Friday, August 22, 2008

HomeATM Partner Procures Canadian Financial Provider

SAN ANTONIO, TEXAS, Aug 22, 2008 (MARKET WIRE via COMTEX) -- As Stated by SmartCard Marketing Systems Inc. (PINKSHEETS: SMKG) "Management is pleased to announce that we have signed an agreement to provide 4000 Pin debit and Prepaid cards to a Canadian Financial service provider in Canada with online and retail services, this is additional from the 9000 with Kiyss.com.


The agreement includes the use of the Velocitymoney.com loading network, HomeATM's Pin Debit solution and instant issue prepaid cards for money remittance services.

The agreement established is over a period of 2 years to fulfill delivery giving access to their members, which will double our existing number of accounts and make the Velocitymoney.com a service leader in the online payment segment. The price established per customer implemented is $27.50 for a total of $101,000.00 dollars with an estimated number of 8 transactions per month of $150.00 to $240.00 range. This does not include email money transfers, card to card transfers or multi-currency settlement between clients once funds in transit.
Velocitymoney.com continues its strong growth through 2008 and believes strongly that 2009 will see more aggressive growth as more merchants and financial institutions continue to realize the benefits of our services online worldwide.

Thursday, August 21, 2008

BBC: So How Secure Is Our Card Info?

In light of the biggest identity theft case ever prosecuted in America, the spotlight is being turned on just how secure is our credit and debit card information? The question is a simple one but the answer might appear to be a bit harder to pin down.

VeriSign, a firm that secures websites for e-commerce, told the BBC that credit and debit card information is "vulnerable" but they are working with retailers to change that.

"Credit and debit card information is just not incredibly secure," said Perry Tancredi, VeriSign's senior product manager for fraud detection. "But it is counterbalanced by the amount of fraud losses due to cheque fraud and direct debit fraud which is much greater than credit card fraud."

Mr Tancredi said: "Regardless of how strong the security measures, and how vigilant, the weak part of the chain is there is always a human who is responsible and who has overall control over the information." He suggested the best bet was for all consumers to "assume that there will be some sort of fraud on your account sooner or later" and put in place a plan to deal with it.

Getting safer

Espousing a completely different view is Jerry Tabeling who is the president of IDP, a company that carries out vulnerability assessments of networks and online business applications. "Our information is a lot more secure after all the publicity we have had about attacks," he said. But yes there are still problems that still exist though it is getting safer." These, Mr Tabeling told the BBC, tend to centre around a retailer not doing a good enough job securing its network.

"If the proper encryption is configured on the wireless access point, then an attacker will not be able to get any information. I would have to bet in this case that didn't happen."

At stake for victims of fraud is more than just money The authorities said the details of the 40 million credit and debit card holders was obtained by the hackers "wardriving" past stores to find wireless networks they could hack into. This entailed driving around using a hand-held device to detect a wireless signal much in the same way a radio scanner hunts for a signal.

The US justice department said the hackers then loaded "sniffer" software onto the retailers' networks which captured numbers as well as passwords and account information as it moved through the retailers credit and debit processing networks. That information was then sent to servers that the group controlled in Eastern Europe and the United States.

The justice department said the stolen numbers were "cashed out" by encoding card numbers on the magnetic strips of blank cards and then used to withdraw tens of thousands of dollars from ATMs.

Identity loss

The Justice Department is not putting a figure on just how much the fraud has cost, but Mr Tancredi said the money is not the point with most card liability ranging around $50 (£25).

MasterCard says it strives to safeguard account information "If you are a victim of credit card fraud you might get your identity stolen and then you lose more than just money. You lose time, you lose trust and it could take years to fix your credit." MasterCard said preventing fraud and safeguarding financial information is a top priority for the company. Spokesman Chris Monteiro told the BBC: "If a cardholder is concerned at all about the security of their account they should immediately contact their issuing financial institution."

The Payment Card Industry, or PCI, has developed standards for retailers to adopt when handling credit and debit payments. A spokesperson said while it is trying to get merchants to adopt these standards "it is not our job to go around checking who is compliant with this. That is lead by the credit card brands."

Meanwhile Mr Tabeling, an IT security specialist, suggested that all consumers need to play a more proactive part in policing their own transactions and their credit information. "We have no choice but to trust the retailers are doing their bit but we can do more. "We can keep track of our credit report once or twice a year, check our statements and set up a notification so that if there is any suspicious activity on our account we are told about it right away."

Related Stories on the BBC:
Concern over rising fraud cases 28 Jul 08 Scotland
Hi-tech criminals target Twitter 05 Aug 08 Technology
Oyster card hack to be published 21 Jul 08 Technology
Phishing attacks soar in the UK 15 Apr 08 Technology


Related Links: VeriSign PCI IDP MasterCard

U.S. Consumers Lost Nearly $8.5 Billion to Viruses, Spyware, and Phishing

U.S. consumers lost almost $8.5 billion over the last two years to viruses, spyware, and phishing schemes according to latest projections from the Consumer Reports State of the Net survey.

Additionally, report estimates that American consumers have replaced about 2.1 million computers over the past two years because of online threats. Survey has also reveals some hopeful signs such as declining chances of becoming a cybervictim—consumers have 1 in 6 chance of becoming a cybervictim, down from 1 in 4 in 2007.

Other findings include:
  • Spam: One in three survey respondents reported heavy levels of spam. One of the newest types, cell-phone spam, is a minor nuisance to most online homes. 1.2 million people nationwide are estimated to have received more than 25 such messages each during a recent six-month period.
     
  • Viruses: The rate of serious virus problems has declined 32% over the years however 19% of respondents reported that they didn't have antivirus software on their computer.

  • Spyware: One in 14 respondents reported a serious computer problem as a result of spyware, compared to 1 in 6 respondents in 2005. In the past six months, 566,000 households replaced computers due to spyware infections.

  • Phishing: Over the past two years, about 6.5 million consumers, or roughly 1 in 13 online households, gave phishing scammers personal information. 14% of them lost money. Consumer Reports estimates that American consumers lost about $2 billion to phishing scams.
Related: 

7 Online Blunders - These common mistakes can ruin your computer or invite identity theft

Will Banks Contribute to Innovation(s) in Retail Payments?

Aneace Haddad, founder and chairman of Welcome (Real Time), and an industry associate of mine, has recently published a seminar presentation with full audio, entitled “How will banks meet the challenges of innovations in retail payments"? 

He chaired a conference in Hong Kong (Financial Cards & Payments Asia) and gave the keynote address, which you can view below.

Along with the HomeATM PIN Debit blog, "Aneaces Blog" among others, is recommended by Glenbrook's Payments News.  So take a look when you have some extra time.  You can visit Aneaces Blog by clicking the link.


Haddad July 2008
View SlideShare presentation or Upload your own.

Wednesday, August 20, 2008

PIN Debit White Paper on Improving Merchant Profitability

A white paper educating merchants on the benefits of migrating their electronic payments from credit and signature debit, to PIN Debit has been released by Optimized Payments Consulting.

Of course, it goes without saying, that I couldn't agree more.  In addition to reducing your card processing fees by 73%, Internet Retailers also virtually eliminate chargebacks and reduce risk related expenses signficantly.  Given that majority of consumers have at least one debit card with PIN functionality, e-commerce merchants would be best served to recognize this fact and take advantage  of the myriad benefits provided by HomeATM's Internet PIN Debit solution – lower acceptance costs, greater security, faster funding, and typically faster checkout.

Moreover, merchants see reduced fraud and chargebacks with PIN debit transactions. Since only the card holder knows the PIN, it is less likely to be stolen and used fraudulently like credit and signature debit cards. And PIN‐based debits are not subject to the same chargeback rules as their counterparts, although some of this is changing in the industry.

So if you are or know of an internet retailer who would like to investigate our PIN Debit solution further, visit HomeATM or give us a call or email me to request further information and I'll make sure you get it.   As always, click any of the graphics to enlarge.  Here's the press release from Optimized Payments Consulting which was released today:

Atlanta, Ga. (PRWEB) August 20, 2008 -- In today's plastic society, electronic payment processing is a must for businesses to operate and to be competitive.  Unfortunately, the high fees associated with credit card processing and merchant accounts are setting recession-hit firms back even further. To help companies meet this challenge, the payment processing experts at Optimized Payments Consulting (OPS) are sharing their expertise - gained over ten years working with retail, Internet, and healthcare clients - in a new white paper titled "How Accepting ATM Cards Can Improve Merchant Profitability."


The chart on the left  highlights the cost differential between the three dominant payment methods depending on average ticket size. A merchant’s actual cost of processing a PIN transaction will depend on the specific ATM network (Interlink, Star, Pulse, NYCE, etc.) used to process the sale and the mark‐up added by the payment processor. Using a weighted average cost based on market share of the ATM debit networks in the U.S., a $50 sales transaction will cost about 54 cents with PIN‐debit, versus 73 cents for signature debit, and 93 cents for credit.  From a merchant’s perspective, accepting PIN debit becomes more attractive as the average ticket grows, but this product is not competitive if the average ticket is below $25.

As the table shows, the fixed per‐item and switch fees do not make PIN transactions cost effective for smaller ticket transactions. However, on the flipside.. for average tickets above $25, a merchant can save 25%‐61% over signature debit, and 39%‐73% over credit transactions.

R
ecognizing that over 90 percent of merchants were unknowingly overpaying for credit card processing services, Goel established Optimized Payments Consulting to help merchants understand and reduce their payment processing costs.  In the most recent in a series of white papers on the topic, OPS experts provide in-depth background and analysis on how merchants can accept and promote ATM cards and drive profitability.

"Businesses can save 25% to 73% percent on their processing costs for every transaction they migrate from signature debit and credit to PIN debit respectively".



By 2010, Morgan Stanley estimates that credit card processing rates will "rise to 1.86 percent and generate $32.4-billion in interchange fees." Those skyrocketing interchange rates, along with processing fees, are squeezing businesses as credit card processing fees eat away at their already shrinking bottom lines. Fortunately for these businesses, there are lower cost alternative payment options.

According to Digital Transactions, an industry publication, the use of PIN-based debit cards in the U.S. has been rising faster than signature debit cards and credit cards.

Merchant sales volume for PIN transactions has been growing 21 percent annually since 2000, slightly ahead of signature debit and "significantly ahead of credit cards." And according to a recent study by Star electronic funds transfer (EFT) network, "consumers preferred PIN debit over signature debit", with 54 percent opting for PIN and 38 percent for signature.

This trend spells good news for businesses that know how to leverage it.  To find out how to leverage it click here to email me.

How to hack RFID-enabled Credit Cards for $8 Bucks

Having learned a lot over the course of the last two or three weeks about "WarDriving" (and warcarting) it occurred to me that if it's that easy to access wireless networks, then why the heck would Visa and Mastercard come out with a Radio Frequency ID (RFID) card.  Even with my newly ascertained, albeit, limited knowledge on the subject, I thought:  "certainly they would be easier to breach than plain old magnetic stripe cards right"? 

Right...but what surprised me is that it can be done for only $8, which is less than the cost of a movie ticket.  Speaking of movies...here's one on how to do it.

Sorry Charlie...Boston Transit Authority Gag Order Lifted

A federal judge has lifted a gag order on three MIT students who were barred from talking publicly about security flaws they discovered in the Boston transit system's automated fare network.

So here's the Presentation!

A lawyer for the transit agency acknowledged its CharlieTicket system has security flaws. But the lawyer asked Judge George O'Toole Jr. to impose a five- month injunction continuing to block the students from revealing anything publicly about the security system. O'Toole rejected the request Tuesday.

The students had been blocked from presenting their findings on the security flaws in early August at DefCon, an annual computer hackers' conference.

"Judge O'Toole said he disagreed with the basic premise of the MBTA's argument: That the students' presentation was a likely violation of the Computer Fraud and Abuse Act, a 1986 federal law meant to protect computers from malicious attacks such as worms and viruses. Many had expected Tuesday's hearing to hinge on First Amendment issues and what amounts to responsible disclosure on the part of computer security researchers. Instead, O'Toole based his ruling on the narrow grounds of what constitutes a violation of the CFAA. On that basis, he said MBTA lawyers failed to convince him on two points: The students' presentation was meant to be delivered to people, and was not a computer-to-computer 'transmission.' Second, the MBTA couldn't prove the students had caused at least $5,000 damage to the transit system."
O'Toole did not rule on the students' claim that the MBTA had violated their First Amendment rights by stopping them from speaking at the hackers' convention.

This from the Boston Globe:
Cindy Cohn, a lawyer for the students, said the students had complied with the MBTA's request to turn over slides from their presentation and a 30-page "security analysis" that outlines everything they discovered about weaknesses in the fare system.

"The MBTA ultimately is trying to silence some uncomfortable truths that these students uncovered," said Cohn, legal director for the Electronic Frontier Foundation, a San Francisco-based legal organization that specializes in civil liberties issues related to technology.

"They brought an action against three college kids rather than address the problems in their own house," Cohn said.  Cohn said the students never intended to reveal key details that would have given hackers information to help them hack into the fare collection system and ride the system for free, despite what the online ad for the demonstration said.

But Ieuan Mahony, an attorney for the MBTA, said the MBTA simply wanted the students to refrain from revealing details about the security problems publicly until the MBTA has time to correct the flaws, which could take five months.  Mahony said that after reading the security analysis submitted by the students last week, the MBTA "has determined that the CharlieTicket system is compromised." 

"We've known that there are some issues with the CharlieTicket, but we realized after reading this paper that they were able to clone and counterfeit the CharlieTicket," Mahony said after the hearing.  Mahony said the MBTA still wants to get additional information from the students on how they were able to clone the CharlieTicket.

Some details about the vulnerabilities of automated fare system were released before the students' planned talk at the DefCon conference. Electronic copies of their 87-slide presentation were included on CDs handed out to conference attendees before the conference officially began and before the MBTA filed its lawsuit.  - Boston Globe

Card Skimming Perps Show Patience if not Virtue


Patient thieves make off with thousands from stolen card data

Jeez...it seems like there's about four or five of these stories per day now. I guess I was spot on with my prediction to look for more of these gas station skimmer stories in the near future. One has to wonder what the long term effect on consumers trust of Point of Sale devices may be as they become more aware of how simple it is to fall victim to this type of fraud.

Maybe HomeATM can look into creating a system whereby consumers (knowing that their own personal card swiping device is safer than the ones at gas stations) can "prepay for gas at home" using their HomeATM wedgie,  get a gas disbursement code, and then go to the gas station, enter the code and dispense their gas.  Anyway, here's yet another story on card skimming at gas stations.  This time, the perpetrators waited a full year before empyting the bank accounts of their victims.  I guess patience is not always virtuous.

Last summer, thieves skimmed debit card information from a South Hill gas station. Then, nearly a year later, they withdrew tens of thousands of dollars from Pierce County residents’ bank accounts, Pierce County Sheriff’s officials said.

By waiting, the thieves can be pretty sure surveillance videos showing them will have been erased. And by making their ATM withdraws over a holiday weekend, it created an extra day for banks to realize something was amiss, said Pierce County Sheriff’s spokesman Ed Troyer said.

Detectives have identified about 75 victims, including cases reported to Tacoma police, and expect many more may be out there, he said. Some victims lost several hundred dollars, others lost thousands.

“Someone might have only had $500 in their account, but the bank lets them take out $3,000 because of overdraft protection,” Troyer said.

By comparing the bank statements of the victims, investigators believe the cards were skimmed from the ARCO station at 11608 Meridian East last August.

“We don’t know if they have more cards and are planning to do another round,” Troyer said. Anyone who used a debit card at the station in August 2007 should get their card replaced, he said.

The thieves used an electronic device that records the customers’ card numbers and pin information, he said. People should be on the look out for card readers that don’t look right or keypads that have been placed over the existing one, Troyer said.

While these types of scams are sophisticated, the electronic components are relatively easy to come by. The next generation of electronic theft, which taps into Bluetooth and wireless technology, is even scarier, Troyer said.

Tuesday, August 19, 2008

More on the "WarDriving 11" and their 40 Million Card Data Theft

A loose-knit ring of hackers stole credit card data from unsuspecting US retailers. Though 11 people have been indicted, experts say the case shows how sophisticated identity-theft schemes have become.

Five years ago, Albert Gonzalez allegedly used an unsecured radio link to tap into the computers of a BJ's Wholesale Club store in Miami and access customer credit-card numbers.

It was a simple trick, but it was only the beginning.

From that first break-in, Gonzalez and a ring of accomplices flew up the learning curve, prosecutors charge. They wirelessly broke into the computer networks of other stores including those operated by OfficeMax Inc., Boston Market Corp., Barnes & Noble Inc., and TJX Cos. And they apparently learned to decrypt customer PIN numbers, install sophisticated software, and park payment card data in offshore databases, in what the Justice Department on Aug. 5 called the biggest hacking and identity-theft case it has ever prosecuted - compromising more than 40 million credit and debit card accounts.

Court filings and interviews with investigators paint a picture of an international ring of 11 loosely knit conspirators from China to Ukraine, and show how quickly such criminal groups can graduate to increasingly sophisticated schemes to exploit the vulnerabilities that remain in the payment card network.

Despite the arrests, Gartner Inc. technology analyst Avivah Litan said it's too soon to relax. Though prosecutors tied the ring to some of the biggest breaches in this decade, their cases don't mention other intrusions such as one of Maine grocer Hannaford Bros. earlier this year.

Also worrisome, Litan said, was that the group allegedly was able to use fake ATM cards with real account numbers to withdraw money from bank machines, indicating they cracked the encryption of PIN numbers.

"The implications are ominous," Litan said. While many banks and retailers have begun using tougher encryption since then, some companies are still on the older standards that she called "inherently vulnerable."

Another technology analyst, Mary Monahan of Javelin Strategy & Research, said more stores have met data-security standards spelled out by Visa and MasterCard since the time of breaches like the one at TJX in 2005, which should make customers' card numbers more secure. Still, Hannaford met those standards at the time of its breach, illustrating how criminal tactics have evolved to stay ahead of defensive measures.

One lesson from this months' indictments, Monahan said, is how the hackers learned to become more sophisticated and global. "You can see that they're developing their skills over time, and transferring skills among one another," she said.

A defense attorney for Gonzalez, Rene Palomino, said his client will plead not guilty to the charges. He described Gonzalez, 27, as a self-taught computer consultant who first met several of the other defendants online.

Former informant

Ironically, the story of how the group of accomplices came to be begins with Gonzalez helping law enforcement officials. Though arrested in connection with theft from an automated teller machine in 2003, Gonzalez soon became a key Secret Service informant and even gave the agency security lectures, Palomino said. Gonzalez was best known for helping officials bring charges against a group known as the "Shadowcrew" after one of the online message boards that served as a marketplace for stolen payment card numbers - 1.7 million of them in all, prosecutors would charge.

Despite serving as an informant, the Justice Department claims, Gonzalez also began "wardriving" in the areas around US Highway 1 in Miami, according to this month's indictments. The term refers to the tactic of cruising in a vehicle with a laptop computer to spot unsecured connections to wireless systems maintained by various stores.

Gonzalez' partner in the wireless probes allegedly was another twentysomething, Christopher Scott, who Palomino said Gonzalez had met in online circles in Miami. Scott's attorney said he hasn't yet entered a plea.

According to the indictments, the pair first got lucky in 2003 at a BJ's Wholesale Club store, which wasn't using encryption software to protect customers' data, and accessed the account numbers of payment cards used by customers.

The next year Scott and another accomplice, described only by the acronym "J.J.," went further. Tapping into a similar access point at an OfficeMax store near the highway, they located data including customers' encrypted PIN numbers punched in when they used debit cards. They turned the data over to Gonzalez, who allegedly sent it to an unnamed coconspirator for decryption.

Filings and investigators say other stores hit by the ring included Barnes & Noble and Sports Authority, many in the Miami area. The indictments suggest the biggest breach began in July 2005 when Scott compromised two wireless access points of Marshalls' stores in the Miami area, both operated by Framingham retailer TJX Cos.

Soon the group was downloading payment card data from TJX's home servers. By the following May, in 2006, Scott had graduated to setting up a "virtual private network" connection to a TJX server, making it harder to detect the intrusion.

Next, Gonzalez brought in a Ukrainian, Maksym Yastremskiy, who prosecutors describe as an international trafficker of stolen card data who sold it on the Web. Via instant message in May 2006, Gonzalez allegedly asked Yastremskiy for help finding an undetectable "sniffer" program that would pick up customer card numbers and provide a feed of stolen data. Several days later, Scott, Gonzalez, and others installed sniffer programs onto a TJX server - likely provided by Yastremskiy, the indictment implies.

Craig Magaw, special agent in charge of the Secret Service's criminal investigative division, which led the probe of the hacker ring, said he had no evidence that Gonzalez and Yastremskiy ever met or spoke outside of their electronic communications. But their virtual connections, he said in an interview, were a common trait to criminal rings using web-based message boards.

"It's the usual M.O., where they can go to be anonymous and help each other further their activity," he said. "It's not just that they're selling the information but, if you go on these [message] boards, it's how to do compromises and giving advice. It's the criminals' playground."

Authorities arrested Yastremskiy in Turkey a year ago while he was visiting a resort. The US Postal Inspection Service confirmed to the Globe at the time that he was tied to the TJX probe. Since then, neither the Justice Department nor Turkish officials have provided contact information for Yastremskiy or an attorney representing him.

Yastremskiy's laptop provided a trove of details including an e-mail tie to Gonzalez, Magaw said. Gonzalez was arrested May 7 at a hotel room in Miami in connection with a related hacking case to which he has also denied wrongdoing. Court papers show officials seized from him three laptop computers, and a Glock 27 automatic pistol.

Encoding blank cards

In addition to showing how the group allegedly stole information, the indictments also shed light on how the ring may have used the data on the streets.

In 2005 and 2006, Gonzalez allegedly sold large amounts of payment card data to a person named only by the initials "J.W." This person allegedly encoded the information on the magnetic stripes of blank plastic payment cards, then used the cards to withdraw hundreds of thousands of dollars from ATMs and split the money with Gonzalez. Another unnamed San Diego purchaser also bought 100 blank payment cards from an individual in China connected to Yastremskiy in 2005, prosecutors charge.

Both examples recall cases in Florida last year in which state prosecutors won guilty pleas from six people who misused card numbers stolen from TJX. After obtaining blank cards magnetically encoded with the stolen numbers, they took the plastic to various Wal-Mart stores in Florida to buy gift cards that could be used like cash. In turn they used those cards to buy $8 million worth of expensive electronics, jewelry, and other items, officials said, returning some items for cash.

Details of how to encode blank cards with stolen account numbers are among the topics typically discussed on underground websites, security experts say; the Secret Service estimates there are 20 message boards or websites in the United States and overseas where criminals sell stolen numbers, trade tips, and form bonds like those between Gonzalez and Yastremskiy. Was theirs like an underground university? "I guess, but there's no diplomas coming out of there," Magaw said.

Or, as Massachusetts US Attorney Michael Sullivan put at a press conference announcing the indictments on Aug. 5: "There's no evidence that any of these people had PhDs."

Globe staff reporter Marion Schmidt contributed to this report. Ross Kerber can be reached at kerber@globe.com.

Irish Payment Services Organisation Announces 20,000 Card Breach

Opportunistic data thieves masquerading as bank technicians — have fooled shop owners into giving them access to credit card terminals and managed to download the details of over 20,000 credit and debit cards, it emerged this morning.

The Irish Payment Services Organisation has warned that individuals pretending to be from Irish banks convinced shop owners they were carrying out maintenance on behalf of banks.

This enabled them to plug in wireless devices that pushed the data to the internet and allowed the card numbers to be used overseas.

The scam has forced banks to restrict cash withdrawals to €100 a day for card holders travelling outside the country.

It is understood the scam was only uncovered by gardaí in the past 48 hours and they have retrieved CCTV footage of the gang in action.  Banks worked hard on the issue over the weekend and have either blocked or restricted access on cards affected. 

Until now criminals have focused mainly on putting devices on ATM machines to skim card data from consumers. However, this suggests a sinister, but startling overconfidence on the part of data thieves, who believe they can fool shop staff used to technicians working on the machines.

Retailers are being urged to check the identity of anyone claiming to be working on behalf of banks going forward.

Restaurants Hit by WarDrivers in Louisiana/Mississippi

It's getting to the point where you can't even go out and get a good Cajun meal anymore...

A ring of cyber-thieves has stolen tens of thousands of credit card numbers from Louisiana and Mississippi restaurants this year, leading to over $1 million in losses for the banks that issued them.

The restaurants began reporting the thefts beginning in March in Baton Rouge, followed by similar cases in Flowood, Miss., Lafayette, Lake Charles and West Monroe. The hackers have swiped credit and debit card numbers off 16 restaurants' computer systems, then sought to sell them for anywhere between $1 and $100 each, according to Special Agent Sean Connor of the U.S. Secret Service, an arm of the Department of Homeland Security that investigates financial crimes.

"Once they get a big pile of credit card numbers, they turn around and sell them on the Internet," Connor said.

The cases appear connected and probably involve a criminal network that stretches overseas, which would be consistent with other identity theft cases, U.S. Attorney David Dugas said. A group indicted in a separate case earlier this month includes defendants from three continents.

Authorities have no total dollar figure for the losses sustained in the Louisiana-Mississippi cases because the victims _ local and national banks _ are still compiling figures, Connor said. The hardest hit is a bank reporting over $1.1 million in losses, he said.

One bright spot: it's easier to steal the credit information than it is to sell it, meaning the losses could have been much greater. "Their methods for using the cards aren't as efficient as their methods for getting the numbers," Dugas said.

Jim Christy, a Maryland-based computer security expert with the Department of Defense, said such a scheme can get started by a thief with a laptop, driving around town until he finds a business with wireless computer networks.

The thief breaches an insecure wireless network, then inserts malicious software...similar to a wiretap...in the merchant's computer that will collect customers' credit card numbers and send them to the thief's e-mail account. Such identity theft operations began about five years ago and are becoming more common, he said.

"This is a worldwide problem today. Everything's networked and everything's going to wireless," said Christy, director of futures exploration for the Defense Department's Cybercrime Center.

The scheme is not sophisticated. Christy compared the hackers to teenage pranksters who get a garage-door opener and drive around the neighborhood, seeing how many garages they can open up by pushing the button. Eventually, they find one or two.

In the largest such identity theft case so far, 41 million credit and debit card numbers were stolen from chain retailers including Barnes and Noble, Sports Authority and OfficeMax. TJX Cos., which runs T.J. Maxx clothing stores, took $197 million in charges to cover losses from the security breach.  Eleven people _ from the U.S., Estonia, China, Ukraine and Belarus _ have been indicted in that case.

The big money for hackers may be in big chains, but the Louisiana-based case shows that small businesses can be targets, too. The targets included Roman's, a family owned Lebanese eatery in Baton Rouge, and Sammy's Grill, in the rural town of Zachary.

Restaurants are among the most common targets for hackers, experts said, because they often fail to update their antivirus software and other computer security systems. Credit card companies urge merchants to make sure they're not storing sensitive data on "point-of-sale" computers _ the modern equivalent of cash registers. The machines also need to be continuously upgraded to meet security standards, said Joe Majka, a senior business leader at Visa Inc. who focuses on computer security.  "We're working more to direct our attention to the merchant community, to make sure they are protecting their data correctly, so that these things don't occur," Majka said.

About 100 restaurant owners are expected at a meeting Monday in Baton Rouge, where Secret Service agents and representatives from Visa will explain how to protect against breaches.

Credit card contracts generally protect consumers from any fraudulent use of stolen card numbers. To protect against the inconvenience of credit card theft, the companies recommend that consumers be vigilant in checking charges that appear on credit or debit accounts _ and quickly report suspicious ones to the issuer of the card.But Christy said there's little that credit users can do to protect themselves.  He said the threat of identity theft is "part of doing business today. You just hope businesses do what they're supposed to do to protect you."

PCI SSC Announces Free Webinar "A Perfect Fit"

The PCI Security Standards Council, a global, open industry standards body providing management of the Payment Card Industry Data Security Standard (PCI DSS), PIN Entry Device (PED) Security Requirements and the Payment Application Data Security Standard (PA-DSS), today announces it is offering a complimentary and educational webinar, "A Perfect Fit - Understanding the Interrelationship of the PCI Standards,” to be held on Thursday August 21, 2008 at 9:00 a.m. EDT and a second session the same day at 7:30 p.m. EDT.

This one hour webinar is designed for any entity that processes, stores or transmits cardholder data and will feature Bob Russo, General Manager of the Council. During the session Mr. Russo will address how each of the standards fit together in a larger perspective of data security.

Webinar participants will discover:

• How the PCI DSS, PA-DSS and PED Security Requirements interrelate;
• Why merchants should know about PA-DSS and PED;
• Why incorporating PCI standards is your best approach to protecting cardholder data;
• Using PCI standards as a model for data security.

To register for the Thursday, September 4, 2008 session at 9:00 a.m. EDT session, visit: http://www.webcastgroup.com/client/start.asp?wid=0650904084240  or http://www.webcastgroup.com/client/start.asp?wid=0650904084241  for the 7:30 p.m. EDT
session. The morning webinar will be recorded and available for download for those who cannot attend either session.

For More Information:

If you would like more information about the PCI Security Standards Council or would
like to become a Participating Organization please visit pcisecuritystandards.org, or contact the PCI Security Standards Council at participation@pcisecuritystandards.org.

PCI SS Council Announces Summary of Changes

Changes to the PCI DSS include clarifications and explanations to the requirements, with these clarifications offering improved flexibility to address today’s security challenges in the payment card transaction environment. The new summary document on these changes highlights the key clarifications by requirement. These clarifications will also eliminate existing redundant sub-requirements while improving scoping and reporting requirements. When version 1.2 is released, incorporating existing best practices, supporting documents will also be updated and consolidated. Most importantly, version 1.2 does not introduce any new major requirements to the existing 12 in place since the Council’s inception.

“The Council’s Participating Organizations, through the feedback process, have provided an invaluable service in enhancing the PCI DSS to meet today’s market needs,” said Bob Russo, General Manager, PCI Security Standards Council. “Version 1.2 should be seen as an improvement, not a departure from tried and true best security practices. By distributing a summary of the forthcoming changes, we are ensuring that stakeholders are not taken by surprise by any of the clarifications.”

With the summary of changes to the revision of the PCI DSS, the Council is giving stakeholders guidance on what to expect when version 1.2 is publicly available. The Council is finalizing the changes to the standard and will be providing its Participating Organizations with version 1.2 in early September. PCI SSC Participating Organizations and the Council’s Board of Advisors have been providing feedback on the revisions and the Council is in the final stages of preparing the latest standard and supporting documentation. This follows the established lifecycle process that will ensure that the PCI DSS standard is revised and updated on a two year cycle. PCI DSS version 1.1 was introduced in September 2006.

Monday, August 18, 2008

2008 Debit Issuer Study Released by Pulse

Debit Rewards on the Increase, Increased Interest in Alternative Payments...

PULSE is pleased to make available to its participating financial institutions an executive summary of the 2008 Debit Issuer Study. The study, conducted by Oliver Wyman, is the third comprehensive debit industry analysis commissioned by PULSE.

The 2008 Debit Issuer Study explores debit card issuer performance in a variety of areas, including transactions, interchange, rewards, fraud, ATMs and prepaid cards. In addition to these performance metrics, issuers commented on key opportunities and challenges anticipated for 2008.

Access to proprietary research such as this is one of the important benefits of PULSE participation. To obtain your copy of the 2008 Debit Issuer, click here. (login is required).

Here's an overview:

"Surcharge-free ATM access is gaining in popularity among debit card issuers as they explore new ways to better serve cardholders, according to the 2008 Debit Issuer Study, commissioned by PULSE. Financial institutions also are increasingly offering debit rewards.

The 2008 Debit Issuer Study, conducted by Oliver Wyman, provides new data and comparisons to the results of the 2007 Debit Issuer Study, released in February 2007. This comprehensive survey offers a revealing look at debit issuer performance, debit card trends and the latest debit technologies and service offerings.

“Although growth in debit use remains strong, debit card issuers are broadening their electronic payment services to include new payment devices, targeted cardholder perks such as surcharge-free programs, and greater levels of service,” said Cindy Ballard, PULSE executive vice president. “Based on survey responses, we expect this trend to continue over the coming years.”

A total of 62 financial institutions participated in the study, including large banks, community banks and credit unions that collectively issue more than 74 million debit cards, or 28 percent of U.S. debit cards. The institutions also represent 46,000 ATMs and are balanced across institution size, type, geography and network participation.

ATMs

Among issuers surveyed, 56 percent have cards that participate in a surcharge-free ATM network, while 84 percent of credit union respondents offer surcharge-free ATM service to their members for certain “off-us” transactions (transactions made by an issuer’s debit cardholders at ATMs owned by other issuers or organizations). Additionally, many financial institutions (48 percent of respondents) offer reimbursement of ATM surcharges, but usually to only a portion of their cardholders. Of the institutions that reimburse ATM surcharges, 45 percent limit total monthly per-cardholder reimbursements.

Other findings related to ATM programs included:

ATM transaction activity is increasingly “on-us” (transactions made by an issuer’s debit cardholders at the issuer’s ATMs), further limiting cardholders’ exposure to surcharges.
“Active” debit cardholders (most commonly defined by respondents as those that have made a signature debit transaction within the past 30 days) perform an average of 3.4 ATM transactions per month.

Heavy ATM users also tend to be heavy debit card users, implying that cardholders do not consider the “cash back” option often available with PIN debit transactions at the point of sale as a substitute for ATM withdrawals.

Debit Rewards

Offering a debit rewards program can have a variety of benefits for card issuers, including an increase in transaction volumes, differentiation from competitors and promotion of debit card use.

The availability of debit rewards has increased significantly since the previous PULSE study, with 51 percent of respondents now offering rewards, compared to 37 percent in 2006. An additional 23 percent of issuers surveyed say they are considering adding a rewards program.

The increase in debit rewards is driven mainly by a growing interest in cash rewards, which are now offered by 42 percent of respondents that have debit rewards programs, compared to 16 percent in 2006. Points-based rewards are the most common program type, offered by 58 percent of the institutions that have programs. Merchant-funded rewards programs are gaining in popularity and far out-pace other program types in terms of cardholder engagement (83 percent).

“Cardholder engagement remains a key challenge for debit rewards,” said Tony Hayes, an Oliver Wyman partner, who served as project lead on the study. “A sizeable portion of institutions we surveyed are planning to revamp their rewards programs in 2008 to generate greater customer participation and increased return.”

Emerging Payments

The 2008 survey is the first Debit Issuer Study to address emerging payments technologies. Although all emerging payments options have benefits, each faces significant growth challenges, says Hayes:

Contactless cards – Ten percent of respondents currently offer contactless debit cards (cards equipped with a device enabling the user to tap the card rather than swipe it). Another 35 percent say they plan to introduce this capability in the future. Of those that offer contactless, only 24 percent of their cardbase is contactless, on average. Key barriers to contactless adoption are low merchant acceptance, unfavorable cost/benefit ratios and low demand.

Mobile banking – Fifteen percent of respondents currently support mobile banking, and another 28 percent say they are planning to introduce it “soon.” With the technology still in a state of development, most issuers are taking a measured approach.

Mobile payments – Mobile payments (the technology includes mobile phones equipped with payments-enabled chips, as well as message-based payments) is largely in the research phase, with 56 percent of issuers exploring the possibility of implementing it.

“The 2008 Debit Issuer Study offered intriguing insights into financial institutions’ interest in and adoption of emerging payments technologies,” said Ballard. “In the coming years, increased use of such technologies will play a key role in helping issuers grow their electronic payments businesses.”

Sorry Charlie...The Cat's Outta the Bag

Last week I wrote in a post entitled "Sorry Charlie...You've Been Hacked" I talked about the two MIT engineering students who were hit with a restraining order which prevented them from delivering their talk on vulnerabilities that they found in Boston’s subway fare card system.

The Massachusetts Bay Transit Authority took legal action just before the students were going to discuss generating fare cards, reverse-engineering magnetic stripes, and hacking the RFID technology in the cards.

Ironically,
the very same presentation, including the sordid details of their hack ended up leaking (in a prime example of how things sometimes don't work out the way you envision them)...through the very same public court filings the MBTA submitted in an effort to keep them sequestered. Here are the presentation slides

Now, I'm no techie/tekkie? (see I don't even know how to spell it) but I know a little bit about magnetic stripes and RFID, and I found the presentation to be most interesting, so take a look if you wish. I don't know how long they'll be up there.

In a related matter, now that Defcon 16 has come and gone, I thought I'd share this story from DarkReading.com talking a little bit about the event:


All it takes is one look at the Defcon 16 hackable attendee badge to understand the difference between the world’s largest hacker convention and other security conferences.

The hard plastic badge includes its own microprocessor, SD card slot, USB ports, and an LED that can remotely turn off a TV. Defcon attendees could use their badge to hack other peoples’ badges or just wear it as bling. It’s such a hot item that on the first day of the Las Vegas show, the conference session rooms nearly emptied when it was announced that the badges had finally arrived at the registration desk after a shipment delay that morning.

While Defcon and its sister conference Black Hat USA share some of the same organizers, themes, and research hacks, Defcon's emphasis on hands-on hacking and its hardcore hacker culture set it apart. Defcon 16 featured multiple hacking contests, including one run by seasoned hackers who set traps and challenges for the masses trying to infiltrate a server, phone phreaking, and a $5,000 prize for being the last person left awake (and aware) after sitting through 30 hours of vendor pitches.


Interestingly, one of the more compelling research presentations never saw the light of day at Defcon: The MIT Charlie Card, Massachusetts Bay Transit Authority WarCarting Presentation) (see picture on right for what it takes to "warcart")


And for hackers or penetration testers who were feeling a little stagnated in their work, or who are operating on more of a shoestring budget these days, researchers from Errata Security shared some tricks of the trade they have come up with for doing more (hacking) with less. (See 'Bringing Sexy Back' to Hacking.)

Errata’s Robert Graham and David Maynor outfitted an Apple iPhone with WiFi-sniffing tools that they FedEx to their clients’ sites to conduct remote WiFi security audits. They may even up the ante by adding fuzzing and the Metasploit hacking tool to the iPhone as well for more advanced remote penetration tests.

A former Federal Trade Commission (FTC) official gave Defcon attendees tips for what to do (and not to do) after suffering a security breach, as well as how to make nice with law enforcement, which can smooth the way for that day when you have to go public about a breach your organization has suffered. (See What to Do After a Breach.)

Kelly Jackson Higgins, Senior Editor, Dark Reading

Retailers Told How to Stop Scams at the Register

Merchants looking to hold on to their sales have to help protect their customers’ financial information, a fraud expert told a gathering of businesspeople yesterday. Losing that information to data thieves “can be pretty catastrophic, especially for smaller merchants,” said Visa Inc. security expert Lauren Holloway.

Holloway is traveling the country this month and next to review data-security basics with merchants around the country. Her presentations are part of a joint effort by the U.S. Chamber of Commerce and the credit-card giant to help staunch the data breaches that are plaguing businesses and ruining the finances of some Americans.  Electronic payments passed paper checks in usage in 2003 and continue to outstrip the age-old payment method.

“It’s one of those issues that can reach out and hit anyone at any time,” said Laurie White, president of the Greater Providence Chamber of Commerce, which cosponsored yesterday’s presentation with the U.S. Chamber and Visa Inc.  Yesterday’s presentation is a timely one, coming a week after 11 people, including a U.S. Secret Service informant, were charged in connection with the hacking of nine major retailers and the theft and sale of more than 41 million credit- and debit-card numbers. 

The data breach is believed to be the largest hacking and identity theft case ever prosecuted by the Department of Justice, which charged the suspects with conspiracy, computer intrusion, fraud and identity theft. The indictment returned last week by a federal grand jury in Boston alleges that the suspects hacked into the wireless computer networks of retailers including TJX Cos., BJ’s Wholesale Club, OfficeMax, Boston Market, Barnes & Noble, Sports Authority, Forever 21 and DSW and set up programs that captured card numbers, passwords and account information.

In the case of TJX Cos., which operates TJ Maxx, Marshalls and other chains, hackers stole data on at least 45.7 million credit- and debit-card customers. A banking group that has filed suit against TJX Cos. alleges that more than 94 million accounts were affected.  Attorney General Patrick C. Lynch noted the breach at Framingham, Mass.-based TJX Cos. Inc., which occurred last year, and two others that affected Rhode Islanders — last year’s Stop & Shop PIN pad case and the ChoicePoint data loss in 2005.  Ross-Simons and CVS Corp. also have dealt with data-security issues in the last three years.

In the Stop & Shop case, four men diverted $132,000 from 1,100 bank accounts, using information stolen from the supermarket chain’s stores in Coventry and Cranston.  The 2005 breach at ChoicePoint Inc. compromised the financial data of as many as 145,000 Americans. In the scam, thieves posing as small-business customers gained access to the company’s database and at least 750 people were defrauded, authorities said at the time. According to the data-warehousing company, 1,122 Massachusetts residents and 203 Rhode Island residents may have been victims. The breach led to a change in Rhode Island law, which now requires businesses to disclose breaches to the public in a timely manner.

Small-business merchants accounted for more than 80 percent of the data-security breaches in 2007, according to an analysis by Visa (V:NYSE), the San Francisco-based company which operates the world’s larges retail electronic-payments network. The incidents are worrying consumers, Lynch and Holloway said. The consumer protection unit in his office handles about 40,000 questions from people annually, Lynch noted. “Never before, until this year, was identity theft in the top 10 — it shot right up,” Lynch.  Holloway agreed. “Consumers are definitely concerned; they’re more cautious about how they use [payment cards],” she said.

One simple way to protect customer data is to make sure checkout registers and electronic-payment pads are collecting only that data needed to process a payment and deleting any customer personal data as soon as it’s no longer needed, which could be instantaneously in most instances. The storage of full magnetic stripe information, security codes and PIN data is prohibited by industry agreement. Also, merchants need to train their salespeople to spot suspicious purchases, whether the transactions are made in person, over the phone or online.

Friday, August 15, 2008

It's Safe to Say "It's Not Safe" as "Card Skimming" Runs Rampant

It's Not Safe! (or, More on Reverse Matriculation...Bring the POS Device Home)

It looks like every day, that the argument to avoid retail POS machines and shop at home using HomeATM's wedgie is uniquivocally...gaining more and more merit and traction.

Over the last couple of days/weeks I've blogged several times regarding card skimming at ATM's, gas stations and retail stores.  Crooks are using card skimmers for ATM's/Gas Pumps  or, in the case of retailers simply stealing, temporarliy substituting, and then reacquiring a replacement PIN Pads, complete with the consumers personal card data.  The same thing is happening abroad, with Chip and PIN...albeit much more commonly than here.  But it's early yet.  You watch.  This type of fraud will grow exponentially. 

Using one's own private HomeATM Wedgie in the private space of one calls home simply protects  one's "private" financial card information.   Can I share something private with you? "I never used the word private 3 times in one sentence before". (nor will I ever again).  Okay then...moving on...

So, use a wedgie and shop at home as it is more secure than using a machine supplied by a retailer.  And on the plus side, you'll not only protect your identity, you'll also save gas, time and sales tax, let alone finding joy in eliminating the hassle out of having to find a parking space.   I've said that for weeks now.  In fact, as recently as this past Tuesday, in the post titled: "Cost Plus World PIN Debit Breach Spreads to Arizona" I stated:

"Once again, I reiterate that using a HomeATM Wedgie for online purchases is eminently safer and more secure than using a POS machine provided by bricks and mortar retailers. Look for more breaches similiar to the Cost Plus World one in the near future..."

Well, it sure didn't take long...

With that said, here's more proof as to why you need a HomeATM Wedgie!

From Telegraph.co.uk: "Gangs have developed tiny devices which can be secretly inserted inside the check-out card readers to unscramble codes and reveal the unwitting customers' pin numbers. The information is then used to their clone victims' cards in order to withdraw large sums of money abroad in countries where chip and pin technology is not in use.  Police say 30 shops – including several petrol stations - have already been targeted by the scam, which came to light after a suspected card fraud factory in Birmingham was raided on Monday.  Gangs steal the card readers, insert the device and return it to the shop before anyone realises that a crime has been committed". -

This is a story from today's "This Is London.co.uk"  Criminals have come up with a new fraud targeting the chip and PIN cards used by shop and petrol station customers across the country.

They are stealing card-reading machines, taking them apart and installing devices which record card numbers and PINs, before returning them to the store.  In some cases, detectives fear the installed devices are so hi-tech that they can transmit customers' card details to a mobile phone.  Cards are then cloned and used abroad in countries including the United States, Italy and Australia where cash machines do not have to read the unique microchip embedded in British cards.

Police have issued a warning about the fraud after arresting two men at a card-faking factory in Birmingham.  A raid on a house found stolen chip and PIN terminals, card account numbers, card readers and counterfeit magnetic stripe cards. The criminals targeted shops by threatening or bribing staff to give them the card machines or getting a job there themselves.

In some cases, they posed as engineers and took the machines away for an 'upgrade'. Experts warned last year that chip and PIN, which was launched in 2006 to cut card fraud, is not as secure as banks claim.

A Cambridge University team said it is simple to swap a doctored machine for one in a store. While the new system has marginally cut such crime in Britain, its introduction has not stopped criminals using fake cards overseas.

Card fraud abroad has increased by 77 per cent – and cost £207.6million – in the past year. Specialist officers from the Dedicated Cheque and Plastic Crime Unit said the Birmingham factory had stolen card machines from 30 shops, supermarkets and petrol stations across the country.  The gang had been operating for weeks and thousands of cards had been read.  Detective Inspector John Folan, the unit's head, said: 'These arrests are a significant development in our fight against the organised criminal gangs responsible for this type of fraud.'


Sandra Quinn, of Apacs, which runs the payment clearing process for banks, said: 'Whereas fraudsters used to put pinhole cameras above the chip and PIN device to get hold of the number, they now manipulate the chip and PIN terminal to get that basic data. They are getting hold of the PIN from inside the reader. 'We have been aware that this has been going on because police have been getting reports that terminals are being stolen.'

Related Stories: 

Raid Turns up Chip and PIN Fraud  Financial Times
Toronto Man Charged in ATM Skimming Fraud  London Free Press
The Great BankCard Robbery!   Daily Star UK
UK Retailers Unprepared for TK (sic)  Maxx-Syle Hack  Times Online UK

Report: U.S., Overseas Retail E-Commerce Recession Resistant

A report put out today by Sanford Bernstein analyst Jeffrey Lindsey claims the same disparity in growth between the U.S. and the rest of the world exists in e-commerce as exists in economic growth overall.

Online retail commerce will rise only 14.3% in the U.S. in 2008 (still not a bad showing, I would imagine), but 26.5% overseas, writes Lindsey. That adds up to 21.5% combined, and even if economic growth slows globally, Lindsey expects e-commerce numbers to prove relatively resilient.

In a worse case scenario, where a drop in real U.S. GDP of 1.5% to 1.9% occurs for three to four quarters, Lindsey thinks online retail e-commerce would still increase by 18% this year.

Bear in mind that the overseas markets use e-commerce less, points out Lindsey, so they’re able to grow faster — online makes up only 2.5% of all retail overseas, he says, versus 3.5% in the U.S., which should help overseas outperform U.S. e-commerce for the next 5 years, he predicts.

Other factors of growth include the low but rapidly growing online user base in other countries, and the shift of dollars from offline to online purchasing for furniture, appliances, event ticket sales, electronics and packaged goods, in particular. Lindsey thinks use of broadband wireless on cell phones, moreover, could “cannibalize” a lot of purchasing done via desktop computers, rather than expanding the pie.

In conclusions, Lindsey writes, “Despite expectations of a worsening macro-economic environment and evidence of deceleration of U.S. e-commerce in certain sectors such as personal computers, we continue to believe that the retail e-commerce sector has a very high degree of recession/downturn resistance.” One note of caution: the dollar, if it continues to strengthen, could somewhat crimp overseas online buying. 

Lindsey has an Outperform rating on Amazon.com (AMZN) and a price target of $97, and an Outperform rating on Ebay (EBAY), as well, with a price target of $38.  Today, Amazon is down 73 cents, or .8%, at $87.30, while eBay is off 28 cents, or 1%, at $26.33.

HomeATM's PIN Debit Offering Helps SMS Achieve 108% Gain

As Stated by SmartCard Marketing Systems Inc. (PINKSHEETS: SMKG) "Management is pleased to announce Prepaid card loading and payment processing volume continued at expected levels during the 2nd quarter. Card loads and payment processing for the 2nd quarter of 2008 was $458,688 compared to $272,937 in the same quarter of 2008, a 68% gain for the quarter. In the first six months of 2008, SMKG processed $889,583 compared to $317,177 for 2007 representing a 180.4% gain for the first half of the year and attaining the $1 million milestone in July of 2008. Operating losses were cut by 40% for the first half over the first 6 months of 2007, from $182,013 in 2007 to $109,169 in 2008.


We are very pleased with these achievements as it is a difficult segment to establish an online presence in the Money remittance Industry and to continuously grow our base of customers daily."

As the company continues to deliver prepaid card programs and rollout of the Pin Debit HomeATM offering through Velocitymoney.com and Velocitymerchant.com sales, revenues/commissions from transactions continue to grow.

Contact:
Max Barone, CEO  1-866-774-2555
maxbarone@gosmartcard.com

Disqus for ePayment News