[901] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: FBI: Hacker sold 100,000 credit card numbers

daemon@ATHENA.MIT.EDU (Steven Bellovin)
Fri May 23 14:37:56 1997

To: John Pescatore <johnp@tis.com>
cc: Rick Smith <smith@securecomputing.com>, cryptography@c2.net
Date: Fri, 23 May 1997 14:04:30 -0400
From: Steven Bellovin <smb@research.att.com>

	Actually, if a sniffer was used something like SET would have
	saved the day, or least made smak go after every PC. The story
	I read said the FBI didn't know how he got them, and that they
	suspected him of breaking into numerous servers.

	I think on most ISPs it is probably easier to go after the
	billing server that stores user credit card numbers. To sniff
	100,000 credit card number coming from users means you found
	that many folks accessing some number of sites not at least
	using SSL.

Here's the text I'm referring to:

  The scheme was discovered by the unidentified San Diego-based Internet
  provider during routine maintenance. Technicians found an intruder had
  placed a program in their server called a "packet sniffer," which locates
  specified blocks of information, such as credit card numbers. 

Possibly, of course, the sniffer was to help spread break-ins, and
the credit card numbers were stolen from a service host.  Or maybe
there was a back-end processor handling credit cards for many vendors --
SSL to the vendor, then cleartext to the backend...  Lots of ways to
screw up security!  (My personal preference is for digitally signed
orders, so that card numbers never appear on the merchant's side.
Of course, then we'll see sniffing code that uses a virus as a vector...)

	Mass market operating systems will always be security feeble,
	much the way most internal doors have pretty feeble locks.

Yup.

home help back first fref pref prev next nref lref last post