thewayne: (Cyranose)
[personal profile] thewayne
Apparently a number of Goodwill stores all had their credit card processing done by one company, and that was the infiltration point. The vendor claims that only 25 cards have been used fraudulently since the compromise, a number that I'm frankly dubious of. But there are a couple of things to remember, and that is that Goodwill purchasers are not always high-value people, so it's quite possible that when word got out at how low of credit limit the cards typically were, they just gave up on the batch. Still, I find the number dubious.

The article points out a very big hole in the reporting laws of lots of states, this is a very good explanation of the problem. To quote from the Krebs article:

The magnetic stripe on a credit or debit card contains several areas, or “tracks,” where cardholder information is stored: “Track 1″ includes the cardholder’s name, account number and other data. “Track 2,” contains the cardholder’s account, encrypted PIN and other information, but it does not include the account holder’s name.cconsulting.com

Most U.S. states have data breach laws requiring businesses that experience a breach involving the personal and financial information of their citizens to notify those individuals in a timely fashion. However, few of those notification requirements are triggered unless the data that is lost or stolen includes the consumer’s name (see my reporting on the 2012 breach at Global Payments, e.g.).

This is important because a great many of the underground stores that sell stolen credit and debit data only sell Track 2 data. Translation: If the thieves are only stealing Track 2 data, a breached business may not have an obligation under existing state data breach disclosure laws to notify consumers about a security incident that resulted in the theft of their card data.


And in the case of the Goodwill breech, only track 2 info was being sold.

http://krebsonsecurity.com/2014/09/breach-at-goodwill-vendor-lasted-18-months/

Date: 2014-09-22 05:08 pm (UTC)
silveradept: A kodama with a trombone. The trombone is playing music, even though it is held in a rest position (Default)
From: [personal profile] silveradept
That's... curse-worthy. I would have thought all security breaches required that kind of reporting, but apparently not?

Date: 2014-09-27 10:49 pm (UTC)
From: [identity profile] thewayne.livejournal.com
Apparently not. Kinda sad that it wasn't enough that your banking info being compromised wasn't a sufficient trigger to force a notification, but they also had to have your name. Well, you don't have to have a name to use a forged card.

I think this is a thing that needs to be forced at the US Congress level, that notification be required regardless of which track is compromised.

Date: 2014-09-28 11:50 pm (UTC)
silveradept: A kodama with a trombone. The trombone is playing music, even though it is held in a rest position (Default)
From: [personal profile] silveradept
I agree. And the liability for fraud needs to default to the issuer of the card, not the consumer to dispute it. Perhaps some penalties as well.

Date: 2014-09-27 09:49 pm (UTC)
From: [identity profile] porsupah.livejournal.com
It's geekily quite fascinating to look at the laws and economic systems prevailing, and then see how that shapes the crimes that exploit those systems' weaknesses. In a way, it's all a matter of security - not just on the devices, but carefully crafting legislation to behave in a reasonably appropriate manner. And neither, needless to say, are ever as straightforward as the headline mongers would have people believe.

(Echoing back to my last entry's note about how "chip & pin" was absent in the US and Canada, but rolled out everywhere else, on the basis that transactions tended to be batched in much of the world, so the higher level of security was more profitable)

Regardless, that length of notification's ridiculous. Those involved in the exploit's concealment should be ashamed. (Not to mention the perpetrators)

Date: 2014-09-27 10:47 pm (UTC)
From: [identity profile] thewayne.livejournal.com
One interesting thing going on that really intrigues me: Russia, because Putin is not very happy with the USA et al for his adventurism in Ukraine, says he's creating his own internet. And most of the credit card fraud crime is originating from Russia and its former satellites. I would SO LOVE to see those criminals turn their attention against Russia.

It won't happen, but a man can dream.

From what I've read on Kreb's site, C&P won't eliminate fraud, but it'll severely curtail it. Obviously end-to-end encryption won't solve it as the Target malware got in to the POS system at the card reader level, before encryption would kick in. C&P should eliminate 'card present' transactions, but I don't know if it'll do anything against internet purchase fraud. Well, we'll have it mostly everywhere over here in about a year, so we'll see what happens.

June 2025

S M T W T F S
123456 7
8910 11121314
15 1617 18 1920 21
22232425262728
2930     

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Jun. 23rd, 2025 11:40 am
Powered by Dreamwidth Studios