 |
Friday, December 29, 2000 |
There is another implicit risk in these stories which I am always
quick to bring to the attention of my would-be B2C e-commerce clients.
Suppose you have 500,000 VISA/MC numbers in your computer, and suppose
you have strong cryptographic SSL connections and all that certificate
jazz to ensure the customer and the e-store are who they say they are.
Let's also say that I am an organized crime boss who knows you have
those charge card numbers and have the means and desire to rack up just
$20 worth of purchase from each of them for a cool fast million dollar
profit ... now (and here's the kicker) what is to stop me from offering
your system administrator some tidy sum (even 10%!) to just slip in
a floppy disk and grab me a copy of the data?
Related to this, I asked a leading e-commerce Web site architect if the DLL
that contained the personal information access username and password might
be used by _any_ program that ran on the server (in java, a class can be
made accessible _only_ to a restricted set of applications). The answer was
that they hadn't thought of that.
Gary Lawrence Murphy TeleDynamics Communications Inc
Business Innovations Through Open Source Systems: http://www.teledyn.com
[Simson Garfinkel commented:
I simply do not understand why companies insist on keeping the old
VISA/MC numbers in their computers.] [Gary Lawrence Murphy via risks-digest Volume 21, Issue 18]
0:00
#
G!
| |
The first response to intrusion news stories by most organizations is almost
formulaic: deny the attack, make (often false) allegations that this could
never happen HERE, attack the credibility of the source of the news, and
lastly take a stand against such heinous activity. The response by the UWMC
to the intrusion into their network generally follows the formula.
They started back-pedaling the next day:
"We have received the first tangible evidence from news-gathering
organizations that someone did, in fact, gain criminal access to a limited
number of administrative databases that contain some confidential
information on at least 5,000 cardiology and rehabilitation medicine
patients treated at our hospital," said Tom Martin, director and chief
information officer for University of Washington Medical Centers Information
Systems.
>From MSNBC: "Hospital Confirms Hacking Incident" 2000-12-8
For more complete coverage, I recommend going to where the story broke:
www.SecurityFocus.com and search on "University of Washington Medical
Center"
The original UWMC announcement, however, is still true. Read it carefully,
they worded it so that they never actually denied the attack.
Dan Theunissen, dan.theunissen.no.spam@ieee.org ["Daniel Theunissen" via risks-digest Volume 21, Issue 18]
0:00
#
G!
| |
Maximillian Dornseif, 2002.
|
|
|