X in fraud by spending Y<X on security infrastructure, you'd think they would. Beats me.
Re:And where will the money come from? (Score:2)
Re:And where will the money come from? (Score:2)
The "free market" solution to this is a bunch of people getting together for a class action against the banks. Prove that letting people fraudently take your money and open accounts in your name with lax security is negligent, then hold them responsible for the actual loss, the secondary losses (the trouble with the cr
No big deal (Score:5, Interesting)
There's 50% of it right there.
I'm not trolling here, I have a question:
Does using Windows constitute being careless? How about using unpatched Windows? How about using Windows without malware scanners installed?
Re:No big deal (Score:2)
No.
Yes.
No.
Re:No big deal (Score:1)
I don't think a bank will hold you responsible for a hardware keylogger on the back of the computer you're working on etc.
But I am thinking more along the lines of giving passwords out in phishing e-mails, writing your passwords down, putting your pin in permanent marker on the back of the card.
As for Windows? I doubt it.
Re:No big deal (Score:2)
Re:No big deal (Score:2)
But the line has to be drawn somewhere for personal sanity. Where the line is drawn legally is a different matter.
Anyone going online has to understand that they are exposing themselves to risk. Whether or not they think that risk is unacceptable is up to them. Taking steps to lessen that risk is up to them.
Re:No big deal (Score:2)
I think you do not understand the words in use. The question was about "careless" and you answered with "risk". You can engage in a low-risk activity, like walking, and do it carelessly. You can engage in a higer risk activity, like skydiving, and not do it carelessly. You are presuming all high-risk activitie
Re:No big deal (Score:2)
Carelessness would be not understanding that there are risks involved.
Negligence would be when you are aware of risk, and choose not to take action to reduce it to an acceptable level.
Re:No big deal (Score:2)
So, if someone was told "don't write down your password, and use something at least 8 characters long, using letters, numbers, and special characters" and they followed that advice without knowing why, they are careless because they don't understand the risk, but someone that happened to pick the exact same password, knowing the risks, wouldn't be careless? I've never heard of the definition of "careless" being based solely on one's un
Schneier likes it (Score:5, Informative)
Better than the Secret Service's crap here... (Score:5, Interesting)
Kudos to to Korea having the balls to blame the people leaving the doors to security breaches WIDE open.
Re:Better than the Secret Service's crap here... (Score:2)
Re:Better than the Secret Service's crap here... (Score:1)
That's the dumbest thing I've read all week. (Score:2)
There could be meritous arguments to both of the sides here, but yours isn't one of them.
This is much closer to forcing Ford to give you a new car because you handed the keys to your car to someone with the promise of a better car in return. Absolutist inanity like "they should protect their customers" is absurd. The best way to protect customers from fraud involving online banking would be to stop online banking. This is clearly not acceptible, so a more reasonable
Re:That's the dumbest thing I've read all week. (Score:2)
Personally, I'm not a fan of making it the responsibility of the smart to defend the stupid from themselves, but some of these things are things even smart people can't defend against, like stupid webdesigners. (Not an isolated issue. Look at www.wamu.com, www.bankofamerica.com, www.chase.com, the main pages are not encrypted but they h
That's not what I said. (Score:2)
I said that the customers "should, at least, bear some responsibility for their actions."
Customers who sign on for password-based services should be apprised of the risks involved in divulging information pertaining to their accounts. If that information is provided to others when they merely ask for it, how is the bank to keep the customer prote
You have to make it hurt (Score:5, Insightful)
This action obviously will not stem identity theft but the hope is that this will push banks into security improvements that will make identity theft much harder.
I agree. I was listening to Clark Howard [clarkhoward.com] a couple of weeks ago on the radio and he was talking about how 99.9% of US banks have atrocious security when it comes to online banking. I know that identity theft also happens offline, but I also think that you have to criminalize grossly negligent behavior, or else you end up with a situation like what we have today: banks see it as more fiscally reasonable to absorb the cost of the problem than to even attempt to fix it. The problem is that this has tragic consequences for the individuals that are victimized. Hopefully the US congress will jump on board and start dealing with serious problems, instead of concerning themselves with things like college sports [go.com] and drug testing among athletes [govtrack.us], which ultimately shouldn't be of importance to the federal government.
There's little hope as long as DNS is broken (Score:3, Interesting)
Because DNS is broken, even if the banks beef up their stuff, there's no hope for secure transactions.
E.g. suppose you need a pasword and a one-use number (from a list of magic numbers the bank gives you) to do a transfer. [this is how it is in some parts of Europe]. The bad boys do the transfer, but they transfer the money to themselves, not your payee. And they take as much as they want. And they use the magic number you've given them for your intended transaction.
So because of this potential problem, I don't do online banking.
I figure the average schmuck doesn't have a chance anyway; he's using the same OS and software as 99% of the victims, so he's an easy target.
Thats what SSL ceriticates are for (Score:4, Informative)
Sometimes, there are legitimate reasons for this (such as a bank moving servers and not having time to get a new cert), but they are usually very temporary, so to be safe you can just not do any banking during that period.
Sure, you can still bypass this via a man in the middle attack using ARP poisioning - but in order to do that the hacker has to be on your local subnet if you have a home router, or else working at your ISP if you are directly connected.
Either case is highly unlikely, and **any** way you look at it, even if your original DNS thing was an actual issue, online banking is much more secure thank banking at an ATM or via debit payment, and I bet you do that every day.
All I need to steal your money at an ATM is to install a hidden swipe reader inside the ATM/debit machine and a hidden camera to capture your PIN number. This happens *all the time*, far more than publicized. It is very easy to do, and a smart crook who just leaves the setup installed for a few hours then takes it down is rarely caught either
Even easier is to just capture the cazd swipe, us eit to make a fake identical copy of your own card, and going into the bank and convince the teller to let you change the PIN on the card cause "you forgot it". Also simple to do. Much simpler than hacking itno the DNS servers of your ISP, that's for sure.
Re:Thats what SSL ceriticates are for (Score:3, Informative)
Re:Thats what SSL ceriticates are for (Score:2)
1. Inform the customers in advance of server move.
2. Shut down the banking website to ALL customers until that cert is up.
No fucking around.
Re:Thats what SSL ceriticates are for (Score:2)
The fact that you needed to point this out means that, for the vast majority of users, it will not raise a big red flag.
Re:There's little hope as long as DNS is broken (Score:2)
Re:There's little hope as long as DNS is broken (Score:2)
The bank would give you a little thing thats like a calculator.
When you do a funds transfer, the bank outputs a random number.
You then input the number along with the amount being transfered into the calculator which makes a hash of them and a secret number stored in the device.
This number is input back into the bank system before the transaction goes through. If the hash computed by the bank doesnt match what the user entered, no transfer would take place.
Unless the hacker can c
As opposed to the US (Score:2)
Furthermore they often use your Social Security Number as the user id.
Online banking security in the USA is disgraceful, but no-one seems to hold the banks to task for it.
I hope this serves as an example (Score:2)
People would be much better served to get advertisements via mail directing them to a secure website for credit-card sign up instead of the usual forms that get people into trouble. The blank checks that credit card companies send are just asking for trouble and should be illegal when not requested by the customer.
My mail-carrier can't see to well and my mail is often delivered to others in my apartment building. I usually get my mail back one way
Banks will require Trusted Computing (Score:3, Interesting)
MOD PARENT DOWN (Score:1)
But will the BANK choose to trust Linux? (Score:2)
He doesn't seem to realize that Linux has a Trusted Computing effort
But then you still depend on your bank to provide a "trusted" build of its software for Linux. Most banks won't think it's worth the money to pay developers.
Re:Banks will require Trusted Computing (Score:1)
Re:Banks will require Trusted Computing (Score:2, Informative)
I see a weakness (Score:3, Insightful)
2) Have your pal steal your identity and the money
3) Bank recompenses you
4) Split PROFIT!!!!!
Economic Incentives (Score:2, Interesting)
Bruce Schneier (Score:3, Informative)
Banks (Score:1)
Re:Banks (Score:1)
What about those who have open relays? (Score:1)
If they (victims) were granted pennies on the dollar for what spammers have made by utilizing Korean open relays, there'd be a lot of rich people floating about. If the Koreans (of any institution) were charged an open relay fee, they might be a bit more motivated to fix the problem. In fact, the Koreans might think twice before leaving all of those relays ready to be raped.
Obligatory (Score:1)
In Korea, only old people have their bank account information stolen.
(And in real life old people are frequently the target of scams, because they have money and tend to be easier to fool)
The next wave will be Pharming (Score:2)
http://www.wired.com/news/print/0,1294,66853,00.h
English lesson? (Score:2, Interesting)
This action obviously will not stem identity theft but the hope is that this will push banks into security improvements that will make identity theft much harder.
If you make "identity theft much harder", then obviously you will stem it. "Stem" does not mean stop, it means to "make headway against".
Re:English lesson? (Score:2)
I think they meant to say 'prune' identity theft, as to cut the stem off completely.
Too bad they don't do this by themselves... (Score:1)
Too often I read of someone getting their identity stolen or having their account run up, and the bank will reverse the transactions, issue a new card, and take no furthur action at all. Contacting the police also seems to result in no action, as they don't have the time, equipment, or mandate to follow up possibly tricky international schemes.
I'd bank with an institutio
It's about time. (Score:3, Insightful)
Admittedly they'll never get around keystroke loggers or other such malware, but this is a good first step. Prevent what the users are able to do with a system we know is fundamentally insecure. Require various forms of authentication for requests that involve actually transferring money, at least one of which should be offline. Do not reveal information the user should already know (Credit Card numbers in full, user's SSN [or whatever the Korean equivalent is]).
It's really not that hard, it just requires feature-happy developers to stop for a second and ask themselves "but what if someone other than the user were logged in..."
Re:It's about time. (Score:2)
Re:It's about time. (Score:2)
Finally... (Score:3, Interesting)
Mine was swiped too, and I didn't even find out about it for about three months (had some overdrafts). Turns out this kid subscribed to some porn site that was pulling 60 bucks a month! I wasn't pleased.
I went into the bank and all they told me was they could put the funds under investigation and it would take up to 90 days to take care of. During that time I wouldn't have my money and that it wasn't likely that anything would happen. I called the companies customer service and argued the charges for about half an hour. They said they could cancel. I threatened legal action. They said it wouldn't work. I said I could prove that I never signed up for thier services, or used them because I log my IPs, and informed them it was THEIR resposability to verify ID, not mine. This is what did it. Charges refunded, overdrafts paid (and the bank refunded them too, got 60 bucks out of the deal).
Lately companies have been working harder at verifying ID, but they're also more adamant about not taking responsibility. Rather than the bank having responsability, I think, legally, if you can prove that it wasn't you, the store should be responsible.
Re:Finally... (Score:2)
The bank you dealt with was following Reg E and was doing what was proper. If you didn't find out for 90 days from the first such item, you might have even been out that first amount because you didn't report it back to the bank soon enough.
It is your responsibility as the customer to review your statement and make sure that there is no fraudulent or unauth
Re:Finally... (Score:3, Interesting)
This is why I won't have anything to do with a Visa/MC "debit" card attached to my bank account. All the banks "promise" that they will refund your money right away, yadda yadda, but the bottom line is YOU have to wait for THEM to give you YOUR MONEY back.
With a credit card, t
That's all well and good... (Score:4, Funny)
Schneier Agrees (Score:2)
http://www.schneier.com/blog/archives/2005/12/kore a_solves_th.html [schneier.com]
At the end of the day, the bank is entrusted with managing my funds. If my bank transfers my funds to someone else without my express approval, then the bank is at fault, no questions asked. The bank should have properly verified that I indeed wanted my funds to be released to the other party. If someone claims to b
Re:Schneier Agrees (Score:2)
Others Responsible (Score:3, Insightful)
The Banks (Score:2)
Holding software/service companies responsible. (Score:4, Interesting)
Imagine if you owned a ski resort operation and you just dropped twenty mil on a souped-up chair lift. As the lift company advised, you hired people to go regular examinations and keep it lubed up. Then one day the stress of a chair switching from the slow loading track to the high-speed main line caused the cable to snap, killing dozens of people, including lots of pregnant women carrying pandas. Checking the line integrity was not on the company-issued checklists of the maintainers you hired but the chair lift company said they'll have a look at it every six months to run stress tests themselves and they found a problem that seemed small enough not to bother fixing. The chairlift company, hopefully insured, ought to be the ones exposed to liability, and this Korean bank incident should be no different. The software company (assuming it's not Debian (in which case this wouldn't have happened anyway)) should be the ones absorbing the heat. That may not be the law, but it strikes me as common sense.
Re:Holding software/service companies responsible. (Score:2)
My problem is that I understand that there are solutions. Whereas with the chair lift you could add an anti-sway system, you could give bank customers an RSA key, smart card or similar. But it means users who know better than to click a link from OE will have to pay this 'Outlook Express tax' now.
In Korea (Score:2)
good for them (Score:2)
$50 x 100,000 records lost = big slap on the corporate hands.
Also in Denmark (Score:3, Insightful)
Why would it be any different? If the bank lets someone else withdraw your money over the net, I don't care how the hacker got the information, it is the bank that lets the wrong guy walk away with my cash.
Why not just... (Score:2, Interesting)
Because we get a seperate card when you sign up for online banking that has 36 unique 6 digit numbers each a seperate password per-say.
When you login, your username is another 6 digit number that you are given (but which is perminant) then you have to enter your password (which you are forced to change every month). Then if
insurance? (Score:4, Interesting)
This is how it already works in Denmark (Score:3, Interesting)
If somebody uses your card number on the internet, and the person who withdraw from your account does/can not document that it was done with your consent, you get the money refunded. So if somebody steals your credit card number and withdraws money with it, you get your money back from the bank.
A merchant may first withdraw the amount from your account when the object is shipped.
Re:Other governments too busy invading our privacy (Score:3, Interesting)
Re:Other governments too busy invading our privacy (Score:2)
Major parsing difficulties today. I read:
'... it's the same as if you have a 100 grand bar in your pocket and you walk into a pool'
And I thought, what does a wet candy bar have to do with phishing victims?