ADP Experiences Security Breach 53
wiredmikey writes "HR and Payroll outsourcing giant Automatic Data Processing, Inc. (ADP) experienced a system intrusion, the company announced Wednesday. ADP said it was investigating and taking measures to address the impact of a system intrusion that occurred with a client at Workscape, a benefits administration provider that ADP acquired in August 2010. ADP has also been actively cooperating with law enforcement to determine the cause of this incident and to assist authorities in identifying and apprehending those responsible. ADP added the following in a statement: 'Because this incident is the subject of an ongoing law enforcement investigation, ADP cannot disclose any additional details at this time. ADP will provide further updates once information that can be made public becomes available, and we will continue to communicate with all affected parties as appropriate.'"
Maybe we need to whitelist? (Score:2)
It almost seems like it would be easier to maintain a list of which major payment systems haven't been breached (that we know of). Seriously, if this was as wide open as Citibank and Sony, then we have to assume that just about everybody will be this easy to pwn.
Re: (Score:3, Insightful)
Re: (Score:2)
>> most of the companies still on the whitelist would just become targets
Good. Then staying on the white list will be ever more valuable.
Re: (Score:1)
Re: (Score:1)
Sooooo, by your analogy --> you work payroll for a company? Must be a grizzled old miner company. dagnabit.
Re: (Score:1)
Not exactly ADP (Score:5, Informative)
The article makes grand mention of ADP, but the the affected systems are far less significant than if it were ADP itself. I don't know what ADP's services are like now, but I recall a time when my accounting people required MSIE and ActiveX controls to access ADP's services. That alone made me worry extensively about ADP's notion of security. But reading the article, I see that it's something else entirely.
The compromise was at Workscape which I imagine had not integrated its network with ADPs larger network. The organization appears not to have much to do with payroll or money services at all.
Re: (Score:2)
Re: (Score:1)
Re: (Score:3)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Yeah, I understand that, but we were using ADP's payroll system (and T&A), not our own, or some other 3rd party solution. You would think that it would be pretty straightforward since it's all involving ADP's own products. At one point our "Implementation Specialist" realized that not only had they forgot to implement
Re: (Score:1)
...everything short of a complete disaster with people's PTO and Vacation accruals getting screwed up...
We switched to ADP a little over a year ago. They've still not gotten the PTO problems worked out, and if I want to know how much I have, I have to contact HR and have them manually go through and work it out by hand.
Sad to say, I actually sometimes miss the old way of filling out an Excel sheet for my time card...it was painful and awful, but at least it worked.
Re: (Score:2)
I recall a time when my accounting people required MSIE and ActiveX controls to access ADP's services
My company uses it and it still does. I hate it so much. Having to open up IE to log in and use it is like casting a spell to open a portal into Satan's asshole.
Re: (Score:2)
Wow... yet another goatse.cx troll... it was wasn't it? The description certainly reminded me of it.
Re: (Score:2)
It's a closed system so MSIE and Active X doesn't matter. The troubling part is the RSA tokens that were hacked.
The client access is a 3 tier login.
Re: (Score:2, Interesting)
I have fairly extensive knowledge of the ADP product set, hence my use of the coward..
The platform you are talking about is actually ADP Freedom, a somewhat ambitious product developed in the US and now only used by the UK arm. A certificate is required for all admin accounts, same with the ActiveX components. The biggest single issue is that the Activex controls have to be installed directly from a dedicated site, there was no MSI package available, although I believe this is being considered. As such each
Re: (Score:1)
Having worked at a financial institution I can say that you might be surprised to see how loosely some connections to vendors can be, much less partners or acquisitions. As much as I like to hope that ADP raises the bar, I've seen some rather terrifying things in the past in the way systems can be interconnected.
RSA, BofA, Citi, Lockheed, now ADP... it's getting really scary out there. I'm rapidly losing any faith in the security of my information, whether they actively or passively have my consent to sto
Why investigate? (Score:2)
Re: (Score:2)
Anonymous is sooooo last month!
It's clearly LulzSec!
So much hacking news (Score:2)
How many millions will be handed over to contractors and any foreign entity with a security clearance to fix a secret wireless communications channel with remote secure control to any device that speaks "internet"?
Some 'admin' having a bad script kiddies day with Microsoft again, triggers a state/
Re: (Score:2)
Re: (Score:2)
A DoS isn't a bad thing compared to getting silently intruded. And DoS
Perhaps more of it's finally being disclosed (Score:1)
Properly and on time, instead of being hidden, to defend share price?
Ever think of that??
E.G.-> SONY took a 4% drop in stock when they were hacked/cracked for example.
That said? It's NO SECRET that many companies try to "hide it" (while their boards of directors ditch shares like mad before the news hits and people lose faith in them due to security breaches).
However, lately??
It seems that trend has reversed itself and we're seeing what is occuring in a timely fashion.
(That's a good thing for end users o
Mr. AC offtopic troll's HOSTS file blunders list (Score:1)
After all - It's not the 1st time you've tried to troll me on HOSTS files either...
In fact, here are 2 of your "classic technical blunders" in fact, Mr. AC troll, in regards to HOSTS files usage:
---
E.G. #1 - LARGE HOSTS FILES BEING CACHED BY THE LOCAL KERNEL-MODE DISKCACHING SUBSYSTEM (recently here no less, you screwed up THERE, hugely):
http://it.slashdot.org/comments.pl?sid=2220314&cid=36379004 [slashdot.org]
E.G. #2 - HOSTS ON ANDROID PHONES (yes, they work there):
http://apple.slashdot.org/comments.pl?sid=2204000 [slashdot.org]
Re: (Score:1)
I see why you picked your user name. ... I wish I could say your wrong, and you probably are on this particular instance, but eventually it will be the new enemy: digital terrorist (just like the predecessors: Communists, War on Drugs, etc.). Then it is a brave new world indeed.
Re: (Score:2)
Wow, the tinfoil hat brigade is out in force on this one.
Re: (Score:2)
This really stinks of some 3 letter acronym organization wanting to destabilize the infrastructure. CIA, NSA, PRC, PLA, NWO?
Why is it that so many people on /. automatically assume, without any evidence presenting itself, that anything bad is the act of some government conspiracy? Yeah, it could have been the government, but that is just one of many plausible answers. In most of the cases that aren't due to the cybervandals like Anonymous and Lulzsec, the much more likely culprit are professional criminal cracking organizations, who can make a lot of money on the data they can extract from large organizations that have huge st
Re: (Score:2)
Hey hacker... (Score:1)
Just add a couple extra non-zero digits to the left side of the dollar column in my paycheck this week. I'll split it with you.
It's funny.... (Score:1)
I was complaining to the HR person at my previous company that the password policy of ADP is so terrible that it encourages extremely bad behaviour with password management (really really draconian password requirements that you basically end-up having to use a random password generator). I said that it's not great security wise & the response was that "This is a huge company that a lot of people use & I'm sure they know what they're doing better than you". At that point I gave up on continuing th