Reading Time: 4 minutes
The notorious John Dillinger was supposedly asked why he robbed banks. His reply was “That’s where the money is!” You could get the same reply if you asked a hacker why they attack credit/debit card payment systems. The information obtained could be used to generate millions in fraudulent transactions.
Simply in terms of the financial loss, the number one data breach of the 21st century so far was Heartland Payment Systems breach of 2008. 134 million credit cards were exposed through SQL injection attacks used to install spyware on Heartland’s data systems.
Who is Heartland Payment Systems?
Heartland Payment Systems, Inc. processes payments for debit, prepaid, and credit cards. They also process online payments and checks and provide payroll services. They are the fifth largest credit card processor in the US and ninth in the world.
At the time of the breach, they processed 100 million payment card transactions per month for 175,000 merchants. Most transactions Heartland processes are from small to midsized retailers. Heartland acts as the middleman between the point of sale (POS) and the banks’ card networks.
What happened?
In January 2009 Heartland announced that the computers they use to process payment card transactions had been breached in 2008.
The data compromised included all of the information required to produce counterfeit credit cards, including the data coded on the card’s magnetic strip.
The breach was discovered after Visa and MasterCard notified Heartland of suspicious transactions from accounts it processed. Heartland found a spyware program planted by the hackers that stole the data over a period of several months in 2008.
In fact, the breach was a very slow moving event. It started with an “SQL Injection” attack in late 2007 that compromised their database. An SQL Injection appends additional database commands to code in web scripts. Heartland determined that the code modified was in a web login page that had been deployed 8 years earlier, but this was the first time the vulnerability had been exploited.
The hackers then spent 8 months working to access the payment processing system while avoiding detection from several different antivirus systems used by Heartland. They eventually installed a type of spyware program called a “sniffer” that captured the card data as payments were processed.
Sniffer programs are used to monitor network traffic for the purposes of analyzing and solving problems. Unfortunately, they can also be used to capture data for nefarious purposes. In this case the sniffer provided the thieves with the proverbial “keys to the Kingdom”, that is all the data required to counterfeit cards.
Truth and Consequences
The consequences for Heartland were severe.
They were deemed no longer compliant with the Payment Card Industry Data Security Standard (PCI DSS). Credit card providers such as Visa and Master Card require PCS DSS validation to be allowed to process their card’s payments. They were not able to be revalidated until May of 2009. At that time they announced an ambitious security strategy that included “end to end” encryption, the first of its kind.
The loss of revenue during this period was just the beginning. Heartland would eventually provide over $145 million dollars in compensation for fraudulent payments. The total loss for companies, banks and insurers would be estimated at over $200 million.
Well the good news is that the Feds got their men. In 2009 a Cuban American Albert Gonzalez and two unnamed Russian accomplices were indicted for the Heartland breach. Gonzalez was alleged to have masterminded an international operation that stole the credit and debit cards.
In March 2010 he was sentenced to 20 years in federal prison.
I may revisit the story of Gonzales and his gang of hackers someday, it is truly remarkable. He was a child prodigy who ran with, no, organized a bad crowd and engaged in numerous sophisticated schemes. He has already been featured on the CNBC show “American Greed”
So What Can We Learn from the Heartland?
Heartland rebounded well from the breach because it took responsibility for what happened. They took the lead in promoting solutions to prevent such breaches, particularly end to end encryption.
For everyone else the lesson is that you cannot be too secure. Heartland was supposedly PCI DSS compliant at the time of the breach. Clearly some things were missed. You need to check every web page continuously for vulnerabilities. Services like Comodo’s HackerGuardian will scan your pages for malware and PCI Compliance issues daily and are essential to the small and medium size business.
You must have a layered approach that implements the best firewall and malware scanning for the network connections points and on every server and computer on your network. You are only as secure as your weakest link.
Gonzales and his team overcame numerous security measures and tested their malware against 20 different antivirus systems.
Most malware protection systems use a “blacklist” of known threats to screen files. The problem with this approach is that the list has to be constantly updated and they can’t protect against threats not yet identified. As former Defense Secretary Donald Rumsfeld once said, the thing that you keeps you up at night are the thing that you don’t know and you don’t know that you don’t know them!
With 40,000 new malware unleashed every day it is a lot of work maintaining a blacklist.
I prefer antivirus systems that use a “whitelist” approach. That is where the scanner uses a list of known valid programs to allow only safe programs to run in the system. For any other software they allow it to run in a separate, isolate system called a “sandbox.” The scanner monitors the program in the sandbox and can identify if it is safe or not.
Such systems are sometimes criticized as being too aggressive and they require closer attention. However, the Heartland breach is evidence that an aggressive approach to network and computer security is more than warranted in 21st century.
Related Resources
Vulnerability Assessment Tools
START FREE TRIAL GET YOUR INSTANT SECURITY SCORECARD FOR FREE
- SEO Powered Content & PR Distribution. Get Amplified Today.
- PlatoData.Network Vertical Generative Ai. Empower Yourself. Access Here.
- PlatoAiStream. Web3 Intelligence. Knowledge Amplified. Access Here.
- PlatoESG. Automotive / EVs, Carbon, CleanTech, Energy, Environment, Solar, Waste Management. Access Here.
- PlatoHealth. Biotech and Clinical Trials Intelligence. Access Here.
- ChartPrime. Elevate your Trading Game with ChartPrime. Access Here.
- BlockOffsets. Modernizing Environmental Offset Ownership. Access Here.
- Source: https://blog.comodo.com/e-commerce/the-heartland-breach-a-cautionary-tale-for-e-commerce/
- :has
- :is
- :not
- :where
- $UP
- 000
- 100
- 20
- 20 years
- 2008
- 21st
- 225
- 40
- 8
- a
- Able
- access
- Accounts
- acts
- Additional
- After
- against
- Against Threats
- aggressive
- aggressive approach
- All
- alleged
- allow
- allowed
- already
- also
- ambitious
- American
- an
- analyzing
- and
- announced
- antivirus
- any
- approach
- ARE
- AS
- assessment
- At
- attack
- Attacks
- attention
- avoiding
- Bad
- Banks
- BE
- because
- been
- Beginning
- being
- between
- Blog
- breach
- breaches
- business
- but
- by
- called
- CAN
- cannot
- capture
- captured
- card
- Cards
- case
- Century
- check
- Checks
- child
- clearly
- click
- closer
- CNBC
- code
- coded
- COM
- Companies
- Compensation
- compliance
- compliant
- Compromised
- computer
- Computer Security
- computers
- Connections
- Consequences
- constantly
- continuously
- could
- Counterfeit
- credit
- credit card
- Credit Cards
- crowd
- cuban
- daily
- data
- data breach
- data security
- Database
- day
- Debit
- Debit Cards
- deemed
- Defense
- deployed
- Detection
- determined
- different
- discovered
- dollars
- donald
- Dont
- during
- e-commerce
- Earlier
- else
- encryption
- end
- engaged
- essential
- estimated
- Event
- eventually
- Every
- every day
- everyone
- evidence
- exploited
- exposed
- fact
- far
- featured
- Federal
- Feds
- Files
- financial
- First
- first time
- For
- Former
- found
- fraudulent
- Free
- from
- Gang
- generate
- get
- gif
- good
- hacker
- hackers
- had
- happened
- Have
- he
- Heartland
- Heartland’s
- his
- However
- HTML
- http
- HTTPS
- identified
- identify
- if
- implements
- in
- Inc.
- included
- Including
- industry
- information
- install
- installed
- instant
- International
- issues
- IT
- ITS
- January
- John
- jpg
- just
- Kind
- Know
- known
- large
- largest
- Late
- layered
- lead
- LEARN
- lesson
- LINK
- List
- login
- longer
- loss
- Lot
- Maintaining
- malware
- March
- master
- mastercard
- May..
- measures
- medium
- Men
- Merchants
- million
- million dollars
- millions
- missed
- modified
- money
- Monitor
- monitors
- Month
- months
- more
- most
- moving
- must
- Need
- network
- network traffic
- networks
- New
- news
- night
- no
- notorious
- nt
- number
- numerous
- obtained
- of
- on
- once
- ONE
- online
- online payments
- only
- operation
- or
- Organized
- Other
- over
- page
- pages
- particularly
- payment
- Payment Card
- payment processing
- Payment Systems
- payments
- Payroll
- PCs
- per
- period
- PHP
- plato
- Plato Data Intelligence
- PlatoData
- points
- PoS
- prefer
- Prepaid
- prevent
- prison
- Problem
- problems
- process
- Processed
- processes
- processing
- Processor
- produce
- Program
- Programs
- promoting
- protect
- protection
- provide
- provided
- providers
- purposes
- remarkable
- reply
- require
- required
- responsibility
- retailers
- revenue
- Run
- russian
- safe
- Safety
- Said
- sale
- same
- sandbox
- schemes
- scorecard
- Screen
- scripts
- secretary
- secure
- security
- Security Measures
- send
- sentenced
- separate
- Services
- several
- severe
- show
- site
- Size
- slow
- small
- So
- so Far
- Software
- Solutions
- Solving
- some
- someday
- sophisticated
- spent
- spyware
- started
- stole
- Story
- Strategy
- such
- suspicious
- system
- Systems
- tale
- team
- terms
- tested
- than
- that
- The
- the information
- The Sandbox
- the world
- their
- then
- they
- thing
- things
- this
- threats
- Through
- time
- to
- too
- took
- Total
- traffic
- Transactions
- truly
- two
- type
- unfortunately
- unleashed
- UNNAMED
- until
- updated
- us
- use
- used
- uses
- validation
- very
- visa
- Vulnerabilities
- vulnerability
- was
- we
- web
- Website
- website security
- WELL
- were
- What
- while
- WHO
- why
- will
- with
- Work
- working
- world
- would
- years
- yet
- You
- Your
- zephyrnet