That Sears website exploit we posted about a couple of weeks ago was funny, mainly because it seemed more embarrassing for Sears than a true security risk. However, an independent security researcher had also discovered a more significant issue with the site—it allowed for an unlimited number of gift card verification attempts via an external script, so a criminal could use the site as a brute force method to identify valid gift cards for Sears and Kmart.
[Note: The original headline for this post mistakenly identified Ameritrade as the subject of the post. It is actually Ameriprise Financial. I deeply regret the error.] Since March of this year, security expert Russ McRee of HolisticInfoSec.org has sent 6 messages to Ameriprise Financial warning them of easily exploitable security holes on their website. They ignored every request, while at the same time reassuring customers that “No one without the proper web browser configuration can view or modify information contained on our systems.”
For as long as there have been iPhones, there’s been the requirement to sign up for AT&T service. And as long as that requirement has been around, there have been hackers who release downloads that unlock your phones and free them to access other services.
[it] would have the right to claim statutory damages of up to $2,500 “per act of circumvention.” People who jailbreak phones, might even be subject to criminal penalties of as long as five years, if they circumvented copyright for a financial gain.
Christopher Soghoian over at Cnet is reporting that Turkish police may have used violence to get the encryption keys of one of primary ringleaders in the TJ Maxx credit card theft investigation. The suspect, Maksym Yastremskiy, is apparently a “major figure in the international sale of stolen credit card information.”
The ease with which a student was able to reset Sarah Palin’s Yahoo email password highlights a vulnerability of so-called “challenge questions” designed to verify your identity: if the questions are about personal details from your life, there’s a risk that somewhere out there on the web, that info is visible to the public. That might be a realistic risk only for public figures, but it’s also possible that friends or family members could answer your questions with a little guesswork. If you want better security, make up fake answers that you’ll remember.
Gmail recently rolled out a change to its settings, where now you can permanently turn on SSL encryption. Do it now—your personal data will thank you for it. Besides, it’s going to get a lot easier to hack Gmail sessions very soon, because some guy is planning on releasing a hacking tool to the public in order to force Google to implement better security. [monkey_bites]
Wired has been covering the ongoing investigation into recurring ATM pin thefts from Citibank accounts, and their latest article tracks how Ukrainian immigrants, a ringleader back in Russia, a hacked company named Fiserv that runs Citibank-branded ATMs in 7-Elevens, and an online payment service that also offers money laundering for a small fee all come together to steal your money. It’s an amazing look at how the U.S. tries to combat the threat of ATM-related theft.
Here’s a technique we’ll not be adding to our list of fun ways to escalate your complaint: The 18-year-old who recently hacked Comcast and took down the company’s homepage and webmail told Wired that it was Comcast’s own fault… The hacker, known as EBK, called Comcast to let them know they’d been hacked. The manager scoffed and hung up:
Whatever you do, don’t download any fun 3rd party programs to the iPhones at the University Avenue Apple store in Palo Alto, California. You may be detained for 2 1/2 hours, then photographed and told that other Apple stores will be ” on the lookout” for you.
Okay, who decided it would be funny to hack Comcast? DSLReports says, “Though there’s no indication that user privacy is jeopardized, you may want to avoid using Comcast webmail until things have been completely cleared up. [DSLReports]
Redbox rents DVD movies via vending machine in drugstores and supermarkets throughout the country, and on Friday they announced that they’d found credit card skimmers attached to three of their kiosks. What’s surprising is that they ‘fessed up so quickly, and in a highly public manner—they’ve got the text “SECURITY ALERT” at the top and bottom of their website, and the email they sent to their members is detailed, forthright, and helpful, and reposted in its entirety—along with photos of sample card skimmers—on their site. Attempts at identity theft no longer surprise us, but a competent handling of the issue by a company is pretty amazing.
The Wall Street Journal is reporting that the most likely scenario for how the hackers stole an estimated 200 million card numbers is as simple as a person with a laptop breaking into the wifi network of a store:
The biggest known theft of credit-card numbers in history began two summers ago outside a Marshalls discount clothing store near St. Paul, Minn.
This could be you.
Small World’s Bazooka Joe interviews “John Dillinger,” a debit card hacker who participated in the infamous “Russian Connection” ATM hack scandal. He discusses how he and others hacked millions of debit card accounts and why the story never makes the mainstream news.