thewayne: (Default)
Last month, Amazon lost control of 256 IP addresses for three hours due to BGP security flaws. This enabled cybercrooks to take over credentialing authentication and steal $234,000 in cryptocurrency from an exchange called Celer Bridge. 32 accounts were victimized.

https://arstechnica.com/information-technology/2022/09/how-3-hours-of-inaction-from-amazon-cost-cryptocurrency-holders-235000/


In the UK, three men were arrested after a community resident reported suspicious activity. Found in their car was a fake police uniform, an imitation firearm, a real taser and baseball bat. Their intent: "...pay a surprise visit to a 19-year-old hacker known by the handles “Discoli,” “Disco Dog,” and “Chinese.” In December 2020, Discoli took credit for hacking and leaking the user database for OGUsers, a forum overrun with people looking to buy, sell and trade access to compromised social media accounts."

Discoli happened to be not at home, and the thugs were so obvious about not being police that they fled and got the real police notified.

Impersonating police and that fake firearm is really going to ratchet up the sentencing.

https://krebsonsecurity.com/2022/09/botched-crypto-mugging-lands-three-u-k-men-in-jail/


"A Florida teenager who served as a lackey for a cybercriminal group that specializes in cryptocurrency thefts was beaten and kidnapped last week by a rival cybercrime gang. The teen’s captives held guns to his head while forcing him to record a video message pleading with his crew to fork over a $200,000 ransom in exchange for his life. The youth is now reportedly cooperating with U.S. federal investigators, who are responding to an alarming number of reports of physical violence tied to certain online crime communities."

Kidnapped, beaten, and forced to record a video begging for $200,000 with two pistols pressed against his head. Florida.

https://krebsonsecurity.com/2022/09/sim-swapper-abducted-beaten-held-for-200k-ransom/
thewayne: (Default)
Good ol' Brian Krebs. In New York City, NCR and an unnamed financial institution have uncovered the latest generation in card skimmers. A card skimmer is a custom-made device that credit card thieves insert into AMERICAN ATMs (this is almost 100% an American problem because we won't get rid of the stupid magnetic strip and go to entirely chip-based cards) that has a strip reader and is inserted into the card reading slot of the ATM, so that when you insert your card into the machine, it captures the data on your bank card. A very cleverly-disguised card then captures your PIN that you almost never cover when you enter it. It's all stored in memory, then the thieves come by later with a Bluetooth transceiver, beam a code to the device, and it spews all the captured data back to them and clears itself.

These have been around for years and are most commonly found at stand-alone ATMs and at gas pumps. So what is new about this?

IT IS 0.68 MILLIMETERS THICK!

That is some pretty impressive engineering and manufacturing to make a skimmer that thin! To give you a comparison, your bank card is approximately 0.54mm thick.

NCR has some countermeasures to improve detection of these skimmers, but the best thing as always is to simply cover your hand when entering your PIN.

https://krebsonsecurity.com/2022/09/say-hello-to-crazy-thin-deep-insert-atm-skimmers/
thewayne: (Default)
What I really hate is the inconvenience for you and me. We have to worry - 'Hey, I ate at that place six months ago!' We have to compulsively check out accounts, we have to decide whether or not to do the credit monitoring (major PITB, especially if your credit history is damaged with incorrect information like mine), we have to go through the hassle of getting our cards cancelled and not being usable until replacements arrive.

The banks really don't care as long as the cash flows. THREE MILLION CREDIT CARDS. One of the security companies brought in to investigate and mitigate the situation said "I never thought in 2005 (or maybe he said 2015) that in 2020 I'd still be seeing magnetic stripe compromises."

But hey - we're the USA! WE'RE NUMBER ONE! In stolen credit cards.

There was nothing preventing these machines from being replaced when we had a booming economy, except MasterCard and Visa didn't push for it. Because? The gasoline retail industry didn't want to have to pay to upgrade all of those gas pumps.

THREE MILLION CREDIT CARDS.

I don't bother to post about a lot of credit card thefts because it just happens so damn often. It's only when there's several million cards or someone outrageously famous that gets clobbered. And now MC/V won't push for replacement terminals - or just fund it themselves - because the economy is going to be in the toilet for several more years to come and merchants won't be able to afford it. Which means there will be more of these thefts in the next 5-10 years.


I've had my banking information compromised precisely ONCE. And it wasn't by one of these credit card thefts. It was 10-11 years ago, I was in Phoenix for a couple of days before going to Las Vegas for a convention, I was checking my bank balance and found a charge for a gas station in one of the Carolinas for $85. I hadn't been there in something like 5 years, it was definitely hinky. Called the bank, they confirmed it was fraud and turned off my debit card.

But it wasn't a card or card processor that got hacked. It was a check processing facility that somehow got ahold of my account information. I have no idea how that happened.

My wife and I have had numerous card replacements, but have never had a dime misplaced. Several friends have been victimized, one lost money from the Target hack before it became public!

It's just so bloody frustrating. It could have been put to an end years ago, but Visa and Mastercard didn't do it. And it's just going to go on and on and on.


Oh, speaking of data breaches: you heard Barnes and Noble got clobbered, didn't you? Someone got in and made off with a bunch of info. "But no customer credit card information was stolen." Yeah, we'll see if that statement rings true in another month or so.


Sorry, I'm just in a bit of a pissy mood. Multiple government administrations have not made the industry fix things. The industry hasn't fixed things. So nothing gets fixed. And it will continue this way while the rest of the world looks on in wonder at yet another weird thing that Americans do.
thewayne: (Default)
First, the bad: the Wawa theft lasted nine months and looks like it netted 30 million+ cards. I'm not sure why they say "nationwide" when I've been all over the country and never seen one, unless they operate under different names in different places, but apparently they operate in 40+ states. Anyway, this looks like a central hack, maybe they got in to central IT and used remote access tools to push their software out to all terminals and gas pumps.

The net result is a lot of compromised cards. All of which are for sale on carder forums.

The big problem here is that the USA is the last of the G20 nations to really push to chip-based credit cards and to get rid of magnetic stripes as this makes it hella tougher to steal card information as it creates end-to-end encryption. It's child's play to steal magnetic strips, I complain every time I have to swipe my card at a merchant. On top of that, Visa is pushing back on chips, but there's a deadline of October of this year for gas station merchants to upgrade their pumps for chip readers. I think most of the pumps in my area have been upgraded to also have wireless contact for those credit cards that have it or for Google/Apple Pay devices.

Now here's an interesting and actually good bit of news: even if 30+ mil cards were stolen, previous evidence would suggest that the numbers used in fraud are pretty low. The monster Target breach in 2013? Over 40 million cards were stolen, but only 3 mil used in fraud.

https://krebsonsecurity.com/2020/01/wawa-breach-may-have-compromised-more-than-30-million-payment-cards/


The good news: major Russian cybercrime boss made a classic mistake: DO NOT EFFING LEAVE RUSSIA! He went to Israel in 2015, Israel arrested him, Israel handed him over to the United States.

This guy, Aleksei Burkov, ran a very exclusive crime forum. To join it, you had to be recommended by other members. Then you had to pay a fee to join. You had to be fluent in Russian. AND you had to have a security certificate installed on your computer before the web page would load! That's some pretty good operational security. He was described as an important asset to the Russian government.

But then he got stupid and he traveled to a country not controlled by Russia, and he got nabbed. He plead guilty in a Virginia Federal court to running a carder forum and selling more than 150,000 stolen credit cards, he has not yet been sentenced.

Russia retaliated and an Israeli woman traveling from India, had a layover in Russia, Russian authorities "discovered" 10 grams of marijuana in her luggage which she had no access to during the layover, and arrested her. Naama Issachar had been attending a yoga course and had not sought to enter Russia, it's just how the plane was routed. No telling what her fate may be.

https://krebsonsecurity.com/2020/01/russian-cybercrime-boss-burkov-pleads-guilty/
thewayne: (Default)
And Disney+ is not yet a week old.

In many cases, the account compromises happened because people frequently re-use passwords, so all the criminals needed to do was to take one of the well-known password dumps and test it against Disney+ until it hit, then change the password and lock the true owner out of the system.

But there are documented cases of people using unique passwords who are getting their accounts taken away by these thieves.

So the question is: has Disney's system already been hacked? There's also the possibility that a number of people have their computers infected with malware such as keyloggers and their accounts were compromised through that vector.

Here's a simple rule to follow: any web site or service that has your credit card or banking information SHOULD HAVE A UNIQUE AND STRONG PASSWORD. Re-using passwords is fine - I do it all the time - for sites that have zero monetary value. But if my banking information is tied to a site, it has a strong and unique password associated to it.

https://www.zdnet.com/article/thousands-of-hacked-disney-accounts-are-already-for-sale-on-hacking-forums/
thewayne: (Default)
Classic spam:

"We have recently detected that different device user a attempted gaining access to your Online account linked with your email, and multiple password was attempted with your user ID.
It is now necessary to re-confirm your account information to us.

If this process is not completed within 24-48 hours. We will be forced to suspend your Account Online Access as it may have been used for fraudulent purposes.

Please Sign in to visit and update profile immediately www.bankofamerica.com.

Please remember to review your statement to see transactions, payments, and other important account information and disclosures.

Thank you for being a Bank of America customer.
You received thik email as part of your existing relatienship with us."


We've got classic bad spelling and English grammar usage, indicating country of origin being non-native English speakers.

And the big tell? The email domain it came from: Hotynews.com. They didn't even try to disguise the domain!

But there's something else hidden in this message that you can't see because I cut them out: at the end of paragraphs are the phrases "SHOP NOW", "SOLD 50% OFF" and "Buy now"! They set the text to white text on white background, so they're invisible, and presumably links to shopping sites somewhere, but I can't be bothered to activate the message or look at the HTML code behind it.

So not only are they trying to steal your account credentials, they're trying to get you to buy crappy merchandise!

My wife pointed out that even with these obvious tells, they're still going to net a few accounts from incautious people, which is kind of tragic.
thewayne: (Default)
It is indeed a doozy, perhaps the largest data privacy leak in history. Equifax has been collecting information on people for decades, and they do it without our express permission. But at the same time, they are used for credit scores and to generate bank decisions for our getting loans and such. Yet I never signed a contract with Equifax allowing them to collect information on me.

And they have, through zero fault of my own, personally screwed me over.

A couple of years ago my wife and I decided to shop car insurance. Our current insurer was doing some corporate shenanigans that we didn't care for, and it should have been possible to shave some bucks off our premiums, and it never hurts to shop. I called the car club AAA, we ran through my information, and they told me that they couldn't take me because I had three accidents on my record. I'm accident-free. Equifax had taken three accidents OF MY FATHER, whose name is Andrew Donald, and put them on my record, where my name is Donald Wayne. We lived at the same address some years back, but I was living in New Mexico at the time of the accidents and have never owned a Buick. As it happens, we were born in the same month, but not on the day and clearly not in the same year. No two digits in our birth date or year are the same. There's no reason to conflate us and put the accidents on to my record, except for pure sloppy processes.

So I have a pretty poor opinion of these credit bureaus.

What happened to Equifax is pretty simple. They built their data framework on an open source software package called Apache Struts. Like virtually all software packages, bugs are found and patches are issued. A particularly big problem with Struts was first patched in March, but the intruders were in Equifax's system from mid-March through July - approx 2.5 months. Thus it is perfectly reasonable for Equifax to blame open source software for its breach. [sarcasm off] Struts is a framework for Java programs to run either on servers or web browsers, and after updating the framework you have to recompile literally hundreds of programs, and doing that would be a tremendous PITA, but it MUST be done, otherwise shit like this happens. Apparently some management at Equifax didn't like to pay overtime, and now they have to cope with a tremendous amount of shit.

In some late-breaking news from this afternoon, Equifax's Chief Information Officer and Chief Security Officer are both "retiring", proving that for once, shit started at the top. In "there is occasionally some justice, or perhaps there will be" news, the Federal Trade Commission is investigating the breech. It will be interesting to find out what they learn, assuming they ever issue a report. I wonder if Congress will hold public hearings. The breech is being compared by some news agencies to Enron. According to the Reuter's story, "Shares of Equifax fell 2.4 percent on Thursday and trading volume hit a record high. The shares have lost 32 percent since the company disclosed the hack on Sept. 7.

Senate Democratic leader Chuck Schumer compared Equifax to Enron, the U.S. energy company that filed for bankruptcy in 2001 after revelations of a widespread accounting fraud."


But you see, this is not just a problem for people in the USA. Equifax holds information for people in Canada and Mexico. And Argentine, and possibly other Latin American countries. And the BBC is reporting that 400,000 UKians have information that was compromised in the theft, but their information exposure was minimal and should not lead to identity theft. Well, we'll see about that! In Argentine, apparently Equifax's software used the highly-[in]secure account/password combination of admin/admin.

This is one of my favorite stories, and it may be behind a paywall since it's from the Wall Street Journal. Here's the Slashdot summary:

Equifax was lobbying lawmakers and federal agencies to ease up on regulation of credit-reporting companies in the months before its massive data breach. Equifax spent at least $500,000 on lobbying Congress and federal regulators in the first half of 2017, according to its congressional lobbying-disclosure reports. Among the issues on which it lobbied was limiting the legal liability of credit-reporting companies. That issue is the subject of a bill that a panel of the House Financial Services Committee, which oversees the industry, discussed the same day Equifax disclosed the cyberattack that exposed personal financial data of as many as 143 million Americans. Equifax has also lobbied Congress and regulatory agencies on issues around "data security and breach notification" and "cybersecurity threat information sharing," according to its lobbying disclosures. The amount Equifax spent in the first half of this year appears to be in line with previous spending. In 2016 and 2015, the company's reports show it spent $1.1 million and $1.02 million, respectively, on lobbying activities. While the company had broadly similar lobbying issues in those years, the liability matter was new in 2017.

The title of the story is "Equifax Lobbied for Easier Regulation Before Data Breach", it's by Michael Rapoport and AnnaMaria Andriotis. f you do a little searching, you might be able to find a copy.

Now, the breech itself is extremely bad. If you were compromised, and there's a very good chance that you were, then the information that was stolen includes: your full name, social security number, previous addresses, list of jobs, all sorts of amazing things. Information about you that never changes. Information about you that you use to apply for credit cards, loans, mortgages, JOBS. The best thing you can do is to approach all four credit bureaus and put a FREEZE, not monitor, but FREEZE your credit. That means that no credit can be taken out in your name without postal correspondence going back and forth with your house. No credit reports can be pulled. It's about the best that you can do. Brian Krebs has an excellent post that he has to pull out a few times every year to discuss this. Definitely worth a read. Me? I'm unemployed. Banks would have to be idiots to issue credit under my information, still, I plan on freezing my accounts.

But that's not the worst.

For reasons unknown, Equifax had credit card transaction information, 200,000 transactions worth dating back to last November, sitting on their servers, apparently unencrypted. Massive violation of PCI compliance rules.

And who knows, there may be more yet to come.

I won't bother providing links to the stories about your surrendering your right to sue if you signed up for their monitoring service, that's been rescinded. There were at least two class-action law suits in development, along with a couple of States Attorneys General beginning investigation.

One more thing to mention: an op ed piece by Bruce Schneier, a very well-known and respected expert on encryption and privacy. He has some facts wrong, I think he wasn't as well-versed on the scope of the breech as perhaps he should have been when he wrote it. But at the beginning of the piece he talks about how the public are not customers of Equifax, we are what is being sold, and we have no say in the matter. And there are THOUSANDS of data brokers out there that we can't come close to naming all of them.

Equifax's feet will be in the fire for some time, I imagine.
thewayne: (Default)
The only good thing to say is that it appears that they have done the sensible thing of isolating their corporate network from their payment terminal network. The penetration happened approximately six months ago but was just detected in January. They're in the process of investigating and cleaning up their act.

Target, when they were hacked a few years ago, had not separated their network. Testers were able to access 2,000 cash registers by compromising a digital scale at a deli counter.

The sad thing is that almost all initial infections that lead to these breaches can be avoided by one thing: do not give users administrator access to their computers! There is no good reason why they should, and if you have software that requires admin to run, then you need to hold the vendor's feet to the fire and force them to fix their bad code so it does not!

The other is for Microsoft to get off their butt and fix their stupid macro system! Macros hidden in Word document and Excel spreadsheets is how most of these infections get started. This article has an excellent example: email received by a hotel that says we have a dozen people arriving for a week and this document contains the specifications of the rooms that we need. No hotel is going to hesitate opening a document that promises booking a dozen rooms for multiple days. Apparently the scammers will go to the trouble of creating a web site to add verisimilitude so that the email doesn't arrive from a Gmail account. It all looks above board, so why not open the email?

https://krebsonsecurity.com/2017/03/payments-giant-verifone-investigating-breach/
thewayne: (Default)
Needless to say, it hasn't stopped while I haven't written about it.

The latest victims, and I mean corporations, are Arby's fast food (I hesitate to call them a restaurant) and Holiday Inn hotels. Arby's says the malware that stole credit cards was limited to their corporate stores, over a thousand locations of their 3,300 locations in the United States. Of course it's entirely possible that some of their franchisees have been compromised, especially if there are big corps with many locations that use a third-party credit card processing solution.

And it is a BIG breach. The president and CEO of the National Association of Federal Credit Unions is saying the number of cards is in the "hundreds of thousands". So that malware, since remediated, has been sitting there for a while. Arby's did not previously announce the hack at the request of the FBI while they were still investigating it.

Someone posted a comment/question asking if a specific location was compromised, I posted this reply:
Call them and ask them if they're a corporate store or a franchisee. If the former, then probably yes. I'm going to be doing that Monday with my semi-local store. Regardless, watch your bank account online for probe charges: a charge for $1-4 from cities and businesses that you don't do business in/with.

A friend of mine was hit by the Wendy's hack. He's on the road a lot and I told him about the probe charges. Sure enough, they appeared on his credit card. Fortunately when the serious charge appeared, he was in a town that had an office for his credit card and he was able to get a replacement sent there.

https://krebsonsecurity.com/2017/02/fast-food-chain-arbys-acknowledges-breach/


The Holiday Inn hack was very specific, it targeted just a few hotel restaurants and bars in high-profile and high-dollar areas in San Francisco, San Jose, Chicago, etc. The malware was present from August to December 2016. It was not found on the hotel's front desk systems.

https://krebsonsecurity.com/2017/02/intercontinental-confirms-breach-at-12-hotels/
thewayne: (Cyranose)
This one is slightly different. The thieves were more careful with how they're using the cards, and credit unions are being hit hard. One CU manager mentioned in the story said that they've gone through half their budget for credit fraud for the year -- IN JANUARY.

I have lunch at Wendy's once or twice a week, and I always use my debit card. I haven't seen any activity on my account since the information about the breech surfaced a month and a half ago, still, I should either start carrying more cash for lunch or use my credit card more. The credit card is still vulnerable to data breeches such as this, but American law gives you stronger protection and reduced liability for a credit card versus a debit card. The problem with going to cash for such transactions is that my bank doesn't have a branch or ATM down here, so I'd be getting nibbled by out of network fees.

http://krebsonsecurity.com/2016/03/credit-unions-feeling-pinch-in-wendys-breach/
thewayne: (Cyranose)
Back in June, many news sources reported that OPM got hacked and basically if you applied for a job with the Federal government in the last 20 years, your information was compromised.  Didn't matter if you were a park ranger or an office admin or what, you were compromised.  A more recent revelation is that fingerprint scans were also compromised.  Bruce Schneier has a recent post about this and the risk of trusting centralized, networked, databases with our information.

Now for a slight diversion.

Salon had a recent article about how a certain KGB agent was amazing at correctly identifying CIA agents in foreign countries.  He applied basic common sense and deduced certain patterns: CIA agents when they were undercover at an embassy always had offices in the secure part of the embassy, always took over the apartment that their predecessor had, did not attend certain functions, when they had meetings out of town they were almost always at night during certain hours.  But the most important tell of all is that their biographies had gaps.  A non-spy in the State Department had a complete and easily verified biography.  Spies did not, theirs had gaps.

Back to the OPM hack.

Two days ago, several news sources reported that the CIA was pulling their agents out of China.  The OPM hack compromised the full information of over 20,000,000 Federal employees, including CIA agents.  China is believed responsible for this hack, so they have all this information.  And basically the CIA knows that China now knows all its agents and has the fingerprints for most of them.

If you know who works for the State Department, and you know "Bob" came in to the country allegedly working for State yet he is not on the list of known State employees, he's probably a spy.  So the CIA pulled them before they could get caught or in trouble.

If China really wanted to screw with us, they'd shop that list around and sell it to Russia, North Korea, etc.


In other glorious news, Experian was hacked again.  This time a specific server or dataset was compromised, and it belonged to the cell phone carrier T-Mobile.  If you applied for a T-Mobile line from September '13 to September '16, the following info was compromised: "Social Security numbers, dates of birth and home addresses."  But that's only for 15,000,000 people, so no worries.

It is important to remember that it was not T-Mobile that was hacked, it wsa the credit reporting agency/data aggregator Experian that was hacked.  When you applied for cell service, you fill out an application and it's run through Experian to determine if your credit is sufficient to pay for a contract.  Common sense would say that after the credit is approved or denied, a summary should be passed on to T-Mobile, a notation made on the person's credit report, and the application should be purged.  But apparently that wasn't good enough for Experian and they decided that they needed to keep the actual application.

Oh, well.
thewayne: (Cyranose)
A "gang" who claims to be an international syndicate but is more likely a small group, paid for a couple of criminals to lob Molotov cocktails at a company who discovered a Trojan that the gang developed to compromise ATMs. They sent threats to the security researchers, giving them a deadline to remove the research from their web site, and when they didn't, some punk ran up to a building and threw a single firebomb, then ran away. The damage was minimal.

This was all going on in Kiev, St. Petersburg, and Ukraine.

http://krebsonsecurity.com/2015/09/atm-skimmer-gang-firebombed-antivirus-firm/

In another story, Brian Krebs spent time in Mexico recently. There's been a huge increase in ATM skimmers and malware that they can apparently order the ATM to spit out money.
thewayne: (Cyranose)
October 1 is the deadline for merchants to be switched over to the new readers in the USA, otherwise they can be liable for any theft that takes place. But what is utterly ridiculous is that THEY DID A HALF-ASSED IMPLEMENTATION OVER HERE. No, correct that, quarter-assed. They would have to improve their implementation to be half-assed. THEY DO NOT REQUIRE A PIN! So if someone lifts your wallet and you have an EMV card, they can spend their way to heaven until you cancel the card.

I am curious how European cards, which have PINs, will work over here. Likewise, I wonder how our PINless EMV cards would work in Europe.
thewayne: (Cyranose)
This is why we can't have nice things. You can't trust major merchants like Target and Home Depot and Nieman Marcus to keep their systems secure. Mom & Pop companies can't afford a proper IT department, so they go to a POS vendor, only in this case POS doesn't mean point of sale.

In this particular case, to quote from Krebs post, "NEXTEP Systems, a Troy, Mich.-based vendor of point-of-sale solutions for restaurants, corporate cafeterias, casinos, airports and other food service venues, was recently notified by law enforcement that some of its customer locations have been compromised in a potentially wide-ranging credit card breach, KrebsOnSecurity has learned.

The acknowledgement came in response to reports by sources in the financial industry who spotted a pattern of fraud on credit cards all recently used at one of NEXTEP’S biggest customers: Zoup, a chain of some 75 soup eateries spread across the northern half of the United States and Canada."


http://krebsonsecurity.com/2015/03/point-of-sale-vendor-nextep-probes-breach/

So we're screwed, but the truth is that we've been screwed for years. Use cash when you can, use a bona fide credit card when you can't as you have better laws behind you for recovering stolen funds.

The saddest thing is that the one improvement that U.S. banking could make to really make life hard for these criminals is to implement Chip & PIN. Every card has a crypto chip, and you have to enter a PIN number. Two factor security. If your card is stolen or forged and they don't know the PIN, they can't use it. So American banking is doing a half-assed implementation and putting in the crypto chip, but no PIN. Also no signature required. So no verification whatsoever. The reasoning is probably that they don't want to burden people with remembering a PIN, which we've been doing for 25 years anyway.

*sigh*
thewayne: (Cyranose)
For $10-$27 a card, you can get a new (stolen) credit card for a loved one!

The breech seems to have been between November 18 and 28, but it is unclear if it might have started earlier or possibly still be on-going. Bebe decided they didn't want to talk to Krebs, so apparently they're still in denial. Evidence suggests that this was another card reader compromise and that their online store was not breeched.

One thing that I don't know since I don't know anyone who shops there is how valuable the cards are. If Bebe is a high-end store, the cards could be worth a lot. Also, the cards are up for sale in a hitherto not known carder forum, so the stolen card retailers have another store that you can buy from.

http://krebsonsecurity.com/2014/12/banks-credit-card-breach-at-bebe-stores/


UPDATE: Bebe confirmed the breech.

"Bebe stores said its investigation indicates that the breach impacted payment cards swiped in its U.S., Puerto Rico and U.S. Virgin Islands stores between Nov. 8, 2014 and Nov. 26, 2014. The data may have included cardholder name, account number, expiration date, and verification code." They claim the breech has been stopped.

So at least they caught it before Black Friday, that greatly reduces the number of compromised cards.

http://krebsonsecurity.com/2014/12/bebe-stores-confirms-credit-card-breach/
thewayne: (Cyranose)
Sadly, it looks like Security By Obscurity is still the mode they want to play, so expect more compromised retailers this season.

http://www.npr.org/blogs/alltechconsidered/2014/11/24/366367832/as-hackers-hit-customers-retailers-keep-quiet-about-security
thewayne: (Cyranose)
A bank in New England got took for $120,000 in fraudulent C&P charges emanating from Brazil. The issue? The bank haven't issued any C&P cards yet.

One part of C&P is a built-in counter that is part of the transaction data stream. If your bank receives a second transaction with the same counter number, you know it's fraudulent. But since it's not implemented, it's largely ignored. Apparently some criminals in Brazil bought a bunch of Home Depot stolen cards, got ahold of a credit card terminal, and manipulated the data stream to cram the cards through. The bank recovered about $80k of the stolen money and is trying to get the rest back. Meanwhile, Mastercard is saying that they're responsible for the remainder.

After the Home Depot theft, the bank decided not to re-issue potentially compromised cards as they represented a fairly large portion of their customer base. I would guess that they're reconsidering that right now.

There's no doubt that C&P will greatly reduce fraud, but it's not easy to implement, so chances are that we'll see as much and maybe more as it begins to be rolled out next year. In the case of this New England bank, an upstream provider authorized the charges when the bank's systems were offline and couldn't directly authenticate the transactions.

http://krebsonsecurity.com/2014/10/replay-attacks-spoof-chip-card-charges/


ETA: Bruce Schneier wrote about C&P attacks a while back, it's called a Pre-Play Attack.
https://www.schneier.com/blog/archives/2014/05/preplay_attack_.html
thewayne: (Cyranose)
Does this qualify as irony? Apparently someone exploited a weakness in their internet shopping cart code and compromised some 5,000 cards from mid-April to mid-June this year.

http://krebsonsecurity.com/2014/10/spam-nation-publisher-discloses-card-breach/
thewayne: (Cyranose)
This is very limited, the theft specifically struck three states (NY, NJ, PA) and only about eleven stores. Very little information is available, though it appears to be a cash register malware attack. I'm thinking that maybe it was detected early before the fraudsters could roll out a larger scale breech. Still, I'm sure this will force a chain-wide audit, which consists of some 1,800 stores across the USA.

No mention as to how many cards were compromised or how long the breech lasted.

http://krebsonsecurity.com/2014/10/banks-credit-card-breach-at-staples-stores/
thewayne: (Cyranose)
Sears Holdings just announced it, no indication as to how many cards or a date range but they are saying that no cards are yet being used fraudulently. We'll see how long that holds true. They're also saying only Track 2 data was compromised, so no personal identity info stolen that could promote ID theft, just simple credit theft. It was a point of sale hack, so either the same group that did Target/Michaels/Home Depot/etc or someone using the same malware package.

The Dairy Queen breach was suspected in August but only now confirmed, no indications how long or how many cards were compromised. This one was a cash register compromise, so probably a different batch of crooks.

I just had my card replaced because of the Home Depot hack, we use Kmart as my wife's pharmacy and both of us have used our cards there. So if our cards ever stop working, now we know why, and at least it's a good thing that our bank is actually being preemptive.

http://krebsonsecurity.com/2014/10/malware-based-credit-card-breach-at-kmart/

January 2026

S M T W T F S
    1 23
45678910
11121314151617
18192021222324
25262728293031

Syndicate

RSS Atom

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Jan. 6th, 2026 05:35 pm
Powered by Dreamwidth Studios