[iwar] [fc:CCBill.knew.of.credit.database.breach.in.March]

From: Fred Cohen (fc@all.net)
Date: 2001-12-23 06:54:10


Return-Path: <sentto-279987-4122-1009119240-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sun, 23 Dec 2001 06:55:08 -0800 (PST)
Received: (qmail 317 invoked by uid 510); 23 Dec 2001 14:54:21 -0000
Received: from n24.groups.yahoo.com (216.115.96.74) by all.net with SMTP; 23 Dec 2001 14:54:21 -0000
X-eGroups-Return: sentto-279987-4122-1009119240-fc=all.net@returns.groups.yahoo.com
Received: from [216.115.97.164] by n24.groups.yahoo.com with NNFMP; 23 Dec 2001 14:54:00 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_1_3); 23 Dec 2001 14:53:59 -0000
Received: (qmail 78306 invoked from network); 23 Dec 2001 14:53:59 -0000
Received: from unknown (216.115.97.167) by m10.grp.snv.yahoo.com with QMQP; 23 Dec 2001 14:53:59 -0000
Received: from unknown (HELO red.all.net) (12.232.125.69) by mta1.grp.snv.yahoo.com with SMTP; 23 Dec 2001 14:53:59 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fBNEsBH20905 for iwar@onelist.com; Sun, 23 Dec 2001 06:54:11 -0800
Message-Id: <200112231454.fBNEsBH20905@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sun, 23 Dec 2001 06:54:10 -0800 (PST)
Subject: [iwar] [fc:CCBill.knew.of.credit.database.breach.in.March]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 8bit

CCBill knew of credit database breach in March

By Thomas C Greene in Washington

Posted: 21/12/2001 at 18:06 GMT

Now we know why CCBill was so terrified of taking verbal questions from a
live reporter, and insisted instead on receiving faxed questions to which it
could reply with canned responses.

As far back as March the company had warning that they were running an
insecure CGI with their entire merchant database, including FTP/SSH logins
and passwords, exposed to easy exploitation.

Anti-CC fraud outfit CardCops notified the company in a memo dated 13 March
2001 that one of their sources in the carding community had heard of the
glitch. 

CCBill silently removed the weak CGI, crossed their fingers, and hoped for
the best. The company did not warn its clients that their servers could now
be rooted effortlessly and their customers' credit details downloaded for
posterity, to be traded in IRC.

And while CCBill merchants may not capture and store credit card data, many
merchants use more than one processor, many of which do capture CC data. We
can be confident that a great number of these Web sites have given up vast
files full of consumers' personal and credit details, CardCops President Dan
Clements points out.

The fact that the March warning came from outside the company should have
alerted them that they had already been compromised, a painfully obvious
conclusion even in the absence of further evidence such as reports of credit
card abuse. 

But the company covered up the breach, which only became public this week
when an Ohio SP discovered IRC bots running on several of their customers'
servers, and in each case the victim was a CCBill client whose machine had
been accessed with the proper logins and passwords.

These servers weren't hacked in the sense that a security mechanism had been
overcome; they were accessed illegally by a person or group who simply
logged in as administrators. It's now safe to assume that all of CCBill's
merchants have been exploited, and that any and all customer account details
they store are in the possession of some malicious third party.

And this is the chief consequence of security through obscurity. Had CCBill
notified all its clients immediately after learning of the original breach,
it's quite possible that a number of them could have avoided exploitation.
At this late date, however, all of CCBill clients have to assume the worst.
There's been plenty of time for every single one of their Web servers to be
exploited. 

Almost two years ago we reported on CCBill's slack security practices and
inflated claims to high levels of data safety. We have to assume that in all
this time they haven't had a proper security audit, but are merely passing
wind about their security consciousness to give their clients a false sense
of safety. 

If you're a CCBill merchant, then you're owed a detailed explanation far
more thorough than the canned soft-pedal tripe the company issued on
Thursday. We hope you'll demand it.

And if you're a customer of a CCBill merchant, then you'd better find out if
they capture and store CC data on their server. It doesn't appear that the
credit harvest from this breach has been abused yet, so there's time to
cancel your card if you think you might be at risk. ®

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Access Your PC from Anywhere - Full setup in 2 minutes - Free Download
http://us.click.yahoo.com/StuHlD/E6eDAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 21:00:00 PST