Heartland data breach could be bigger than TJX's
This recent incident suggests cybercrooks have shifted to targeting payment processors
Computerworld - A data breach disclosed today by Heartland Payment Systems Inc. may well displace TJX Companies Inc.'s January 2007 breach in the record books as the largest ever involving payment data with potentially over 100 million cards being compromised.
Heartland, a Princeton, N.J.-based provider of credit and debit card processing services, said that unknown intruders had broken into its systems sometime last year and planted malicious software to steal card data carried on the company's networks.
Visa and MasterCard alerted Heartland of suspicious activity, triggering the company to hold an investigation by "several forensic investigators," during which the intrusion was discovered, Robert Baldwin Jr., Heartland's president and chief financial officer, said in a statement. The company said the intrusion may have been the result of a "widespread global cyberfraud operation."
Heartland claimed that no merchant data, cardholders' Social Security numbers, or unencrypted personal identification numbers (PIN), addresses or telephone numbers were compromised.
As with most data breach notifications, Heartland didn't say when the card companies informed it of the breach, when the breach took place in 2008, how long the intruders had remained undetected or how many cards might have been compromised in the intrusion. A company spokeswoman did not immediately respond to requests for comment.
But given that Heartland processes more than 100 million card transactions per month, it is very possible that the number of compromised credit and debit cards is at least that much, if not more, said Avivah Litan, an analyst at Gartner Inc. "It does look like the biggest ever," Litan said. The TJX breach involved the compromise of over 45 million cards.
It also appears that those behind the breach "made off with the gold" by intercepting and stealing the so-called Track 2 data from the magnetic stripe on the back of cards, which is all that's needed to create counterfeit cards, Litan said.
Dan Clements, president of CardCops, an identity protection service of Affinion Group Inc., said that he has noticed activity in underground chat rooms that suggested a major compromise at a processor such as Heartland.
Typically when a card is stolen, crooks first check to see if the cards are still active by using it for some transaction -- often a very small donation to a charitable organization -- to see if it works. This sort of validity check has increased by nearly 20% over the past few months, suggesting a major compromise. But it's not clear yet if it is related to the Heartland breach, Clements said.
The Heartland compromise is the second involving a large payment processor over the past few weeks. On Dec. 23, RBS WorldPay Inc., the payment processing division of The Royal Bank of Scotland Group, announced that its systems had been breached by unknown intruders, resulting in the compromise of personal information belonging to about 1.5 million card holders. The compromised information included the Social Security numbers of 1.1 million individuals using payroll cards, the company said.
The incidents suggest that cybercrooks are increasingly beginning to target payment processors, Litan said. "Attacking a processor is much more serious than attacking a retailer. A processor sits at the nerve center of the payment process," and processes far more payment card data than any retailer, she said.
"More radical security moves" need to be taken by payments industry as a whole to address the problem, she added. Such incidents show that the security requirements of the Payment Card Industry Data Security Standard being pushed by the major card companies is clearly not enough, Litan added.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Cybercrime and Hacking White Papers | Webcasts