Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Networking

    DPI Scrambles After Credit-Card Theft

    Written by

    Larry Dignan
    Published March 6, 2003
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      When Data Processors International (DPI) revealed in February that an “unauthorized outside party” ran off with more than five million Visa and MasterCard account numbers and expiration dates, it got an instant wakeup call.

      Not only were the credit card customers accounts potentially at risk, so was the companys reputation for trustworthiness.

      Luckily, the accounts werent abused. “Theres nothing to tie the card numbers to personal data,” says N. Scott Jones, spokesman for DPI. “There havent been any reported incidents of misuse.”

      That was the good news for DPI, a 40-employee subsidiary of Dallas-based transaction processing company TransFirst. The bad news: Analysts say fraud cases could emerge if the thief does manage to connect numbers with names. And theres more bad news: DPI in the meantime will have to fight to repair its network and to keep business with Visa and MasterCard.

      “In these situations, the trust is the one thing that suffers,” says Rebecca Base, CEO of Infidel Inc., a Scotts Valley, Calif., network-security consulting firm. “In a down economy, an event like this could cost you your business.”

      Its also unclear what effect the DPI incident will have on TransFirst. DPI runs on a separate network from TransFirst, which is offering DPI technology resources, says Jones, who couldnt reveal what platform the two companies use. TransFirst processes more than $8 billion in annual sales volume for more than 64,000 merchants and 520 banks.

      Visa and MasterCard have security policies that processors and merchants in the network must follow. Visa calls its requirements the “dirty dozen,” which require parties to maintain firewalls, patches and antivirus software, encrypt data, track and restrict access and implement a security policy. Failure to comply with Visas requirements can result in a fine, restrictions or permanent prohibition. MasterCard has similar “best practice” requirements.

      DPI, based in Omaha, typically processes catalog and other transactions where a card isnt present. Because it is privately held, DPI has said little about the intrusion. Visa and MasterCard declined to comment beyond statements, citing an ongoing investigation by the Secret Service and FBI.

      Jerry Brady, chief technology officer of security consulting firm Guardent, says the volume of credit card numbers indicates an inside job—contrary to DPIs statement—or a slow network leak where a thief accumulated numbers over time.

      “Id bet my bottom dollar on an insider attack due to the volume,” said Brady. “With the big numbers theres a three-to-one probability its internal.”

      Regardless, the highly publicized intrusion is likely to teach technology executives some valuable lessons.

      For business leaders, the first lesson is to realize that seemingly unknown targets should consider themselves targets. Analysts note that hackers regularly troll for network weak spots and target companies that are low on the food chain, but have valuable data much like DPI.

      Indeed, the “attack seems fairly unremarkable to me,” says Matthew Caston, senior principal of consulting firm AMS enterprise security group. “Im not surprised because these hacks are a fairly regular occurrence.”

      Simply put, you have to assume that hacking incidents occur in your industry even if you dont hear about them. “Image is everything,” says Avi Rubin, technical director of the Information Security Institute at Johns Hopkins. “Someone can steal $500,000, but the bad PR could make you lose $3 million in business.”

      Security by Obscurity

      Security by Obscurity

      According to Caston, DPI probably benefited from “security by obscurity” until now. After the attack, its likely to have a bulls-eye on its network not long after the feds clear out.

      The plans—or lack of them—that DPI had in place ahead of the attack will go a long way to determining how quickly itll recover. Executives need to prepare for a hack and map out plans and procedures before it even happens.

      “Having a plan in these situations makes all the difference,” says Infidels Bace. “It helps to think these things out before youre in a crisis.”

      The intrusion plan should include: creating an emergency response team either in-house or contracted out, clarifying decision-making and weighing options for various attack scenarios.

      Bace also tells clients to take a “footprint” of your system with software from a vendor like Tripwire. Taken during normal operation, this footprint of the network and its applications can serve as a baseline for when things go awry. Ultimately, this snapshot helps project managers see what an attacker changed.

      With the planning in place, analysts say responding to an intrusion is much like putting out a fire or working in an emergency room. Analyze the problem, contain it with a short-term fix, eliminate the issue and then ultimately fix it.

      The main goal after an attack is to fix the problem and keep the business running, says Brady. That means cutting over to your disaster recovery plan or “cold” backups—offline mirror systems—to keep operations going.

      But beware some short-term fixes. One big mistake is to patch the hole and move on—you could be sealing in malicious code. “Simply patching a system after its hacked is analogous to letting a burglar in your house and then locking the door—if hes in, hes in,” says Caston.

      Consultants say the response depends on the situation. Typical first responses include disconnecting a compromised system from the network and changing passwords.

      Even those steps, however, can be complicated without forensic analysis done either in-house or through security consultants. “Unless you have absolute knowledge of how a hacker got in, you have to analyze everything on the network,” says Caston.

      More complications can depend on whether the law is involved. Conflicts in the DPI case could emerge because the law enforcement goals to preserve evidence can hold back the companys efforts to resume business.

      “Law enforcement has specific procedures and rules of custody and they are picky about sharing information,” says Bace. “But they are getting better at collecting data in a way that doesnt affect operations.”

      After the immediate crisis passes, business leaders may choose to rejigger network architecture to prevent future attacks. Rubin suggests installing “honey pots”—repositories of fake data—to throw hackers off the trail, reconfiguring firewalls and separating databases that hold key information.

      Once a company is confident its network is ready for business, executives have to go out and mend some fences. The attack on DPI resulted in added expense for other companies in the credit-card food chain.

      PNC Bank, based in Pittsburgh, decided to replace 10,000 active cards to allay customer worries, says PNC spokesman Brian Goerke.

      Goerke wouldnt reveal how much the new cards cost PNC, but Gartner estimates replacement cards run $35 each.

      “If youre smart and you make it, you come back up in a different environment,” says Bace. “Then you need to talk about what steps you took to make damn sure this doesnt happen again.”

      What You Should Do

      Hack Prevention

      1. Think ahead. Establish clear policies in case of an intrusion and create an emergency response team.
      2. Find your footprint. Create a clear map of your hardware, software and files so you know what your network looks like in a normal state. It will help you see what changed in the event of a hack.
      3. Contact allies. Touch base with law enforcement before an emergency as well as immediately after a hack.
      4. Contain the damage. If hit, disconnect the compromised system from the network.
      5. Rebuild, rearchitect. As you work through recovery, consider a different architecture to prevent future attacks.
      Larry Dignan
      Larry Dignan
      Larry formerly served as the East Coast news editor and Finance Editor at CNET News.com. Prior to that, he was editor of Ziff Davis Inter@ctive Investor, which was, according to Barron's, a Top-10 financial site in the late 1990s. Larry has covered the technology and financial services industry since 1995, publishing articles in WallStreetWeek.com, Inter@ctive Week, The New York Times, and Financial Planning magazine.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×