The Mysterious Unidentified Retailer In The TJX Indictments
Written by Evan SchumanWhen federal officials unveiled on Tuesday (Aug. 5) indictments against 11 global cyber thieves accused of data raids against TJX and several other major retail chains, the retail chain that was potentially the most pivotal in ending the multi-national bits-and-bytes bonanza was kept out of the filings.
The feds were certainly not shy about naming retail victims in the 41 million payment card heist, listing in one of the indictments TJX, BJ’s Wholesale Club, OfficeMax, Boston Market, Barnes & Noble, Sports Authority, DSW and Forever 21–at least one of whom might not have even known that they had been victimized until the Secret Service called. (See columnist David Taylor wondering how a retailer could be hacked and not know it.)
But the mystery retailer had several differences from the other retailers. First, this retailer was the only one whose perimeter security systems detected the mouse-toting bandits, although it did so only after the binary bullies had grabbed some card numbers.
Therein may lie the reason for this retailer’s mask. This Fortune 500 merchant is an unsung hero in breaking this case. Not coincidentally, that chain was the final one the defendants wirelessly hacked into through a Florida wireless access point. Blocked of their last system in mid-October 2007, one of the two men charged with attempting that final cyber thievery today faces life in prison, if convicted of all charges.
But the indictment casually mentions a potentially very serious fact. The group was charged with possessing customers’ track 2 debit card data—among other things. In theory, that shouldn’t have permitted ATM cash access because of the typical debit card key management technique known as DUKPT (Derived Unique Key Per Transaction).
DUKPT takes the PIN encryption processing away from payment devices, leveraging a derived key that is securely injected by a trusted third party. That approach was believed to be uncrackable. The defendants in this case discovered otherwise, as the indictment speaks of an associate of the defendants being asked to decrypt the encrypted PINs. Given that the indictment later references hundreds of thousands of dollars taken from ATMs by the defendants, it seems that the decryption efforts were successful.
This brings us back to our mystery retailer. Although that chain’s security was quite good—indeed, it was the only one that ever caught these penetrations—it apparently was in the middle of upgrading POS systems.
According to a source with knowledge of the chain’s operations—who suggested that both her name and the chain’s name be kept secret for now—the crooks caught them in mid-upgrade. The chain "has a huge installed base of legacy systems. The older the equipment, the more difficult it is to secure," she said. As for wireless, "When (the chain) started their push to strengthen Wi-Fi security, it took them a long time to get the old stuff all identified and cleaned out," she said.
Asked to explain why the chain was being kept secret, the source referred to the chain’s POS units and asked, "What if half of your cash registers don’t have Triple DES yet? You wouldn’t want people to know that" especially given that the chain’s upgrade plans don’t have the final units upgraded until 2010.
Michael Sullivan, the U.S. Attorney for Massachusetts, confirmed that the mystery retailer was involved in that final mid-October 2007 heist attempt.
"That retailer was not identified, if I remember correctly. We do have some reasons for not revealing that one, but I’m not prepared to explain the reasons for it," Sullivan said. "I don’t want consumers to be concerned or alarmed, but with that particular retailer, the breach was not nearly as successful as the others. It was successfully stopped, so that only a few numbers actually were taken before the security system shut them off. I think there were some concerns in terms of identifying the other retailer, and there could be a number of reasons for that. It wasn’t because someone asked if they could be kept out."
August 8th, 2008 at 6:32 am
This mystery merchant catches the theives and still does not change their plans to update their equipment any faster? This is just the beginning, if one set of people have figured it out, there will be more. 2 years are like centuries in our automated information world. People will make mistakes and other people will find them and exploit them. Hire more people and get this taken care of quicker, it will save all of us money in the long run.
August 8th, 2008 at 2:29 pm
There could be a possibility that the mystery merchant is being used by the authorities as a “Honey Pot”
August 8th, 2008 at 4:44 pm
Editor’s Note: That honey pot scenario is one we explored. At this point, it seems to not be the case. Then again, if it is, we’re the last ones they would tell.
August 8th, 2008 at 7:25 pm
Well, given the time after TJX was breached and when one of my cards was used I bet my card was one of the ones used. Where the card was used, in a part of Florida I’ve never been to, makes me wonder if the merchant there indicates anything. Not that I would say who, but I could see why no one would want the info out there that they are still updating.
I wish I were more sure of the timeline of the thing.
BTW, the card company called and I was fine except for the annoyance of a new card etc.
August 14th, 2008 at 12:34 pm
It is important that the mystery retailer seems to have been the only one that paid some strict attention to wireless security and is continuing to update its POS systems. However, it would be interesting to know what perimeter security it was using since legacy equipment can be secured with almost complete success using an overlay wireless intrusion prevention system (WIPS)- and yes, AirTight sells WIPS, but it developed its patented method because there was a need for it as the use of wireless grew and what infrastructure providers had bundled into their products was not enough. The question for the enterprise is no longer how do I keep wireless out, but rather how do I harness its benefits and efficiencies while protecting my networks. Because retail works on such tight margins, it appears that too often the cost/benefits analysis has come down on the side of taking the risk. The cost of a breach always exceeds the cost of security, so that decision is a bad one.