![]() |
ATMs Give up PIN Numbers -- Millions stolen
http://news.yahoo.com/s/ap/20080701/...tec_atm_breach
and guess what OS the ATMS are based on? I still don't think the debit cards are safe and for sure not as safe as most think. |
Quote:
A) You write your PIN on a piece of paper in your wallet. B) The machine in which you use your card has an underlying security flaw and a compromise exploits it. In concept, it's a reasonably secure method of authentication. ("Reasonably" because it can be stronger, and there are weaknesses that can be exploited to break the security provided by such a system.) The problem these machines had was that the sensitive data transmitted over the wire was not encrypted properly. This kind of screw-up was human: the people who designed or set up the machine didn't take sufficient steps to secure the transactions. Someone could've failed to encrypt data correctly with any operating system, be it OS/2, Windows, Mac OS X, Linux, QNX, OpenBSD, or any custom embedded OS. Sure, Windows is typically thought of as being less secure than other systems, but that wasn't really the failure here. |
How many ATMs are there? How many have been electronically broken in to? This is reminding me of the attempted ban on Mylar balloons here in California. How many balloons have been sold? How many have caused an electrical outage? And we want to ban them and penalize how many industries?
No fan of Microsoft, but Mikey-San is correct. This probably would have failed no matter what the OS. But really, ATM interfaces are the real problem. They should be designed by Apple and not left-brained coders. I mean really, five menus just to withdraw $40? Yeesh. |
Quote:
There are three liklely causes for the breach:
Another point to note, is that PINs are typically calculated from account numbers by encrypting them with a PIN Derivation Key (PDK) - a system developed by IBM in the 1970s to avoid the need to store the actual PIN anywhere (there are a few subtleties which I've ignored here). It doesn't sound like this key has been compromised (each bank typically has only one such key, so it's discovery would be much more severe). The first two possibilities given above would typically allow for such an outcome. Therefore, my money would be on the last method. And if anyone wonders, analysing the interfaces provided by devices such as the 4758 is what I do... :) EDIT: ...but I'm not the person who contributed to the PIN cracking article linked to above! |
The references in this thread and their references make for scary reading.
|
Quote:
|
Quote:
Therefore, if you are a customer of a bank which uses the IBM PIN calculation system, then choosing your own PIN will not avoid this method of verification. |
Hmmm... then I guess I just better hope that my bank doesn't let the proverbial cat out of the bag.
|
Computers, unlike people, are incapable of making a mistake, but then so is a pencil.
Like NovaScotian, I find all this pretty scary. No doubt somebody, somewhere, dropped the ball on this one. Could one prove they dropped the ball accidentally? With millions at stake and only a couple people needed to collaborate and make this happen, we have to admit the potential exists for wrong doing. And, it's not just pins. It's everything. In this morning's paper, a couple employees were arrested at the local hospital admissions office... yup, check 'em in and give me all your info and by the time the patient was discharged they were victims of identify theft with their debt out of sight. Guess that has nothing to do with computers, but what has changed is technology expanding the possibilities as well as the available dollars to astronomical levels. I think we may be in for a lot more of this, and I really hope the good guys can keep up. |
Quote:
Of course, CitiBank could use a completely different PIN verification scheme... Quote:
(time to hide under the bed, beside all my money...!) :D |
Quote:
Given that during a depression you get deflation (well we did last time anyway because govt didn't print money), hiding your money at home was probably a good investment !! |
Quote:
|
OK
I just read the article and yeah so what it runs off of a Microsoft infrastructure and it is actually very secure. However, some clients did not set up encryption, which is why those PINs were accessed in plain text. So, I fail to see how this is a problem related to MS. What I do see it as, is a network administrator who doesn't know what they are doing and failed to encrypt data. It would be along the same lines of you trying to blame Linksys for not securing your wireless network when you never went in and configured encryption on your WiFi. So, basically in other news, there are still plenty of inept over paid IT people in the world......Someone give me a high paying job, hell I would at least turn on freaking encryption! |
Quote:
|
Quote:
|
I think it is a Microsoft issue, but not for "technical" reasons. Microsoft's culture is generally a "good enough" culture. Emphasizing things like feature counts with no real concern for how well they're implemented creates a culture where it's highly likely that this will happen.
On a minimal level, the system worked, so no one looked for the flaws until hackers found them. Sound familiar? It should, because it's the way Microsoft has always done business. |
Quote:
The problem is people didn't set up encryption. Look at my wireless router analogy, it is a parallel of this exact thing. Out of the box you have to set up your own encryption, it doesn't wipe your butt for you. Banks need to hire people who know the basics of security period. |
Quote:
And I do blame wireless router makers for not requiring security. It would be very simple for a wireless router to redirect all internet traffic to a setup or warning page if security isn't configured. Of course, they're influenced by Microsoft's blame the user culture too. |
Quote:
|
I blame car companies for selling cars for decades without important safety features like seat belts, and only adding them when they were required to, just as router makers should be required to fix their wireless routers.
|
I do when the cause of the accident was a failure in the car.
|
Quote:
|
Absolutely; as you say the weakest part of the car is too often the nut that holds the steering wheel. Having said that, however, you have only to read Consumer Reports' take on automobile safety to appreciate that they have generic flaws.
|
Quote:
Quote:
(Note: although the above is a bit of a backhanded compliment, it isn't intended to be inflammatory and was typed with a light heart and a smile) |
Quote:
|
| All times are GMT -5. The time now is 04:31 AM. |
Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2014, vBulletin Solutions, Inc.
Site design © IDG Consumer & SMB; individuals retain copyright of their postings
but consent to the possible use of their material in other areas of IDG Consumer & SMB.