US man 'stole 130m card numbers' | JamiiForums | The Home of Great Thinkers

Dismiss Notice
You are browsing this site as a guest. It takes 2 minutes to CREATE AN ACCOUNT and less than 1 minute to LOGIN

US man 'stole 130m card numbers'

Discussion in 'International Forum' started by Giro, Aug 18, 2009.

  1. Giro

    Giro JF-Expert Member

    Aug 18, 2009
    Joined: Feb 9, 2009
    Messages: 360
    Likes Received: 9
    Trophy Points: 35
    US prosecutors have charged a man with stealing data relating to 130 million credit and debit cards.
    Officials say it is the biggest case of identity theft in American history.
    They say Albert Gonzalez, 28, and two un-named Russian co-conspirators hacked into the payment systems of retailers, including the 7-Eleven chain.
    Prosecutors say they aimed to sell the data on. If convicted, Mr Gonzalez faces up to 20 years in jail for wire fraud and five years for conspiracy.
    He would also have to pay a fine of $250,000 (£150,000) for each of the two charges.
    Mr Gonzalez used a technique known as an "SQL injection attack" to access the databases and steal information, the US Department of Justice said.
    His corporate victims included Heartland Payment Systems - a card payment processor - convenience store 7-Eleven and Hannaford Brothers, a supermarket chain, the DoJ said.
    According to the indictment, the group researched the credit and debit card systems used by their victims, attacked their networks and sent the data to computer servers they operated in California, Illinois, Latvia, the Netherlands and Ukraine.
    The data could then be sold on, enabling others to make fraudulent purchases, it said.
    Mr Gonzalez, who had once been an informant for the US Secret Service helping to track hackers, is already in custody on separate charges of hacking into the computer system of a national restaurant chain.
    This latest case will raise fresh concerns about the security of credit and debit cards used in the United States, the BBC's Greg Wood reports.

  2. Bluray

    Bluray JF-Expert Member

    Aug 18, 2009
    Joined: Mar 25, 2008
    Messages: 3,446
    Likes Received: 31
    Trophy Points: 135
    Time to change that card, or at least the PIN code.The bank should tell you, but they are afraid of a lawsuit, so they wont.
  3. Giro

    Giro JF-Expert Member

    Aug 18, 2009
    Joined: Feb 9, 2009
    Messages: 360
    Likes Received: 9
    Trophy Points: 35
    SQL Injection: What is it?
    SQL Injection is one of the many web attack mechanisms used by hackers to steal data from organizations. It is perhaps one of the most common application layer attack techniques used today. It is the type of attack that takes advantage of improper coding of your web applications that allows hacker to inject SQL commands into say a login form to allow them to gain access to the data held within your database.

    In essence, SQL Injection arises because the fields available for user input allow SQL statements to pass through and query the database directly

    What is the impact of SQL Injection?
    Once an attacker realizes that a system is vulnerable to SQL Injection, he is able to inject SQL Query / Commands through an input form field. This is equivalent to handing the attacker your database and allowing him to execute any SQL command including DROP TABLE to the database!

    An attacker may execute arbitrary SQL statements on the vulnerable system. This may compromise the integrity of your database and/or expose sensitive information. Depending on the back-end database in use, SQL injection vulnerabilities lead to varying levels of data/system access for the attacker. It may be possible to manipulate existing queries, to UNION (used to select related information from two tables) arbitrary data, use subselects, or append additional queries.

    In some cases, it may be possible to read in or write out to files, or to execute shell commands on the underlying operating system. Certain SQL Servers such as Microsoft SQL Server contain stored and extended procedures (database server functions). If an attacker can obtain access to these procedures, it could spell disaster.

    Unfortunately the impact of SQL Injection is only uncovered when the theft is discovered. Data is being unwittingly stolen through various hack attacks all the time. The more expert of hackers rarely get caught

    Example of a SQLInjection Attack
    Here is a sample basic HTML form with two inputs, login and password.

    <form method="post" action="">
    <input name="tfUName" type="text" id="tfUName">
    <input name="tfUPass" type="password" id="tfUPass">

    The easiest way for the login.asp to work is by building a database query that looks like this:

    SELECT id
    FROM logins
    WHERE username = '$username'
    AND password = '$password’

    If the variables $username and $password are requested directly from the user's input, this can easily be compromised. Suppose that we gave "Joe" as a username and that the following string was provided as a password: anything' OR 'x'='x

    SELECT id
    FROM logins
    WHERE username = 'Joe'
    AND password = 'anything' OR 'x'='x'

    As the inputs of the web application are not properly sanitised, the use of the single quotes has turned the WHERE SQL command into a two-component clause.

    The 'x'='x' part guarantees to be true regardless of what the first part contains.

    This will allow the attacker to bypass the login form without actually knowing a valid username / password combination!
  4. Giro

    Giro JF-Expert Member

    Aug 18, 2009
    Joined: Feb 9, 2009
    Messages: 360
    Likes Received: 9
    Trophy Points: 35
    Then how to avoid SQL Injection?
    Filter out character like single quote, double quote, slash, back slash, semi colon, extended character like NULL, carry return, new line, etc, in all strings from:
    - Input from users
    - Parameters from URL
    - Values from cookie

    For numeric value, convert it to an integer before parsing it into SQL statement. Or using ISNUMERIC to make sure it is an integer.

    Change "Startup and run SQL Server" using low privilege user in SQL Server Security tab.

    Delete stored procedures that you are not using like:

    master..Xp_cmdshell, xp_startmail, xp_sendmail, sp_makewebtask