[Dataloss] TJX breach shows that encryption can be foiled

James Childers james at iqbio.net
Tue Apr 3 18:20:00 UTC 2007


From what I understand extended retention of Track 2 data along with CVV
(as evidenced from some media reports) is strictly against PCI-DSS
standards - especially when they were also capturing drivers license and
address details and coordinating these records in a single database.
Perfect tool for ID thieves if you ask me...

Are there any other regulatory penalties or fines (other than PCI
non-compliance) that TJX could get hit with?  What safeguards should be
put in place to prevent this stupidity in the future?

WRT cryptography - once the database is "decrypted" and available for
viewing in raw form on any terminal, it can be captured quite easily
with a trojan or any other logger.  From what I have been able to gather
they were using a proprietary system of PKI and not maintaining a good
key management system.   

Does anyone else have other data?  Were they using strictly SW
encryption or were they using a hardware token?  Single factor?
Multi-Factor authentication?  Local or remote storage of keys?  Terminal
emulation, Windows server, Linux, SQL, Etc...

Any data would be helpful.

James (Jim) Childers
President / Owner
Artemis Solutions Group (USA)
BioCert(r) - iQBio(tm) - BioSaf(r)
www.iqbio.com 
USA Headquarters
PO Box 403
1635 East Main Street
Suite A-8 
Freeland, WA 98249
Phone - (360) 331-1071 X-2101


-----Original Message-----
From: dataloss-bounces at attrition.org
[mailto:dataloss-bounces at attrition.org] On Behalf Of B.K. DeLong
Sent: Tuesday, April 03, 2007 10:47 AM
To: Sean Steele
Cc: dataloss at attrition.org
Subject: Re: [Dataloss] TJX breach shows that encryption can be foiled

I think Andy's got it covered but I'm confident the amount of data
(including Track 2) they were retaining was above and beyond the
PCI-DSS maximum; especially with such a failure cryptography-wise.

On 4/3/07, Sean Steele <SSteele at infolocktech.com> wrote:
> I'm familiar with PCI-DSS standards for DAR encryption for cardholder
> information, but less sure of retention requirements.
>
> Does anyone know conclusively if TJX was simply retaining cardholder
> data per regulations?
>
> -Sean
>
> -----Original Message-----
> From: dataloss-bounces at attrition.org
> [mailto:dataloss-bounces at attrition.org] On Behalf Of DAIL, ANDY
> Sent: Tuesday, April 03, 2007 9:49 AM
> To: dataloss at attrition.org
> Subject: Re: [Dataloss] TJX breach shows that encryption can be foiled
>
>
>
> I don't care if you're using 1024 bit encryption with an atomic
> booby-trap, there is no business reason to retain that much card data
> for such a long period after authorization. Especially magnetic track
> data!!
>
> In the final analysis, if the data were not being retained, the data
> could not be stolen.
>
> TJX is a perfect case-in-point of a retailer who is afraid to purge
> historical data, or does not spend the effort to triage the data to
> determine what is obsolete.  Data Management policy anyone?
>
>
>
> -----Original Message-----
> From: dataloss-bounces at attrition.org
> [mailto:dataloss-bounces at attrition.org] On Behalf Of Chris Walsh
> Sent: Monday, April 02, 2007 5:42 PM
> To: dataloss at attrition.org
> Subject: Re: [Dataloss] TJX breach shows that encryption can be foiled
>
>
>
> On Apr 2, 2007, at 2:44 PM, Casey, Troy # Atlanta wrote:
>
> > It should make for a short list of suspects, assuming TJX was doing
a
> > reasonable job of key management...
>
> That (reasonable key management) is a critical assumption.
>
> I'd be interested in learning what algorithm (and implementation
> thereof) they were using, as well.
>
> Not holding my breath on that info :^)
>
> cw
> _______________________________________________
> Dataloss Mailing List (dataloss at attrition.org)
> http://attrition.org/dataloss Tracking more than 203 million
compromised
> records in 609 incidents over 7 years.
>
> This message and any files transmitted with it is intended solely for
> the designated recipient and may contain privileged, proprietary or
> otherwise private information. Unauthorized use, copying or
distribution
> of this e-mail, in whole or in part, is strictly prohibited. If you
have
> received it in error, please notify the sender immediately and delete
> the original and any attachments.
> _______________________________________________
> Dataloss Mailing List (dataloss at attrition.org)
> http://attrition.org/dataloss
> Tracking more than 203 million compromised records in 609 incidents
over
> 7 years.
> _______________________________________________
> Dataloss Mailing List (dataloss at attrition.org)
> http://attrition.org/dataloss
> Tracking more than 203 million compromised records in 609 incidents
over 7 years.
>


-- 
B.K. DeLong (K3GRN)
bkdelong at pobox.com
+1.617.797.8471

http://www.wkdelong.org                    Son.
http://www.ianetsec.com                    Work.
http://www.bostonredcross.org             Volunteer.
http://www.carolingia.eastkingdom.org   Service.
http://bkdelong.livejournal.com             Play.


PGP Fingerprint:
38D4 D4D4 5819 8667 DFD5  A62D AF61 15FF 297D 67FE

FOAF:
http://foaf.brain-stream.org
_______________________________________________
Dataloss Mailing List (dataloss at attrition.org)
http://attrition.org/dataloss
Tracking more than 203 million compromised records in 609 incidents over
7 years.

-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.


-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.



More information about the Dataloss mailing list