July 2014

Cybercrime-As-A-Service Led To Credit Card Breaches

Software as a service is on the rise, there’s no doubt about that. This model, in which people purchase software, security, or operating system access from cloud-based provider, using these packages through a Web-based interface rather than downloading the package to a local PC, is becoming increasingly popular among service providers as well as among end-users. Even Microsoft offers a Web-based version of its industry standard Office software, and virtual terminal payments are becoming an increasingly popular option as compared to traditional credit card readers.


It seems, however, that whenever any sort of service becomes popular, it also becomes a target for unscrupulous programmers, or hackers. The always-assumed bulletproof Mac OS has in the past few years seen more and more instances of malware and virus attacks as it gained traction in the market and became a more popular option for home users.


The same holds true for credit cards, and this is one reason why virtual terminal payments are gaining traction..


You see, now we have to deal with cybercrime as a service. The waves of card breaches last year which began at Target were the direct result of cybercrime as a service. The code for the malware was available and sold online at dark web sites, as were the millions of card numbers stolen. One could, in effect, pay another hacker to use the malware to use the software and obtain card numbers for you. This is the very definition of cybercrime as a service.


The software, purchased online, could also be easily modified for the buyer’s own purpose. The service was so efficient with an untrackable virtual currency and a ready-made, efficient black market already in place, that legitimate businesses could almost take a lesson from the model, if not the implementation. If nothing else, the means by which these attacks have been made, the marketplace in which they are germinated, is wildly efficient.


Many retailers have considered, in the face of these attacks, a switch to virtual terminal payments in lieu of credit cards. Traditionally, virtual terminals can offer more security than physical terminals, as well as combining inventory tracking and purchasing trends with card processing. With mobile malware also on the rise, this may not be an ideal solution, but then, in an era where cybercrime is rampant, there may not be a true ideal.

Legalities and standards in the payment card processing environment

The 2013 data breaches that affected many major retailers from Target to Neiman Marcus were high-profile, public, and threw an unsightly and frankly frightening spotlight on the sheer weaknesses of the security standards inherent in the current credit card payment solution model. Indeed, PCWorld magazine labeled 2013 “The Year of the Personal Data Breach.”


The current system, which uses a magnetic stripe on the credit card to store the user’s data, is outmoded, archaic, and in dire need of update and improvement. Of this there is no doubt. It is also likely that these needed updates will come in the form of new technologies and systems that represent a more efficient and secure credit card payment solution than those currently in place. What this means is that there will be a major overhaul of how credit cards work, and even what they look like.


It is also certain that in-house general counsel will have to partner with the latest in IT standards to ensure compliance with any new regulations that result from this overhaul—any major revision in standards like this is going to get complex in a legal sense. The current standards for credit card security are called the Payment Card Industry Data Security Standard (PCI-DSS), and were established in 2004 by the major credit card companies.  The standards are detailed and complex, and break down to broad directives such as building and maintaining secure networks, protecting data, managing vulnerability, implementation of access control measures, regular monitoring and testing of networks, and maintenance of information security policies. These are in addition to specialized requirements based on merchant levels based on sales volume.


In 2006, the credit card companies created the Payment Card Industry Standards Council (PCI-SSC) to manage the complexity of the PCI-DSS, and to enforce the standards in place. This council performs audits, maintains information about credit card payment solution security providers, and establishes criteria to provide certification for the Qualified Security Assessors who are the only recognized officers for compliance of the PCI-DSS.


The general counsel, or advisory attorney who specializes in compliance issues, is needed to interpret the PCI-DSS and recommend to internal IT departments the risks involved, and the consequence of non-compliance. The attorney will also conduct regular reviews of this compliance, collaborate with the company’s credit card payment solution hierarchy, and continually review not only current standards documentation, but contracts with outside institutions to ensure constant regulation.


Whether or not the future sees a revised PCI-DSS standard, or a new standard altogether which will replace the current one, IT departments along will not be able to handle the complex new security standards in place—attorneys will continue to be a vital part of the credit card payment solution infrastructure.

Thieves Jam up Smucker’s Card Processor

Virtual thieves have struck again! As Congress and the major credit card companies race to come up with new, more secure credit card payment solutions, the world-famous jelly and jam maker, Smucker’s, has seen its own infrastructure jammed up, shutting its online store last week amidst the need to rebuild after a security breach jeopardized sensitive credit card data.


Research indicates that the company was only one of several dozen other companies that were hacked in 2013, including Adobe, LexisNexis, Dun & Bradstreet, and others. The latest information about the hit is that the malware in question acts like a banking Trojan, except that rather than targeting a PC, it targets web applications. This makes it potentially even more dangerous, as it won’t be restricted to a single operating system or set of operating systems, but could hit you at any computer that accesses the Web, be it a Windows PC, a Mac, or a Google Chromebox. Even tablets and mobile devices may be vulnerable.


This particular malware, much like other Trojans, tears data from visitor-submitted forms such as names, addresses, phone numbers, credit card numbers, and card verification code, as customers submit data during checkout. This hammers home the idea that security when it comes to credit card payment solutions goes two ways—if either the end user or the company is compromised, the malware can slip in. Both ends need to be secure for any sort of encryption to work. In this case, the issue was that Smucker’s and the other targeted vendors were running outdated (and thus vulnerable) versions of Adobe’s ColdFusion web application.


There is an important and yet very costly lesson to be learned here, which is particularly important to small businesses: if a giant like Smucker’s can be hit, so can you. Never take the cheap route out when it comes to security by running an outmoded, outdated, and vulnerable security package. Make sure that whatever credit card payment solutions you use, that they are of the latest version with up-to-date security standards at both the end-user point and the processing point. This is the only way you can protect your customers’ sensitive data from the legions of hackers just waiting to suck up their personal data for unscrupulous use.

How Debit Card Processing Works

You’re familiar with the basics—you walk up to an automated teller machine, insert your card, punch in your PIN, ask for cash and (provided you have some in your account) you get your money. On the other hand, perhaps you don’t have any cash in your wallet and you want to make a purchase. So long as you’ve got the cash in your account, you’re good to go. You swipe your card at the terminal just like a credit card, maybe enter your PIN, and the purchase is made. It all seems very easy, but what is the debit card payment process? How does the transaction go from point of sale to your bank and back?


There are two forms of debit card payment process. These are the offline, signature-based process, and the online, PIN-based process.


Offline cards have to be branded as VISA or MasterCard, and are processed in a similar manner to credit cards. That is, the vendor’s equipment connects to a payment network, sends the request from the card, and waits while the network performs a series of tests to ensure that the card is not authorized for use, frozen, over the limit (or overdrawn, in the case of the debit card). This whole process generally only takes a few seconds. If the request is approved, you will sign the receipt, at which point the vendor puts the request into a payment batch and goes through a settlement process at the close of the business day to get the money. This can take 48 to 72 hours.


For the online debit card payment process, you will swipe your card and be asked to enter your PIN, which substitutes for your signature. In many cases, you will in this type of transaction have the option to get cash back. Since you have used your PIN, by the time the sales information gets to your financial institution, the transaction itself is already authorized by you, so no authorization check is performed. Similar to the offline method, the connection and communication with the network takes mere seconds to perform. As long as there is enough money to cover the sale in your account, the transaction will be approved. Unlike the offline method, your checking account will immediately be debited—there is no waiting period for processing, and funds are transferred instantly from your account to the vendor’s.

An Overview of Smartphone Processing

Since the earliest days of credit cards, they have represented an easy way to pay for goods and services without the need to carry wads of cash around. However, for a long time, this required bulky credit card processing systems which took up a lot of space and were certainly not portable.


These bulky systems are no longer valid in an era when technology is small, fast, and always plugged in. Since it seems just about everyone has a smartphone, processing credit cards using the handheld device seems not only practical, but a must if you wish to get ahead in business today.


More and more small business owners are turning to smartphone processing for acceptance of credit card payments. There are many varieties and options available to do this, from basic apps which allow the entry and transfer of a patron’s information via a virtual wallet, such as PayPal or Google Wallet, to vendor merchant services which provide an actual swipe card reader with multiple layers of security to accept direct credit card payments.


The options for these systems vary—most charge a fee of some sort, be it a “per transaction” or “per swipe” fee, or a percentage of funds transferred. Many allow emailing of a receipt, and some allow customizability features such as the ability to create customer loyalty programs. You should make sure that whatever system you choose, it doesn’t store customer payment information on your device (though some do store contact and demographic information, allowing you to create a database of contacts for the purposes of targeted marketing and sales promotions). Some offer the ability to process refunds—either full or partial—on the spot. Others allow inventory management and tracking via barcode scanning, and for those merchants who travel from state to state, some offer the ability to automatically calculate sales tax based on your location.


There are many options available for smartphone processing these days, and if you are a business owner, you are doing yourself a disservice by not taking advantage of the ability to take credit card payments on the go. A quick web search will turn up lots of options, making it very easy to do your research and choose the option that is best for your business.