Announcement

Collapse
No announcement yet.

Target Stores breached -- millions of credit & debit cards at risk

Collapse
This topic is closed.
X
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    #16
    This is probably one of the better-communicated breaches that I've ever seen. Rather than hiding it for months, or trying to downplay the significance, Target is being painfully honest. They've mentioned the scope (40,000,000), the date range (27 Nov - 15 Dec), and the data (name, number, expiration date, CVV). Good for them.

    http://pressroom.target.com/news/tar...-in-u-s-stores
    https://corporate.target.com/discove...-to-payment-ca

    Compromise of the POS (or would that be p.o.s.? lol) terminals is not unrealistic. Someone on the inside who has access to the POS controller software could have planted a subroutine that siphons the data of every swiped card into some remote database. Push that "update" out to every POS and voila, gold.

    Comment


      #17
      edit
      woodsmoke
      Last edited by woodsmoke; Dec 19, 2013, 11:49 PM.

      Comment


        #18
        Will you please stop being so cryptic and just explain what you mean?

        Comment


          #19
          edit

          woodsmoke
          Last edited by woodsmoke; Dec 19, 2013, 11:49 PM.

          Comment


            #20
            Bill O'Reilly is not a computer security expert, and anyone who might be shooting him down over his speculation probably isn't either. From what's been released publicly so far, this attack appears to have exhibited a degree of coordination that involves someone with appropriate insider access.

            Do yourself a favor... if you want to be well informed about this (and related) issues, follow Brian Krebs. Bruce Schneier will probably weigh in soon. The Washington Post sometimes has well-written articles on these subjects, too, like this investigation of how NSA tracks you via your Google cookie.

            Comment


              #21
              Ok comment deleted didn't mean to insult you.

              woodsmoke

              Comment


                #22
                My apologies, Woody. I wasn't insulted...no need to delete the comment. O'Reilly doesn't know any more than the rest of us; anything he -- or anyone -- says right now is just speculation.
                Last edited by SteveRiley; Dec 20, 2013, 02:07 AM.

                Comment


                  #23
                  Interesting you bring up the NSA. I don't know enough about this stuff to know one way or the other, but: Can't the NSA track/trace hackers, bots, spam farms, virus farms, etc. instead of listening in to Angela Merkel?

                  If 40,000,000 stolen credit transactions doesn't rise to the level of a threat to national security, I don't know what would. It would be nice if all that computing power actually did some good.

                  Please Read Me

                  Comment


                    #24
                    In other news... 40,000,000 toasters, sets of plastic dinnerware, bottles of cheap shampoo, pre-framed posters, low-end TV's and DVD players, rough feeling towels, poorly made shoes, and piles of kids clothes have flooded the swap meets of America.

                    Please Read Me

                    Comment


                      #25
                      Not a big deal. No loss to anyone.
                      Linux because it works. No social or political motives in my decision to use it.
                      Always consider Occam's Razor
                      Rich

                      Comment


                        #26
                        Originally posted by SteveRiley View Post
                        .... follow Brian Krebs. Bruce Schneier will probably weigh in soon. The Washington Post sometimes has well-written articles on these subjects, too, like this investigation of how NSA tracks you via your Google cookie.
                        I saw this article on reuters: http://www.reuters.com/article/2013/...9BJ1C220131220

                        As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry...

                        Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products.
                        Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year, securities filings show.
                        ...
                        Within a year, major questions were raised about Dual Elliptic Curve. Cryptography authority Bruce Schneier wrote that the weaknesses in the formula "can only be described as a back door."


                        After reports of the back door in September, RSA urged its customers to stop using the Dual Elliptic Curve number generator.


                        This raises SERIOUS questions about the security of the RSA keys that are being used.

                        As far as Kubuntu and other Linux distros the Digital Signing Algorithm is used for signing only. ElGamal encryption is used to encrypt. Similarly, RSA-PSS is used for signing and RSA-OAEP is used to encrypt. What I'm wondering is if the NSA has corrupted DSA and EIGamal?
                        "A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
                        – John F. Kennedy, February 26, 1962.

                        Comment


                          #27

                          If 40,000,000 stolen credit transactions doesn't rise to the level of a threat to national security, I don't know what would. It would be nice if all that computing power actually did some good.

                          THE PRESIDENT OF THE U.S.

                          the CEO OF TARGET.(an any other major corporation)

                          Is SCARED TO DEATH..................about something that:

                          a) hits the ObamaCare website

                          b) hits one of the "nodes" that hits one third of the U.S.

                          JUST WHAT THE HE@@ will happen!??

                          PLEASE REMEMBER................the OBAMA.............RE-eneablement of the "Patriot Act".........

                          says that if a "corporation" is ATTACKED..........that it is considered to be a "national security problem".......

                          woodjust thinkingsmoke
                          Last edited by woodsmoke; Dec 20, 2013, 09:34 PM.

                          Comment


                            #28
                            Originally posted by GreyGeek View Post
                            This raises SERIOUS questions about the security of the RSA keys that are being used.

                            As far as Kubuntu and other Linux distros the Digital Signing Algorithm is used for signing only. ElGamal encryption is used to encrypt. Similarly, RSA-PSS is used for signing and RSA-OAEP is used to encrypt. What I'm wondering is if the NSA has corrupted DSA and EIGamal?
                            We are wading into some very geeky and obscure areas of cryptography.

                            Good random number generation is a fundamental requirement for strong cryptography. Any predictability can seriously weaken algorithms that rely on particular kinds of RNGs. The RNG in question here is Dual_EC_DRBG, or dual elliptic curve deterministic random bit generator. The linked Wikipedia article is a good summary of the situation. Dual_EC_DRBG is simply not trustworthy (plus it's just bad). The week the notice appeared, we tore through all the source code in our products to ensure that we weren't using it and that it couldn't be enabled. The outcome was positive, and I even wrote a public knowledge base article about it.

                            There are no known internal weaknesses in ElGama or DSA right now. The choice between RSA/RSA or DSA/ElGamal typically matters when one is considering how to create GnuPG keys. You can find lots of debate back and forth about which pairing is better. A lot of this happened around 2009-2010, when many Debian maintainers were considering switching from DSA/ElGamal to RSA/RSA for package signing. Personally, I would go with RSA/RSA. DSA is a bit fickle about random number correctness and ElGamal ciphertext output is often twice as large as the cleartext input.

                            Comment


                              #29
                              I was hoping you'd reply! That's GOOD to hear, Steve, especially coming from you, with your background.
                              "A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
                              – John F. Kennedy, February 26, 1962.

                              Comment


                                #30
                                The Dual_EC_DRBG saga continues...

                                http://lwn.net/Articles/578375/

                                The dual elliptic curve deterministic random bit generator (Dual EC DRBG) cryptographic algorithm has a dubious history—it is believed to have been backdoored by the US National Security Agency (NSA)—but is mandated by the FIPS 140-2 US government cryptographic standard. That means that any cryptographic library project that is interested in getting FIPS 140-2 certified needs to implement the discredited random number algorithm. But, since certified libraries cannot change a single line—even to fix major, fatal bugs—having a non-working version of Dual EC DRBG may actually be the best defense against the backdoor. Interestingly, that is exactly where the OpenSSL project finds itself.

                                OpenSSL project manager Steve Marquess posted the tale to the openssl-announce mailing list on December 19. It is, he said, "an unusual bug report for an unusual situation". It turns out that the Dual EC DRBG implementation in OpenSSL is fatally flawed, to the point where using it at all will either crash or stall the program. Given that the FIPS-certified code cannot be changed without invalidating the certification, and that the bug has existed since the introduction of Dual EC DRBG into OpenSSL, it is clear that no one has actually used that algorithm from OpenSSL. It did, however, pass the testing required for the certification somehow.

                                It is also interesting to note that the financial sponsor of the feature adding support for Dual EC DRBG, who is not named, did so after the algorithm was already known to be questionable. It was part of a request to implement all of SP 800-90A, which is a suite of four DRBGs that Marquess called "more or less mandatory" for FIPS certification. At the time, the project recognized the "dubious reputation" for Dual EC DRBG, but also considers OpenSSL to be a comprehensive library and toolkit: "As such it implements many algorithms of varying strength and utility, from worthless to robust." Dual EC DRBG was not even enabled by default, but it was put into the library.
                                . . .

                                So, what we have here is a likely backdoored algorithm that almost no one used (evidently unless they were paid $10 million) added to an open-source cryptography library funded by money from an unnamed third party. After "rigorous" testing, that code was certified as conforming to a US government cryptographic standard, but it never actually worked at all. According to Marquess: "Frankly the FIPS 140-2 validation testing isn't very useful for catching 'real world' problems."

                                It is almost comical (except to RSA's BSafe customers, anyway), but it does highlight some fundamental problems in the US (and probably other) government certification process. Not finding this bug is one thing, but not being able to fix it (or, more importantly, being unable to fix a problem in an actually useful cryptographic algorithm) without spending lots of time and money on recertification seems entirely broken. The ham-fisted way that the NSA went about putting the backdoor into the standard is also nearly amusing. If all its attempts were similarly obvious and noisy, we wouldn't have much to worry about—unfortunately that seems unlikely to be the case.
                                Bolding bits for hilarity and because I'm bored.

                                Comment

                                Working...
                                X