Global Payments breach raises questions
Company's description of breach leaves some gaps
Computerworld - Payment processing vendor Global Payments Inc. held a conference call Monday to explain a computer intrusion that exposed data on at least 1.5 million credit and debit card holders, but many questions about the breach were left unanswered.
The Atlanta-based company, which processes payment card transactions for thousands of merchants, first reported the compromise Friday when it issued a brief statement saying that intruders had gained access to a portion of its processing system. It later updated the statement to say that data belonging to about 1.5 million card holders, had been "exported" from its systems.
The company's disclosures came after the Wall Street Journal on Friday identified Global Payments as the victim of a major data breach. The breach was originally reported by security blogger Brian Krebs. Krebs' report did not name Global Payments and was based on an internal alert from Visa and MasterCard warning card-issuing banks about a breach at an undisclosed payment processor involving about 10 million debit and credit cards.
In a conference call with investors, Global Payments Chairman and CEO Paul Garcia said the data theft was confined to the company's North American processing system. The breach did not involve any merchant systems or systems belonging to sales partners, he said.
"Neither merchant systems nor point-of-sale devices were involved in any way," Garcia said, according to a transcript of Monday's call.
"Importantly, investigation to-date has revealed that the theft involved Track 2 card data only. We do not believe Track 1 card data was taken or that cardholder names, addresses, Social Security numbers for consumer banking information was obtained by the criminals," Garcia said, repeating the company's earlier statement on the breach. Based on an investigation of the intrusion, "we believe that this incident is contained," he said.
The company's description of the breach leaves some questions unanswered, said Avivah Litan, an analyst at Gartner. "It seems obvious that they were breached... but they didn't come out and say it straight," Litan said. "All they said is what was not involved. That's the mystery here."
There also appears to be a discrepancy between Global Payments' description of the data that was compromised and the descriptions offered by MasterCard and Visa. According to the alert sent out by the credit card companies to card-issuers, the compromised data included both Track 1 data, which includes personally identifiable information such as the card holder's name and account number, and Track 2 data, which involves information such as the card's expiration date and the account number. However, Global Payments has insisted that only Track 2 data was compromised.
"This discrepancy just raises more questions. We still don't have all the information," Litan said.
A Visa spokesman said the company does not comment on private internal communications regarding ongoing investigations.
- Michaels breach exposes nearly 3M payment cards
- Teen nabbed in Heartbleed attack against Canadian tax site
- Heartbleed bug can expose private server encryption keys
- FTC can sue companies hit with data breaches, court says
- 5-year-old hacks Xbox, now he's a Microsoft 'security researcher'
- State AGs probe Experian subsidiary's data breach
- NSA sniffing prompts Yahoo to encrypt traffic between its data centers
- Banks withdraw data breach claim against Target
- Bank abandons place in class-action suit against Target, Trustwave
- Banks' suit in Target breach a 'wake-up call' for companies hiring PCI auditors
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts