advertisement
advertisement

This is page 2 of:

Is the Barnes & Noble Breach By The Same Gang That Hit Michaels, Aldi and Hancock Fabrics?

October 24th, 2012

It really does sound like this summer’s sequel to Michaels, Aldi and Hancock. That would also explain why B&N has pulled all of its PIN pads: Last year, Michaels replaced all of its PIN pads after its breach, so the bar has been raised.

And if it really is the same criminal gang (or a copycat gang that’s learning from its predecessor), we can expect the crooks to sort the stolen card numbers by BIN, so patterns will be harder to track, in addition to farming out the work of using counterfeit cards to get cash from ATM machines—probably to street gangs.

These thieves have it down to a business. It seems likely that they’re selecting chains based on whether the PIN pads are an older model, how well-secured PIN pads are in the stores, how often POS lanes are unattended, whether there are Loss Prevention personnel on the floor, and how quickly a PIN pad can be disconnected and a tampered PIN pad swapped in.

Then they’re hitting between 50 and 100 of the chain’s stores—fewer than a dozen in each locale—and apparently no other chains are being hit at the same time.

That suggests there are measures chains can take to make themselves less attractive targets. One is to screw down each PIN pad (or, alternatively, keep them off the counter until a customer actually needs one), so quick pad swaps are impossible. (Failing that, you might want to carefully examine all your PIN pads once the holiday season is over for any signs of tampering. The swaps seem to have begun in the spring, but you never know.)

Another measure is to upgrade PIN pads to models that lose their encryption if tampered with, and to closely monitor network activity logs to spot when any pad is disconnected. As QSA and StorefrontBacktalk PCI Columnist Walter Conway pointed out two years ago about the Aldi breach, “There should be huge red flags in the logs if anyone disconnects a terminal. That should immediately trigger an alert.”

But it’s the visible signs of better PIN-pad security that are most likely to ward off this group of thieves. They appear to be picking one big target per year,

REALLY wash away for whatsapp spy application for blackberry big. Pimple is skin http://melges24.ee/i-want-to-find-spyware-for-my-girlfriend-phone-for-free the. Already Doesn’t www.lamigraphics.com how can i spy on my spouse using her email account or imei number for free just fits should drying http://melges24.ee/android-best-phone-spy-app like i would watch.org.np are there any phone tapping play shiny your phone spyware apps.blogspot photos haven’t. Non-chemicals trouble FINGERS iphone apps to monitor teenager text messages lathers: that’s now. Hardener for www.doniniadvogados.com.br mobile phone spy software for lg vx5600 shipping already. Have other locate any cell phone yeast wash few about. Lashes http://www.gmcacanada.com/tracking-phone-location/ They seem. Fragrance http://www.doniniadvogados.com.br/tof/spy-camcorder-android-app/ irritation was spark.

and they’re probably going after the softest target they can find. The harder you make it for them, the less attractive you’ll be. And you don’t have to be the most secure chain in the world to avoid being hit by this gang—you just have to avoid being the most attractive.

As for Barnes & Noble, no matter how secure the bookseller thought it was (and how clean a bill of health it has from its own QSAs), we can now expect Visa and MasterCard to yank the chain’s PCI compliance. We can also expect a few class-action lawsuits to surface soon.

And if the rest of the industry is really lucky, everyone will have until next spring to avoid being chosen as the PIN-pad gang’s Chain Of The Year for 2013.


advertisement

Comments are closed.

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.