advertisement
advertisement

The Nightmare Scenario: What If TJX Did Everything Right?

Written by Evan Schuman
March 30th, 2007

The TJX intruder apparently had the chain’s encryption key, not that he/she necessarily needed it as data was apparently taken during the card approval process before it was encrypted. These are among the latest details in what is almost certainly the worst retail data breach ever.

The massive data breach at $16 billion retailer TJX involved someone apparently armed with the chain’s encryption key, but it might not have been needed as the cyberthief was accessing data during the card approval process before it was encrypted. These are among the latest details in what is almost certainly the worst retail data breach ever.

In a 10-K filing to the federal Securities & Exchange Commission (SEC), TJX said it didn’t know who the intruders were, but it did provide more details about what they say happened that lead to the card information of some 46 million consumers to get into unauthorized hands. (Here is an excerpt from that filing, which includes?in full?everything TJX reported about the data breach.)

The intruder or intruders here apparently planted software in TJX systems to capture data throughout the day and they also engaged in an increasingly popular tactic: post-event cleanup.

That’s where intruders spend extra effort cleaning up their tracks?deleting and otherwise tampering with log files, changing clock settings, moving data to hide their movements, etc..

“Due to the technology utilized by the Intruder, we are unable to determine the nature or extent of information included in these files. Despite our masking and encryption practices on our Framingham system in 2006, the technology utilized in the Computer Intrusion during 2006 could have enabled the Intruder to steal payment card data the payment card issuer?s approval process, in which data (including the track 2 data) is transmitted to payment card issuer?s without encryption,” the filing said. “Further, we believe that the Intruder had access to the decryption tool for the encryption software utilized by TJX.”

Veteran retail technology analyst Paula Rosenblum, a vice-president with the Retail Systems Alert Group, said the fact that the software went undiscovered for so long is most troubling.

“It?s incomprehensible that what amounts to a computer worm was placed on mission-critical systems at one of the world?s largest retailers and remained there?undiscovered?for eighteen months. The scope of the theft is stunning,” she said. “My biggest fear is that it lays down a gauntlet for other would-be hackers, subtly daring them to ?top this one.’ It also lays down the gauntlet for other retailers. This could be happening to you right now. PCI compliance and data security do not have obvious Return on Investment. Neither does paying taxes. But avoiding either can result in irreparable harm.?

Up until now, the industry has criticized TJX for apparently not having encrypted data and for storing information longer than it should have. The new filing indicates it was encrypting?at least some, if not all, of its data?and that it was also routinely deleting older files, which the cyberthieves apparently grabbed and copied beforehand.

The extent of the data breach is alarming for the retail industry, but the filing’s suggestions that TJX had indeed been following industry procedures is even more of a concern, said former federal prosecutor?and currently managing director for FTI Consulting?Mark Rasch.

“It’s really easy to say that TJX screwed up,” he said. “A more frightening thought is that they didn’t.”

There are two scarey things involved: that the intruders had the encryption key; and that they were able to access data before it was even slated to be encrypted.

“Locks are no good if the bad guys have the keys,” Rasch said. “Encryption can create a false sense of security.”

A huge problem, Rasch said, is that he has found many retailers storing their encryption keys on the same system that houses the data. “That’s like having really great locks and keeping the key under the mat,” he said.

“Ideally, the key should be kept on a separate piece of hardware and utilized only when it’s needed, but there are practical concerns as well,” he said. “It?s a balance of risk, which is why encryption cannot be an absolute guarantee.”

The filing also raised questions about whether TJX is going to point the finger at others in the industry when blame is handed out for this breach.

“We rely on commercially available systems, software, tools and monitoring to provide security for processing, transmission and storage of confidential customer information, such as payment card and personal information. We believe that the Intruder had access to the decryption algorithm for the encryption software we utilize,” the statement said. “The systems currently used for transmission and approval of payment card transactions, and the technology utilized in payment cards themselves, all of which can put payment card data at risk, are determined and controlled by the payment card industry, not by us.”

The filing also revealed a more detailed timeline of the incident. TJX officials said they first learned of the situation on Dec. 18, 2006, when “we learned of suspicious software on our computer systems.”

Three days later, the filing said, investigators TJX brought in concluded that “there was strong reason to believe that our computer systems had been intruded upon and that an intruder remained on our computer systems.”

The filing confirmed that the U.S. Secret Service then asked them to keep the matter confidential because the intruder might be caught if he/she doesn’t know TJX discovered the software.

On Dec. 26 and 27, 2006, “we notified our contracting banks and credit and debit card and check processing companies of the suspected computer intrusion” and “on December 27, 2006, we first determined that customer information had apparently been stolen from our computer systems.”

The retailer said that routine file deletions are making it more difficult to identify exactly what was taken. And the intruder is adding to that challenge.

“The technology used by the intruder has, to date, made it impossible for us to determine the contents of most of the files we believe were stolen in 2006,” the filing said. “We believe that we may never be able to identify much of the information believed stolen.”

The company has spent about $5 million in one three-month-period dealing with this breach, “which includes costs incurred to investigate and contain the computer intrusion, strengthen computer security and systems, and communicate with customers, as well as technical, legal, and other fees.”


advertisement

One Comment | Read The Nightmare Scenario: What If TJX Did Everything Right?

  1. Terry Smith Says:

    David Carradine as a young student in “Kung Fu”

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.