Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Businesses IT Your Rights Online

Changing Customers Password Without Consent 435

risinganger writes "BBC News is reporting that a customer had his password changed without his knowledge. After some less than satisfactory service the customer in question changed his password to 'Llyods is pants.' At some point after that, a member of staff changed the password to 'no it's not.' Requests to change it back to 'Llyods is pants,' 'Barclays is better,' or 'censorship' were met with refusal. Personally I found the original change funny, like the customer did. After all, god forbid a sense of humour rears its ugly head in business. What isn't acceptable is the refusal to change it per the customer's requests after that."
This discussion has been archived. No new comments can be posted.

Changing Customers Password Without Consent

Comments Filter:
  • by MiKM ( 752717 ) on Thursday August 28, 2008 @12:12AM (#24774985)
    What worries me more is that they are storing the passwords in plaintext.
    • by Al Dimond ( 792444 ) on Thursday August 28, 2008 @12:16AM (#24775021) Journal

      And I thought I had a shot at getting this in first...

      Maybe he should make his new password "Lloyds security is pants"

      • Re: (Score:3, Informative)

        by Firehed ( 942385 )

        Not only is it being stored in plaintext (or at least not as a one-way hash), but presumably it's also visible in the administrative interface to the site. Does <input type="password" /> not have any meaning in those parts?

        • by EdIII ( 1114411 ) * on Thursday August 28, 2008 @01:42AM (#24775507)

          It's a voice password. It is the employee on the phone that has to enter and verify the voice password. It is probably not being stored in plain text and it is entirely appropriate, and indeed required, that the administrative interface view the voice password as entered by other employees.

          The only concern here is that an employee changed the voice password without authorization. Anytime an employee changes a password there should be records of the interaction. Call logs, voice logs, notes, etc.

          Now in this case, the choice of the password might be deemed offensive. However, it seems that there was no clear and consistent policy enforced as to what a voice password could be.

          • Re: (Score:3, Informative)

            by SEMW ( 967629 )

            Anytime an employee changes a password there should be records of the interaction. Call logs, voice logs, notes, etc.

            What makes you think there wasn't? It's not as if they can't find the culprit due to a lack of logs; the article says they identified and fired them.

            • by EdIII ( 1114411 ) * on Thursday August 28, 2008 @02:41AM (#24775745)

              I think you missed my point. There were no call logs, voice logs, notes, that identified an interaction with the customer when the voice password was changed.

              The fact they know which employee modified the password means that anytime customer information is changed they log which employee was responsible for it. That's good policy.

              So since the voice password was changed, and there are no records of the customer calling in and asking for it, the employee was disciplined.

              I thought that was clear from my post.

          • by igb ( 28052 ) on Thursday August 28, 2008 @03:22AM (#24775927)

            Actually, LTSB verification involves being asked for (three, I think) letters from your password / passphrase. I believe that the operator has no access to the letters involved --- they are prompted to ask for three and eight, type them in, and now know what they are. If you don't know, they don't either: the letters aren't displayed to the operator. Online, you supply a username (which is related to you, not to your account) and password, and are then prompted for three characters from a passphrase as pull-down menu items (presumably to make key-loggers a little less useful). The telephone and online systems use different passphrases.

            Now of course this isn't flawless: there are a lot of attacks one can envisage, mostly involving operators always asking for different letters --- ie if they already have three, five and eight, and are prompted to ask for three, five and nine, they ask for four, six and nine, supply three and five from their previous knowledge and now have six letters instead of the four they would otherwise have. By this technique they can get the password in n/3 attempts, less if (as is likely) you don't need all the letters to see what the whole word/phrase is. It's a thin attack given the chances of you arriving at the same operator, or the operator's confederate, that many times, but might be possible as a large conspiracy by a corrupt call centre (LTSB have in recent months re-on-shored all their call centres; make of that what you will). If you fail to authenticate, for whatever reason, you're asked for the same characters next time, so an attacker cannot make repeated attempts hoping to be asked for characters they already have if they don't get a favourable set the first time.

            Some things about this story don't ring true, by the way. Firstly, LTSB have not, to my knowledge as a customer, had a limit on the length of pass phrases either for telephone banking or on-line banking as short as is claimed. The on-line `memorable information' (ie password) is six to fifteen characters, spaces not permitted, and I can't believe the voice system is different.

            There are some things that could be improved. You can change the greeting between given name, given name plus surname and a few other options, but you can't have a custom greeting. That's a powerful phishing prevention mechanism: if I can customise my bank's website to greet me, after supplying my password but before supplying my selected characters from the passphrase, with a picture I supply (say) then that massively ups the problems a phisher faces. I have my passphrase as six random characters (ie knowledge of five doesn't provide the sixth) so that if I'm ever asked for character seven or greater I know something bad is happening, but it's not ideal. But the rest they do well: initial contact URL is https and won't work as http, ie http://online.lloydstsb.co.uk/ [lloydstsb.co.uk] doesn't answer, so anyone bookmarking it will bookmark the https. Menus don't accept keyboard accelerators. More if I could think of it before my first coffee. I checked it through pretty thoroughly before signing the ts and cs, and I'm reasonably happy.

            ian

            • by Lonewolf666 ( 259450 ) on Thursday August 28, 2008 @03:49AM (#24776131)

              Actually, LTSB verification involves being asked for (three, I think) letters from your password / passphrase. I believe that the operator has no access to the letters involved --- they are prompted to ask for three and eight, type them in, and now know what they are. If you don't know, they don't either: the letters aren't displayed to the operator.
              In this case, the system seems to have a hole somewhere:
              Somehow the operator was able to substitute another password. His choice of new password indicates that he could read the entire old password.

              Unless there are some other safeguards in the system that were not mentioned in TFA, I would be seriously concerned about criminal operators abusing my account (hypothetically speaking, I'm not a customer at LTSB).

          • by MrMr ( 219533 ) on Thursday August 28, 2008 @03:28AM (#24775975)
            Now in this case, the choice of the password might be deemed offensive
            When you think a 'plc.' can be offended you are antropomorphizing abstract legal entities. Don't do that; they really hate it.
    • by chill ( 34294 ) on Thursday August 28, 2008 @12:18AM (#24775041) Journal

      From the article it sounds like a voice code phrase to authenticate yourself over the phone. They staff has to be able to see it to verify it. It isn't a computer password.

      • by Jedi Alec ( 258881 ) on Thursday August 28, 2008 @02:37AM (#24775733)

        From the article it sounds like a voice code phrase to authenticate yourself over the phone. They staff has to be able to see it to verify it. It isn't a computer password.

        "I am the systems administrator. My voice is my password. Verify me."

    • by Anonymous Coward on Thursday August 28, 2008 @12:32AM (#24775131)

      My bank has a password to verbally verify over the phone. It's the street I grew up on, so I just say Cottage Rd. But seriously, I have to say my street name every time, and I assume the operator is looking at it to verify. I doubt they're going to type it in an verify the hashes.

      • by Psychotria ( 953670 ) on Thursday August 28, 2008 @12:44AM (#24775201)
        That was a bit silly. Now I can just ring the bank and say my name is "Anonymous Coward" and my password is "Cottage Rd". This means I can transfer all of your funds... didn't think of that did ya!
    • by brianjlowry ( 1015645 ) on Thursday August 28, 2008 @12:51AM (#24775237)
      You act like they are storing important information in the DB... like it is a BANK or something.
  • Legal Problems (Score:3, Insightful)

    by Detritus ( 11846 ) on Thursday August 28, 2008 @12:17AM (#24775029) Homepage
    Does UK law cover "sexual harassment"? Employers in the USA have to worry about defending themselves against claims of sexual harassment, which can be quite broadly construed, even when a customer is the source of the alleged harassment. Anything that someone, somewhere, finds offensive, can be evidence of a "hostile work environment".
    • Re:Legal Problems (Score:5, Interesting)

      by Ixitar ( 153040 ) on Thursday August 28, 2008 @01:03AM (#24775307) Homepage

      I just love the hypersensitivity out there. I was on a project years ago where there were duplicate records on companies. One fellow that I worked with wrote a drag and drop application to eliminate duplicates. The user would drag the "good" record over an icon for the good company record and drag the "bad" record over the icon for the bad company record. The good company icon was a building in white with a halo over it and the bad company icon was a building in red with horns. I told him that someone with no sense of humor is going to tell him to change the icons. Sure enough, he was told to change the icons so as to not potentially offend someone's religious faith.

  • by RevWaldo ( 1186281 ) on Thursday August 28, 2008 @12:25AM (#24775095)
    In the UK "pants" is the term used for underwear.
    It is also slang for rubbish (that's "crap" for Americans.)

    This doesn't speak well for the state of British underwear, but whatever.
    • Don't get your knickers in a twist.
  • Ok, and... (Score:5, Funny)

    by narcberry ( 1328009 ) on Thursday August 28, 2008 @12:30AM (#24775123) Journal

    I read the article and it only reports half the story.

    Sure he tells us all about his password and what he is using. But what was his account name?

  • by CrazyJim1 ( 809850 ) on Thursday August 28, 2008 @12:33AM (#24775135) Journal
    I called in and asked,"Can you give me my password?"
    Him "Ok give us your information."
    Me: I gave him my information.
    Him"You want your password now?"
    Me:"Yes please."
    Him,"Biteme."
    Me:"What?"
    Him,"Biteme is your password."
    Me,"Oh... Thanks..."

    I made a mental note,"Do not make passwords that will embarrass me if I have to call in the phone"
    • Re: (Score:3, Funny)

      by dmneoblade ( 848781 )
      Alternately, DO make passwords that will embarass people if used over the phone. Great way to slip in a little casual trolling. For added bonus, use a passphrase that is the entire lyrics to a song. For traditions sake, Fresh Prince of Bel Air and Never Gonna Give You Up are excellent choices.
      • Re: (Score:3, Funny)

        by Firehed ( 942385 )

        You want to get rickrolled when you have to call in and have your password changed? I'd much rather be told how nice I look today or that the kind phone attendant would like to do something with me that's considered impolite on a public forum.

        Most unfortunately, I haven't found a good way to set conditionals in password reset utilities that will prompt a vastly different response from a female assistant than a male. As such, avoid calling from a speakerphone, or you could end up having a very, very intere

    • Re: (Score:3, Funny)

      by Jugalator ( 259273 )

      Or set it to "wannafuck" and hope the one on the other end sounds like a hot member of the opposite sex.

      A bit risky plan though.

  • by Aardpig ( 622459 ) on Thursday August 28, 2008 @12:41AM (#24775177)

    ...that neither the submitter nor the editor (samzenpus) are able to spell the word 'Lloyds', despite it appearing a number of times in the original article.

    Let's petition CmdrTaco to banish samzenpus to Idle, where his delusions of adequacy will better fit in.

  • plaintext passwords (Score:3, Informative)

    by Fusen ( 841730 ) on Thursday August 28, 2008 @12:44AM (#24775197)
    for people questioning why the bank has your password in plaintext, this is because in the UK they have ALL your info in plain text.

    Your complete credit card details including 3 digit security code on the back.

    Your complete address, maiden name, old addresses etc etc.

    They use all of this info to verify who you are before they tell you anything about your account, so you ring up and say "Can I see my balance", and they ask for random bits of the stored info.

    You just have to hope that they aren't dodgy employees as they could quite easily steal it all if they wanted.
    • by jrumney ( 197329 ) on Thursday August 28, 2008 @01:08AM (#24775349)

      You just have to hope that they aren't dodgy employees as they could quite easily steal it all if they wanted.

      Or back it up into unencrypted ISO images on their hard drive then sell their laptop on ebay, which seems to be standard practice at UK banks, Inland Revenue and other organizations which deal with such personal information.

      • by Arimus ( 198136 ) on Thursday August 28, 2008 @02:50AM (#24775777)

        What hacks me off the most is that where I work (defence contractor) we have to have baseline encryption on our entire laptop drives and a second encrypted area for the more sensitive stuff. USB drives have to be encrypted as well, and PDA type (so ipod's phones etc) devices can't connect unless you are in the priviledged few who need to share data with external agencies or with our test systems.

        (My personal laptop (the one I'm typing this on) I've got my own encrypted linux filesystem on, only the windows bit isn't encrypted and bar photoediting its not used much)

        Why if we have to jump through various hoops or lose our supplier status can't the UK government departments and contractors working directly on their behalf do the same? (And ditto for banks.)

        Everyone involved with handling personal data needs to look into data minimization and data protection (integrity, access control, non-repudation, auditing, the whole shooting match), and any company found not doing so should be banned from handling personal data ever again. Government departments are harder to control (after all the MPs won't vote in a law which would neuter the IRS ;) ) - so make the law such that the minister and the civil servant in charge of the affected department face a 1 month jail sentance for every 100 records lost, loss of pension rights, barred from being company directors etc...

    • by mcrbids ( 148650 ) on Thursday August 28, 2008 @02:49AM (#24775775) Journal

      Everybody knows passwords. We're all used to them. But they suck rather miserably for real security. They are a vast improvement over nothing at all, but they just aren't good enough, anymore.

      All it takes is one leak of your password, and you're hung. Worse, you don't know that you're hung. You can't let somebody else use your password. Ever. You can't ask a family member to enter it in for you while you're on the road while they look up your bank balance on the way to the airport without disclosing your password.

      And lots of people can see your password. Techies. Poorly-paid tech support people in India. System administrators. Clerks, counters, janitors, and people who dig up your stuff out of the pile of computer hardware behind XYZ large firm.

      Passwords are a terrible, terrible idea for security, and have left the social environment highly vulnerable to vast compromises.

      On the other hand, dual-key cryptography is rather good for security.

      It doesn't matter who sees the key exchange. If somebody else gets your public key, it doesn't weaken the strength of your private key. Nobody else can see your private key. You don't need to disclose your private key to anyone to use it.

      Personally, I'd like to see a password-key machine. Basically, a weak form of dual-key cryptography (at least as effective as a password) stored in a small doohickey. It has your private key. Rather than type in a password, you are given a set of characters that you need to encrypt with your doohickey. You type the characters into your doohickey, and indicate which private key you want to use. (since it's private, you really only need one)

      You enter in the passphrase for your private key. You enter the response back into your website, whatever.

      Weaknesses? Not many.

      1) You can lose your doohickey. At which point you need to get another one, regenerate a private key, and hand out new public keys to everybody. But even with the doohickey, $RandomBadGuy can't do much without the passphrase. Which is not a "password" in the usual sense because it's only stored there, in the doohickey and cannot be seen by anybody else.

      2) You can use your doohickey thru the phone. Your son-in-law is checking your bank balance for you, and you want him to - this time. He sees the challenge, and tells it to you. You enter challenge into doohickey, give him the response, and he types it in. That gives him nothing more than a login that time, because next time, the challenge will be different, and without doohickey, he can't do anything more.

      3) Nobody else sees your private key. It's yours. It's private. Websites and such will have your public key, but it won't help them any since they don't have the private key that matches.

      Doohickey doesn't have to be much - it could easily fit into a cell phone. Processing a small, 32-bit key isn't difficult, and the challenges don't have to be very long to well exceed the security of your average password. (EG: Wife's middle name, the street you were born on, etc)

  • by Rupert ( 28001 ) on Thursday August 28, 2008 @12:50AM (#24775233) Homepage Journal

    Mr. Yorkshire Bank Plc Are Fascist Bastards was able to get a judge to order Yorkshire Bank to issue him a cheque payable to his full name.

  • by Anonymous Coward on Thursday August 28, 2008 @01:01AM (#24775287)

    My Dearly Beloved Lloyds customers.

    I encourage you all to change your passwords to Lloyds is pants in protest at this stupid bank's actions.

    Thank you sincerely for your cooperation.

    Mrs Mariam Abacha, Lagos, Nigeria

  • Six letters? Bollox. (Score:3, Interesting)

    by zobier ( 585066 ) <zobier@NoSpAm.zobier.net> on Thursday August 28, 2008 @01:13AM (#24775379)

    "The rules seemed to change, and they told me it had to be one word, so I tried 'censorship', but they didn't like that, and then said it had to be no more than six letters long."

    I would have then asked for it to be changed to bollox and then proceeded with increasingly vulgar suggestions. Fanny would be a good choice.

  • New password (Score:3, Insightful)

    by AndyFewt ( 694753 ) on Thursday August 28, 2008 @01:22AM (#24775423)
    New pass: "Gagged" It meets the no more than 6 letters condition.
  • by Eil ( 82413 ) on Thursday August 28, 2008 @01:29AM (#24775455) Homepage Journal

    Until a few months ago, I did some helpdesk work at a web hosting provider. When a customer calls in, we are required to make them verify that they are the account holder by telling us either the last four digits of their credit card or their hosting account password (which they specify when they're signing up for service).

    One day, a new customer calls in and says he's having some trouble setting up DNS and would like some advice. He's maybe in his late teens or early twenties He gives me the account number. I notice that he makes his payments via PayPal. When I see his password, I hit mute on the phone and giggle for a few seconds. After my composure is somewhat regained, I unmute and ask him to verify his account password for security purposes.

    You could almost hear him tense up. When he starts stuttering, I was sure he never stopped to consider that he might have someone

    "Ummm, uh, it's fuckyou2dickhead."

    I helped him through his DNS questions as politely as possible and we got along pretty well. Before hanging up, he asked if there was a way he could change his password online. I said yes, through our monitoring and billing system.

    He gave a huge sigh of relief.

  • SL did that to me (Score:4, Informative)

    by tsa ( 15680 ) on Thursday August 28, 2008 @01:39AM (#24775493) Homepage

    Linden did that to me with my Seconf Life account, after a crack of their server in 2006 IIRC. They told customers to answer a few questions about who their friends were etc to get their passwords back. I had been there only a few days and I didn't know how to spell my friends' names. Thanks to their crappy customer service I never could log back in. Luckily I didn't have a paid account. I was pretty angry at them, and rightly so I believe. It's very inconsiderate to change customer's passwords without their consent. They did it to protect their customers and I understand that, but I guess I was not the only one who was forced to make a new account.

  • by evilviper ( 135110 ) on Thursday August 28, 2008 @02:15AM (#24775629) Journal

    Personally I found the original change funny, like the customer did.

    The change would be funny from a small company that you do some business with, but NOT FROM A BANK. Any sign of employee impropriety with sensitive information that your life savings depends on, is downright scary. And losing money might be the best outcome... A couple suspicious transactions is all it would take to raise a red-flag, and automatically trigger a police investigation for possible (drug/weapons/terrorist) money laundering.

    I want nothing but monotonous, joyless, boring bastards handling all aspects of my bank account. In fact, computers would fit the bill perfectly.

  • Next time.. (Score:3, Funny)

    by Stormie ( 708 ) on Thursday August 28, 2008 @02:55AM (#24775805) Homepage

    ..try "Lloyds ist toten hosen"

    They probably won't change that one.

  • by awol ( 98751 ) on Thursday August 28, 2008 @02:59AM (#24775823) Journal

    My bank asks me the jth and kth letters of my password and never (and corresponds regularly to tell me so) asks for my complete password. Whilst this suggests they they do have the plain text stored on their system, could one devise a system that encrypted each letter of the password in some way that did not compromise the security of the stored hashes any more than the original hash?

    Assuming a "strong" 8 letter password and two letters for verification it means that there is a 1 in 676 chance of a client guessing correctly in a single operator/client session. Not an unreasonable risk given the securiity that could be built into the session to avoid brute strength attacks.

    I am having a bit of a think about it and I can think of a couple of techniques, but I am not sure that they are worthwhile. For example;

    Just store the all the encrypted pairs (NC2) where N is password length, assuming 8 characters, only 28 combinations. Can these be stored without compromising the crackability of the whole password? I guess it would but by how much is a bit beyond my thumbnail calculating ability. Or;

    Can we build a sufficiently strong transposition cypher so that we can compare specific letter positions encrypted without knowledge of the other letters?

    My other bank uses SMS messages with one time codes to do verification. That seems to be very effective.

  • by cheros ( 223479 ) on Thursday August 28, 2008 @03:55AM (#24776163)

    The first question you should ask is how a rep can change a customer password without his permission and knowledge. All you need is one with criminal connections and he'd be able to start messing with accounts for a while. Do this for a month, hit a couple of big ones at the end and disappear.

    If I were the customer I'd go after the bank re. diligence failure. I couldn't care less about the pettiness (as ex Lloyds customer I agree 100% with the sentiment expressed), but I would raise serious questions about the processes involved, from HR to account management.

    If I were the customer I would now insist on choosing a new password (as the entire planet knows the old one) and I think something like "You are all complete morons" would be suitable:

    "What is yous password, Sir?"
    "You are all complete morons"
    "That is correct, Sir, thank you"
    :-)

  • wrong tree (Score:3, Insightful)

    by Tom ( 822 ) on Thursday August 28, 2008 @04:23AM (#24776323) Homepage Journal

    "funny or not" isn't the right question to ask here.

    The right question is: "Why was customer service able to access his plain text password?" - when every book about security tells you to store passwords hashed. They should never even know what his password actually is.

    • Re: (Score:3, Informative)

      by fotbr ( 855184 )

      RTFA. VOICE password. The person answering the phone for the bank needs to be able to see it to verify the caller is indeed the account holder.

  • Acceptable (Score:3, Insightful)

    by QuietLagoon ( 813062 ) on Thursday August 28, 2008 @07:52AM (#24777311)
    What isn't acceptable is the refusal to change it per the customer's requests after that."
    .

    Two additional things are not acceptable:

    1. the customer service rep having access to the plain text password (corollary: passwords being stored in plain text)
    2. the customer service rep changing a customer's password without the permission of the customer
  • by josepha48 ( 13953 ) on Thursday August 28, 2008 @12:15PM (#24780605) Journal
    that someone else knew what his password was. That means that they track and can read your password. I don't think that would make me feel comfortable. I would hope that passwords were stored encrypted and not decryptable by staff.

Get hold of portable property. -- Charles Dickens, "Great Expectations"

Working...