E-Commerce A Lot More Secure Than Brick-and-Mortars, Perceptions Aside

Written by Evan Schuman
November 26th, 2006

Despite consumer?and even some IT executive?beliefs that E-Commerce poses a much greater security risk than store-based point-of-sale systems, a new Gartner report concludes that the opposite is true.

Gartner is reporting that, by 2008, most attacks will be on physical point-of-sale systems and that even by 2009, only one out of three such systems will comply with current security standards.

“Device vulnerabilities are often overlooked by enterprises, who tend to focus on enterprise servers and systems when securing their environments,” wrote Gartner security analyst Avivah Litan, adding that data transmissions are also closely monitored and “typically ignored by many companies are the devices that hang off of corporate networks where data are either collected or output, particularly point-of-sale devices and printers located throughout enterprise systems.”

This disconnect has not been lost on thieves (neither the cyber nor the old-fashioned kind). “Criminals have discovered that some devices are ripe targets for committing financial fraud and other types of information theft. Particularly hard hit in the past year are point-of-sale systems exposed to the Internet which are storing magnetic stripe card data, and intelligent printer systems that store information as part of the paper print process,” the report said.

How lopsided are the figures? Overwhelming, according to Gartner’s stats, which have 80 percent of all data breaches happening in-store. “I can’t think of one well-publicized successful E-Commerce attack,” Litan said.

To be fair, many of the data breaches involve the Internet, but are quite far removed from E-Commerce. For example, many POS systems seek authorizations and pass information along an IP connection, which is frequently how they are accessed by be the crooks. “A lot of retailers have moved their POS from dial-up to IP and they haven’t even thought about the security implications,” Litan said. “A lot of the passwords are still the default security passwords.”

Another confusion point is where and how the data is used to commit the fraud, as opposed to how the confidential data is stolen. It’s a lot more common?and easier?to steal the data from store systems, whether via the network, using someone in a physical storefront or stealing a laptop from workers while they are commuting or by breaking into their homes. But after the data is captured, it’s indeed easier to commit the actual theft later on using the more anonymous Web site.

The reasons in-store systems are such attractive targets are numerous, primarily because they are typically not as well protected. But a simple reason is also that there is simply a lot more data to be taken from in-store.

E-Commerce sites and stores “might be equally secure but brick and mortars have a lot more data and better data,” Litan said. “You can get millions of numbers instead of thousands and you can get the magstripe data. That’s not supposed to be stored, but it is stored.”

The report said that many retailers are likely to be fined soon by credit card groups for storing that data, even though many of them are not knowingly saving the forbidden data.

” Many of the breaches investigated involved the theft of magnetic stripe data — the most sensitive security information attached to a card – that was stored on a merchant’s point-of-sale system. This is often done without the retailers’ knowlege since the data is stored as a function of application software, which retailers typically do not know how to decipher,” the report said. “Another forensic analyst firm that examines breaches involving major credit card brands found that a high percentage of data breaches can be traced to vulnerabilities with just a few terminal brands. Of 71 breaches investigated by this firm, 59 percent were traced to just four terminal models. The criminals determined which companies to target by simply looking at the list of customers on the terminal manufacturer’s’ web site.”

The security risks posed by various smart network peripherals?especially printers, but also fax machines, copiers and scanners?are not particularly new. As those multi-decade-old devices have gotten a lot smarter, with much faster CPUs, much more RAM, large harddisks and full 2-way network and even Internet access, the potential for using the rarely-secured devices as an easy means to enter a network and then internally access as many resources as desired has soared and mainstream stories have detailed such issues.

But many retailers are using those smart printers to capture and print credit card information, which makes them very attractive physical targets. “The printers and multifunction products (MFPs) being deployed in enterprises today are all equipped with hard disk drives (HDD), and the latest generation of MFPs and printers (smartMFS) are deploying open architectures that incorporate or accommodate live applications accessible from the user interface (UI) or remotely,” the Gartner report said. “In many cases, these Java applications reside on the machine and, in other cases, the applications reside on a network server that receive commands using traditional web-services communication protocols. These applications transform the MFPs into an information hub that can scan paper-based information into an on-line repository, automate routine functions and even download information from a web-server.”

Gartner recommends that printers?no matter how innocuous their history?need to be treated like any other information-rich part of the network. “At a minimum, employ basic security practices when it comes to these devices such as changing default administrator passwords and installing firewalls in front of them. Don’t store sensitive data, such as magnetic stripe card data in a POS system or personal information on a printer hard drive,” the report suggested. “If such storage is due to a vendor’s system design, demand the vendor removes such capabilities or else switch to a new supplier.”


Comments are closed.


StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.