Heartland data breach sparks security concerns in payment industry
Lack of details, company's size spur questions about how system intrusion happened
Computerworld - The lack of details surrounding the potentially massive data breach that Heartland Payment Systems Inc. disclosed this week is fueling questions and concerns within the payment processing industry about the exact nature of the security compromise.
The concerns also are being driven by the fact that Princeton, N.J.-based Heartland is one of the largest processors of credit and debit card transactions in the U.S. It handles more than 100 million card transactions per month for 250,000 clients; that a company so large could have its systems compromised by intruders for what appears to have been an extended period of time is prompting more than the usual curiosity about how the breach took place.
In addition, Heartland, as a large processor of card transactions, has been required to comply with the Payment Card Industry Data Security Standard — a set of security controls mandated by the major credit card companies — for a considerably longer time than retailers have been. As a result, Heartland was generally expected to have stronger controls in place for preventing, detecting and responding to system intrusions than many other entities covered by the PCI rules do.
"We're dying for information on this one," said Henry Helgeson, president and co-CEO of Merchant Warehouse Inc., a Boston-based provider of payment card processing services and software. "Everybody who processes card information is dying to know how exactly this happened."
For the time being, Helgeson added, he and other Merchant Warehouse officials are "scratching [our] heads" about the breach at Heartland. "One of our frustrations right now is, if this is a new attack, we need to know about it," he said. "We need to know if what happened to Heartland can happen to [other payment processors]."
Heartland disclosed the breach on Tuesday, saying that unknown intruders had broken into its networks sometime last year and stolen payment card transaction data. Although Heartland didn't disclose the number of card accounts that might have been compromised, some outside estimates from analysts and people within payment industry have pegged the number at more than 100 million, which would make it by far the biggest payment card breach to date — surpassing the 45.6 million card numbers that The TJX Companies Inc. said were stolen in a breach that the retailer disclosed in January 2007.
Based on the small amount of information that Heartland has released so far, the hackers appear to have planted some sort of malware capable of sniffing out payment card data as it moved across the company's network, and then to have spirited it out of Heartland's systems in encrypted data streams.
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Cybersecurity for Dummies eBook This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and...
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- IBM FlashSystem V840: Leveraging Software-Defined Flash to Drive Your Business With end-to-end, tightly integrated functionality and super-fast flash technology, products like IBM FlashSystem V840 Enterprise Performance Solution empower businesses to leverage the efficiency... All Cybercrime and Hacking White Papers | Webcasts