Data Exposed In Stratfor Compromise Analyzed 141
wiredmikey writes with an excerpt from an article in Security Week: "Following news that security and intelligence firm Stratfor is downplaying the recent hack of its systems, Identity Finder today shared a detailed analysis of the data released so far by the attackers. Based on the analysis, 50,277 Individual Credit Card Numbers were exposed, but 40,626 are expired, leaving just 9,651 that are not expired. In terms of emails, 86,594 Email addresses were claimed to be exposed by the hackers, but only 47,680 were unique. The hackers have released personal information for Stratfor subscribers whose first names begin with A through M, with N through Z expected to be released soon. In addition to the presently published data compromised during the attack, the attackers claim that 200GB of company email containing 2.7 million emails was captured as well."
As of posting, Stratfor's website is still down.
"Donations" to Charities (Score:4, Informative)
Except that they were all reversed with chargebacks, which not only took back all the money given, it actually cost the charities around $250 000 in chargeback fees which are now off from what other, legit people donated. Awesome job there! Idiots...
Re: (Score:3, Insightful)
Re:"Donations" to Charities (Score:4, Informative)
Re: (Score:2)
Re: (Score:3)
Re: (Score:3, Insightful)
Good PR? Give me a break. Banks don't give a rats ass about PR because they mostly 0wn this planet, and there is literally nothing that will stop them from 0wning it more. I mean, they seriously damaged the world economy, put lots of people into excruciating hardship in the US, and there they are. PR didn't really play a role in this.
So no, they will take the money for t
Re: (Score:1)
Re:"Donations" to Charities (Score:5, Funny)
In related news, I know a PR guy who's looking for a job...
Re: (Score:2)
In related news, I know a PR guy who's looking for a job...
I know that guy, he's pretty good. He wwebsite as on the internet when you were a sperm in your daddys balls, and is a good friend of Cliffy B, Scott Lowe, the guys from Penny Arcade and the mayor of Boston.
Think it through a little more thoroughly: (Score:3)
"it would be good PR for a bank to cover it for the charities"
You don't understand. The smart PR move is to let the charges stand without comment. That way the charities talk about it to their donors when asking for more funds to make up the difference.
The banks are already not well thought of currently. This makes no difference to them.
Net result: A lot of people who had never heard of Anonymous before their favorite charity mentioned them now hate their guts.
Re: (Score:1)
Re: (Score:3)
what you're saying is that you could have bankrupted any company with the cards.
this is high profile enough to just end up as a special case, with the transactions reversed in one large batch by the affected cc processors.
anyhow, it's up to the card owners to dispute.
the real wtf is what the hell were they storing the card data for? this means stratfor should lose any possibility to do cc payments in future, having vastly fucked up following guidelines.
Re: (Score:3)
The only way someone gets bankrupted is if they didn't validate the cards properly.
Now validation costs money to do properly, but failing to validate can cost a lot more. It is like $0.30 plus staff time to do proper validation vs. $25 or $35 to deal with a chargeback.
See, validation makes sense, especially if you are subject to lots of fraud. Anytime a credit card number is taken on the Internet you can assume at least 20% of the entries are fraudulent and you better handle that - because if you submit m
Re:"Donations" to Charities (Score:5, Informative)
Banks? There are no "banks" involved with chargeback fees.
When you sign up for a merchant account , you are contracting with a "merchant services provider". They are the ones that are handling the credit card transaction processing. When you get paid, they put money into the transfer account as per your agreement - then a bank is involved. Until the, you are dealing with a reseller (probably) and some place like First Data which is not in any respect "a bank".
You might be able to get your merchant services provider to back off on some massive fraud and not charge you the full $25 for each and every single chargeback. However, a lot of this is dictated not by your merchant services provider and not even by First Data but relates to the fact that people get involved at both the bank (where your money got put) and also with the customer card accounts themselves. When First Data processes a charge in error and it shows up on some poor customer's statement, they likely have to pay a service fee to the customer's credit card processing company to get the charge taken off. Now that might be a bank.
So the likelyhood of getting the charges waived is pretty low. It costs real money to screw with credit cards and if you aren't properly valididating the transactions - before submitting them - you are going to run up some big bills. Did these charities do proper validation and find out they were being scammed? Hope so, because then it would not have cost them anything. If they ran the charges through, they are likely going to have to pay.
Re: (Score:2)
Excellent representation of the processing of transactions. Most people don't realize that processing of credit card transactions in the US don't really involve banks other than authorizing of the transaction (meaning there is either money in a checking account for debit cards typically or credit available on a credit account) and acting as the receiver of the transfer for the merchant once the transactions are settled. :)
Interested in a job
Re: (Score:2)
Banks can be service providers as well. I know for a fact that Wells Fargo is. Perhaps a different unit of Wells Fargo from their core banking unit, but still Wells Fargo, a bank.
dont leave out Visa and Mastercard (Score:2)
all of those transactions go through Visa and Mastercard, depending on which type of card you have.
Re:"Donations" to Charities (Score:5, Informative)
It doesn't matter if they're a charity or not. They may have managed to talk the bank out of some of the fines, but that'd be about it.
One place I worked, which did high volume CC transactions, the typical sale was $25. A chargeback resulted in the bank taking back the full amount ($25) plus fine ($35).
We worked hard to avoid chargebacks. As I recall, you can lose your merchant account if you exceed 1% chargebacks. Before the chargeback is done, the merchant is given a "chargeback notification". At that point, we can dispute, refund, or ignore it. Since we were an online company, we didn't have a physically signed receipt to prove that the person was actually the purchaser.
With a signed receipt and someone to confirm that they visually verified the identification, you can dispute.
We opted to refund, and cancel their account. That way, we simply didn't make the value of the sale, but there were no fines applied. So +$25 on the transaction. -$25 on the refund. $0 total.
Finally, is the option of ignoring it. +25 transaction, -$25 refund, -$35 fine. -$35 total.
Typically, the consumer would call first, before the chargeback. We'd assist them in finding out the details of the transaction. We'd give them the time, date, information about the IP, and email address used with it. Most of the time, we could positively say that the transaction occurred in their location (by the IP and ISP). They'd recognize the email address as belonging to someone else in their household. If they wanted, we would cancel the account and refund the full amount. I'd say refunds occurred about 50% of the time. They'd talk to their family members, and find out that they had done the transaction, the card holder just didn't know, but they allowed it anyways.
For us, it didn't matter that much. We handled millions of dollars a year. Who cared about a few dozen refunds in the same period. It was cheaper to refund and make the consumer happy, than dispute and risk incurring the fines, and risking our merchant account status.
I know people will stolen card information will test it by donating a small amount to charity. People won't generally notice a $1 or $5 charge on their card, if it's frequently used. They'll catch on when the card is used the second time for a high dollar transaction. The idea of the test transaction is only to verify the card. It's easy, and they don't have to provide a valid delivery address for merchandise. They aren't doing it out of good will, they're exploiting the system a bit more.
Re: (Score:2)
So, in other words the charities can take option 2 (and probably have standing orders to that effect) and be out nothing.
Re: (Score:2)
They could.
I can't say if they do or not. It's really up to them how they manage things. They may try to play hard ball, to avoid "buyers remorse". It may feel good to donate a bunch of money. The person may realize later that it was more than they could afford. If they confirm that the purchase was legitimate, it becomes a more difficult task to get the chargeback. I say difficult, but not impossible.
We just chose to take the path that is best for the customer. We'd rather please the consumer, who
Re: (Score:2)
Didn't the Great Banking Coup of September 2008 teach you anything? Banks can justify whatever they want, and we all have to take it, because there is no regulatory oversight anymore.
Re: (Score:3)
Re: (Score:2)
And if Hyperbole doesn't, Starvation will.
Re: (Score:3)
After 10 years working in the credit card industry I can tell you that banks rarely pass up and opportunity to hit merchants with fees and charities are nothing more than merchants to them. The theory they go by is that merchants should be able to tell what transactions are fraudulent but really it's just an excuse to charge for the trouble of having to deal with charge backs (and make a little extra money on the side)
Re:"Donations" to Charities (Score:5, Funny)
yeah yeah about that, do you have the URL for donation pages for RIAA and MPAA?
Re: (Score:3, Informative)
Indeed. Good job, Anonymous! [twitter.com]
Re: (Score:1)
That's kind of messed up. If I were the banks... I'd try to find some way to 'forgive" that or charge the whole incident to the credit card fraud department. Credit cards charge such high interest in part to pay for such things. Just tap that fund for this and leave the poor charities alone.
Charities? (Score:2)
I hopped over to Stratfor's Facebook page and one of the people who posted on it said their credit card info from Stratfor had been used at the well known charity called the Blizzard Store. ;)
Re: (Score:2)
Where does this even come from? The credit card numbers were given to stratfor. That's for security analysis. Where do you make up this collateral damage crap here?
Do you really use the same credit card to sign up for security analysis as you do for donating to red cross, even if you're the government? I doubt it.
Re: (Score:3)
From the ArsTechnica article:
According to Antisec, Stratfor was using the e-commerce suite Ubercart to handle customer information. The software has built-in encryption, but Stratfor apparently used custom modules that stored customer data in cleartext. Additionally, Stratfor appears to have stored the card security code of its customers, a practice generally prohibited by credit card companies.
Why the hell did Stratfor store credit card numbers in plain text ?
They totally deserve what happens to them, I hope they'll have to pay all charges for the credit card changes.
This is not the first time a company has this kind of problem, but we are now (almost) in 2012, so this problem should have disappeared a long time ago.
Did they audit their security ? It's pretty sure, but they probably didn't show their custom modules, so it's totally their fault here.
Would you prefer th
Re: (Score:2)
Because they are a useless parking lot for political "science" graduates that can't get a job anywhere else but are handy as campaign workers each election. When is the USA going to wake up and understand that the "think tanks" are full of rejects instead of experts.
Re:"Donations" to Charities (Score:5, Insightful)
Re: (Score:2)
From one perspective parasitic noisemakers that pretend to be far more than they are such as "think tanks" are an obvious target for people that want to stir up trouble and not get hurt. By pretending to be like a competent well staffed intelligence bureau without actually having the resources of a small newspaper they would look like a juicy target to somebody that would really like to give the CIA or NSA some emba
Re: (Score:2)
if anon had balls, theyd go after the CC companies (Score:2)
seriously. the fact that so few people understand how the CC system works (including you, no offense) is kind of funny.
Re: (Score:2)
Meh, sounds like a good thing.
Money out of the Red Cross' coffers means they've got less money to waste on things like suggesting online gamers are committing warcrimes. That's between wasting money suing games companies who dare use the red cross on health packs and stuff too.
Money out of Save the Children's coffers means they have less money to continue to campaign for web censorship.
It may suck for CARE, but I've no idea who the fuck they are.
Either way, if the Red Cross and Save the Children were effect
Attacking the American Intelligence Community (Score:2, Insightful)
A special Category in the Darwin Awards.
Re: (Score:2)
storing credit card numbers attached to account data doesn't sound like intelligence community, sounds more like some douches who went out to find some guys and said "hey you're really smart! give us your cc number and some cash!" to some slobs they found.
real funny shit is how "TEH OFFICIAL ANONYMOUS" is claiming they didn't do it, which is a bit of a what the fuck too, don't they realize they're anonymous - there's no core, there's no agenda, if you don't like it form a hacking group like lulzsec.
but you
Re: (Score:2)
Add on 9,651 charges of credit card fraud.
Re: (Score:2)
Probably not important... (Score:2)
Re: (Score:2)
A lot of corporations require long signatures with disclaimers and terms etc. Usually they plant a bunch of corporate logos in there too. The size of the emails sounds about right.
Re: (Score:2)
Just a handful of PowerPoint files will skew the average quite a bit.
A new way to mitigate credit card fraud (Score:2)
"Based on the analysis, 50,277 Individual Credit Card Numbers were exposed, but 40,626 are expired, leaving just 9,651 that are not expired"
Sounds like 80% of the problem evapourated based on card expiry. How do we go about making CCs expire more frequently?
Re: (Score:3)
So if it's expired just add 4 years or so to the date and the card goes through.
Whenever a new card is issued, the CVV changes (or is it CCV). Most online credit card forms require this number in addition to the other info on the card, so just changing the year doesn't work.
Re:A new way to mitigate credit card fraud (Score:5, Informative)
You must not have any credit cards, then. I haven't had any credit cards (and I have a dozen) that are not renewed with the account number intact. The expiration date is bumped ahead by some predictable number of months (12, 24, 48, etc), and that's it. Those "expired" numbers are as good as unexpired ones: in either case the account could have been closed, but other than that it's a simple thing to brute force the renewed expiration date. You should get it right on 3rd or 4th try at worst. You can then cache the initial expiration date delta with the first 4 digits of the account number as the cache lookup key.
Re: (Score:2)
Those "expired" numbers are as good as unexpired ones: in either case the account could have been closed, but other than that it's a simple thing to brute force the renewed expiration date.
You're forgetting about the CCV "extended verification" digits on the back of the card, they are rotated along with the expiration date but not in such a predictable pattern.
Brute forcing one of those will almost assuredly have the card locked out before you get a chance to spend any money.
Re: (Score:2)
Hmm, this is insightful. Some places do not need CCV, though. I haven't checked TFA: did they store CCVs?!
Re: (Score:2)
Re: (Score:2)
They did, and they are.
Re: (Score:2)
Isn't that what the verification code in the back is for? That one has always changed for me (even if the main number doesn't).
Re: (Score:2)
Each time I've had any new car the 3 CVV digits on the rear changes too.
With all my debit cards, the last 4 digits of the card changes each time too.
Also, I don't think I've ever had a debit card for it's full term. My banks always sent me out a new card before the old one expires for various reasons such as adding chip and pin, adding contactless payment tech, or this time simply for "security reasons" without elaborating what they are.
I don't think I've even ever had a credit expire on it's given date and
Re: (Score:2)
You're right as to debit cards, I had same experience with those. They seem somehow different from credit cards as far as reissuance is concerned. For credit cards, they had simply sent me new ones a couple months before the expiration date, and they'd usually have new expiration = old expiration + 36 months.
It's called a securid token. (Score:2)
HTH.
Re: (Score:1)
What about re-using the numbers for different customers... the name *and* number are verified right?
Re: (Score:2)
You can't do that. CC numbers are absolutely unique, and the available pool isn't as large as you think either (the digits on the card have to pass the Luhn algorithm)
Expired cards (Score:5, Interesting)
Re: (Score:2)
Re: (Score:2)
Not worthless. The rule is that if CV2 code is supplied, it must be correct. However, it is optional.
Just don't expect to have any chance of winning a chargeback if you didn't request CV2.
Re: (Score:1)
(Yes)
They were pwned, that's what counts (Score:1)
Go anon!
If even strong passwords can get leaked... (Score:2)
...what's the point of having a strong one?
I'm wondering what's the biggest risk with passwords: having it hacked and either stored decrypted or decrypted later, or having someone guess it? I'm starting to think it's the former, which makes me think there's no point in super complex "try and guess THIS one!" passwords.
Re: (Score:3)
Cover yourself from both ends: have one password per account (a must!) and have them complex. If you do the former, then you'll need a password manager anyway, so the latter becomes trivial.
Re: (Score:1)
Don't use passwords if possible! Especially on your public web Linux server, unless they're at the application-level and protected by TLS/SSL.
SSH daemon should only respond to key-based authentication queries, and furthermore iptables should lock do
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Now within the same physical environment as the servers I sometimes do exactly what you've suggested, but offsite I'm very reluctant to have some
Re: (Score:1)
Essentially what I was trying to say is that passwords only do so much, but should be used in combination with another means of security (e.g. two factor auth). I suppose "don't use passwords if possible" can be interpreted as simply "d
Re: (Score:2)
Re: (Score:2)
You're mostly correct - you are mentioning the problem with having a "Global Secret". In that sense, a personal password is little different than a "Global Secret" that hasn't been distributed, yet.
The larger issue is almost always endpoint security, though. Endpoints are *both* ends - your local PC, and the server at the far side. In this case, the cost of engineering a competent solution was more than the cost of a compromise - the bulk of the cost of this hack will be paid by anyone BUT Stratfor execs
Re:If even strong passwords can get leaked... (Score:4, Interesting)
Use unique passwords for everything important and use a secure but salted password for various sites. Let's say my generic secure password is $sJ55Pm#
I salt the secure password between the fives with the initials of the website alternating caps. So my /. password could be $sJ5Sd5Pm# and my World of Warcraft password could be $sJ5WoW5Pm#.
I only have to remember one good password and a formula. Someone clever enough could hand analyze the passwords and might spot the salting but realistically, very few people are worth that effort.
which makes me think there's no point in super complex "try and guess THIS one!" passwords.
One practices good password habits because they help when a site does things properly. Nothing is going to save you if a site is terribly set up but that doesn't mean you should abandon best practices.
Re: (Score:2)
Alone, alternating caps adds next to no security. It is one of a number of well-known predictable ideas which are cheap to test for, so the attacker will try them. It only takes three times as long to test the root plus both series of alternating caps as it does to test just the all lower case root. Using leet speak (sorry, 133+ speak) is not of very much use for the same reason.
Truly random upper case characters and digits thrown into the password, in NON-OBVIOUS PLACES, offers FAR more security.
The number
Re: (Score:2)
Alone, alternating caps adds next to no security.
Well, yes, that's why I specified in this theoretical example that the salt was the initials of the website with the caps alternated. One needs the salt (which, yes, is not a true cryptographic salt, although I do know people who run their generic secure password plus a salt through hash algorithms and use the resulting hash as their password) to be memorable to the user and again, virtually no one is important enough that someone would sit there pulling apa
Re: (Score:2)
Yes, I think "pretty damn good system" makes it pretty clear I like it.
The rest is a completely general critique of a lot of not so good ideas that are found in this topic in general.
Re: (Score:1)
Re: (Score:2)
if you're storing customer cc's on the same machine as you're doing your email hosting and web serving from.. what's the point in anything?
Most of you probably know this but ... (Score:2)
http://xkcd.com/936/
More importantly, don't reuse passwords that you put on anything important. Some idiot may store them in plain text on a blog site, dropbox authentication or whatever useless bunch and then a cracker could use them to get into your bank or wherever else you've used the password.
Now even Facebook passwords could be
Inhibit Histrionics (Score:1, Offtopic)
I wrote, and rewrote, and rewrote a long and subtle post on the value of contemplating the underlying forces acting in society that lead to events like this, rather than jumping to adulation or condemnation. I came to the conclusion that I could not make it clear that I was advocating contemplation, not support or opposition. That all I would get in response would be some twit turning my post into a straw man then hurling rhetorical vitriol at it.
Then it came to me -- I may be able to extract some value fro
Re: (Score:1)
Re: (Score:2)
I think the best inhibitors of histronics are the long and subtle posts on the value of contemplation of underlying forces acting in society. Post away, ignore the peanut gallery.
Re: (Score:2)
Post away, ignore the peanut gallery.
Yeah -- you're right, as is the Offtopic mod. Thanks.
Email size? (Score:1)
Re: (Score:2)
Re: (Score:2)
it's probably customers asking for security strategy advice and tips. that's their business, answering such mails. if they turn out as a joke on quality, they're finished as a business.
Re: (Score:2)
I blame HTML mail. Have you ever seen the source of your average Exchange email thread? The horrors!!
Then there are those people who send BMPs embedded in Word/Excel so they can send you a screenshot! Gaaaack
The future of Stratfor (Score:2)
Re: (Score:2)
Re: (Score:2)
+1 funny as hell.
Re: (Score:2)
Re: (Score:3)
Re:Another Linux using server compromised? LMAO! (Score:4, Informative)
Bzzzt. Thank you for playing. The 2.2.15 doesn't tell you the patch level. Here's from a completely up to date RHEL6 system:
[fnj@baldur ~]$ rpm -qa | grep httpd
httpd-tools-2.2.15-15.el6.x86_64
httpd-2.2.15-15.el6.x86_64
The -15 tells you the patch level. 2.2.15-15.el6.x86_64 was issued this month. As long as Redhat supports RHEL6, and that will be for a goodly number of years more, they will issue security and other patches. For example, their kernel is presently 2.6.32-220.2.1.el6.x86_64, but they track and backport not only the latest security patches but also a lot of hardware support and new feature improvements.
Re: (Score:2)
Re: (Score:2)
I don't think it makes any difference in principle what the distro is, apart from rolling releases. For example debian squeeze:
root@testvm:~# dpkg-query -p apache2 | grep Version
Version: 2.2.16-6+squeeze4
I'd be surprised if that did not include the latest security patches.
Re: (Score:2)
Re: (Score:1)
You can't moderate AND post. Slashdot doesn't allow that. It is impossible for anyone to explain why they moderated any particular way.
Moderation is largely about your presentation of your argument, which is earning you a lot of that mess. It still looks like you cherry-pick the facts that are convenient for your argument, regardless of whether you're actually doing so. There are undoubtedly facts that don't make your argument look as solid. That's what I'm asking: do you, or don't you pay attention to the
Re: (Score:2)
As another hacked reader, yeah I'm unhappy about this too. Considering that I was donating to wikileaks before, this is just painful.
Stratfor's just come out with their email, 8pm, not great, but here we are. They've done the standard 1yr prepaid monitoring service for identity theft.
I looked around to verify that my CC was actually breached (who knows, maybe it was a card I've already canceled?), but all the primary copies of the CC list seem inaccessible. It'd be lovely if they were taken down before I
Shakes head as the fail whale is summoned again: (Score:2)
I saw a copy of their email. My reaction? Your customers have just been hacked. They're probably checking closely what they click on in any email you send.
Pro Tip:
Using URLs that display as coming from csid.com but when hovered over show up as en25.com is probably not a peachy wonderful idea.
I happen to know that en25.com is eloqua (contact management service) and could check that it was probably legit, but most would figure it was a fishing attack sent out on your compromised email list.
Stratfor may be try