男友太凶猛1v1高h,大地资源在线资源免费观看 ,人妻少妇精品视频二区,极度sm残忍bdsm变态

WORLD> America
Citibank ATM breach reveals PIN security problems
(Agencies)
Updated: 2008-07-02 15:35

SAN JOSE - Hackers broke into Citibank's network of ATMs inside 7-Eleven stores and stole customers' PIN codes, according to recent court filings that revealed a disturbing security hole in the most sensitive part of a banking record.

A Citibank ATM machine is shown at 7-Eleven in Palo Alto, Calif., Tuesday, July 1, 2008. [Agencies] 

The scam netted the alleged identity thieves millions of dollars. But more importantly for consumers, it indicates criminals were able to access PINs - the numeric passwords that theoretically are among the most closely guarded elements of banking transactions - by attacking the back-end computers responsible for approving the cash withdrawals.

The case against three people in US District Court for the Southern District of New York highlights a significant problem.

Hackers are targeting the ATM system's infrastructure, which is increasingly built on Microsoft Corp.'s Windows operating system and allows machines to be remotely diagnosed and repaired over the Internet. And despite industry standards that call for protecting PINs with strong encryption - which means encoding them to cloak them to outsiders - some ATM operators apparently aren't properly doing that. The PINs seem to be leaking while in transit between the automated teller machines and the computers that process the transactions.

"PINs were supposed be sacrosanct - what this shows is that PINs aren't always encrypted like they're supposed to be," said Avivah Litan, a security analyst with the Gartner research firm. "The banks need much better fraud detection systems and much better authentication."

It's unclear how many Citibank customers were affected by the breach, which extended at least from October 2007 to March of this year and was first reported by technology news Web site Wired.com. The bank has nearly 5,700 Citibank-branded ATMs inside 7-Eleven Inc. stores throughout the US, but it doesn't own or operate any of them.

That responsibility falls on two companies: Houston-based Cardtronics Inc., which owns all the machines but only operates some, and Brookfield, Wis.-based Fiserv Inc., which operates the others.

A critical issue in the investigation is how the hackers infiltrated the system, a question that still hasn't been answered publicly.

All that's known is they broke into the ATM network through a server at a third-party processor, which means they probably didn't have to touch the ATMs at all to pull off the heist.

They could have gained administrative access to the machines - which means they had carte blanche to grab information - through a flaw in the network or by figuring out those computers' passwords. Or it's possible they installed a piece of malicious software on a banking server to capture unencrypted PINs as they passed through.

What that means for consumers is that their PINs were stolen from machines that showed no signs of tampering they could detect. In previous PIN thefts, thieves generally took steps that might draw notice - sending "phishing" e-mails, for example, or installing false-front keypads or even tiny cameras on ATMs.

   Previous page 1 2 Next Page  
主站蜘蛛池模板: 政和县| 石柱| 建德市| 栾城县| 泰来县| 玛曲县| 安溪县| 永平县| 温州市| 龙海市| 缙云县| 顺昌县| 托克托县| 建宁县| 龙口市| 河南省| 陆丰市| 罗江县| 沐川县| 平武县| 横峰县| 涿鹿县| 军事| 庆城县| 常德市| 平邑县| 新建县| 璧山县| 罗田县| 常熟市| 永济市| 孝义市| 屏边| 新竹市| 疏勒县| 平利县| 柳江县| 鹤山市| 当雄县| 平度市| 疏勒县|