Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
GET RECOGNIZED.
Let an ISACA® certification
elevate your career.

Register today and save
Microsoft/Windows
Tame your scariest paperwork. Find Out How
Average Rating:
Rate this article:  
Sophisticated Bank Hack Leads to $45 Million ATM Theft
Sophisticated Bank Hack Leads to $45 Million ATM Theft

By Jennifer LeClaire
May 10, 2013 1:34PM

    Bookmark and Share
"As much as it pains me to admit this, we're woefully behind in card security," said security researcher Ken Pickering after a criminal group stole $45 million from ATMs. "Unfortunately, I think most people treat fraud as a 'necessary evil' in issuing magnetic-stripe credit cards, but the real problem is: How do we replace all the credit scanners in the U.S.?"
 



(Page 2 of 2)

Pickering said that often, in analyzing the security of a system, it comes down to the weakest link.

"The real weakest link in this scenario was how easily these cards were modified and duped on a massive scale," he said.

Real-Time Monitoring Needed

Tom Cross, director of security research at Lancope, told us several attacks of this nature have occurred in the past few years. What makes this type of attack unique is not just the technical skill required to pull it off, he said, but the level of logistical coordination needed to perform nearly simultaneous withdrawals from large numbers of ATM machines.

"The fact that debit card processing infrastructure was compromised is a significant problem," Cross said. "There are a variety of different attacks that may have been possible given the access that these criminals had to the back-end infrastructure. The vulnerabilities that led to that compromise need to be identified and closed."

Unfortunately, Cross said, while breaches like this are often reported to the public, we rarely hear the specific technical vulnerabilities that the attackers were able to exploit in order to pull off the attack. It would be helpful, he added, if more organizations publicly disclosed the technical vulnerabilities associated with network security breaches, because this information helps their peers prioritize the steps they should take to lock down their own networks.

"This type of attack might be preventable if ATM networks were able to monitor transactions in real time for unusually large numbers of transactions involving individual cards or cards from the same issuing institution," Cross said. "Unfortunately, that type of infrastructure doesn't exist today, but perhaps it's time to consider creating and implementing it now -- especially after this latest attack."

< Previous Page  |  1  |  2

 

Tell Us What You Think
Comment:

Name:

Curt Rostenbach:

Posted: 2013-05-20 @ 6:33am PT
"How do we replace all the credit scanners in the U.S.?"
I dunno, will it cost more than $45 million?



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Microsoft/Windows
1.   Microsoft Buys InMage Recovery Tech
2.   Reinvent Productivity, Nadella Urges
3.   Microsoft Revamps Office 365 Plans
4.   Windows 7 Ends Mainstream Support
5.   Another IE-Focused Patch Tuesday


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Report: Chinese Hackers Hit U.S. Personnel Networks
Hackers from China broke into the computer networks of the U.S. Office of Personnel Management earlier this year with the intention of accessing the files of tens of thousands of federal employees.
 
Charges: Russian Stole Data from U.S. Restaurants, Zoo
A Russian man arrested on bank fraud and other charges hacked into computers at restaurants in Washington, hundreds of other retail businesses, and even the Phoenix Zoo, authorities say.
 
Another Month, Another IE-Focused Patch Tuesday
Microsoft rolled out 59 vulnerabilities for Internet Explorer in June. But the IE-patching party is not over yet. Redmond published six new security bulletins on Tuesday; two, critical; three, important.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | Small Business | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.