Feeds

Australian cops bust Romanian credit card thieves

Wrestler questioned after RDP SNAFU and two vulns lead to 500k card heist

Internet Security Threat Report 2014

Australia's Federal Police (AFP) has triumphantly announced it has brought a gang of Romanian credit card fraudsters to heel, but not before the criminals purloined half a million credit card numbers from small Australian retailers.

Detective superintendent Brad Marden, the AFP's national co-ordinator for cybercrime operations, told The Register the gang targeted small retailers likely to be ignorant of security and used three techniques to pull of the heist.

The first was using remote desktop management software to infiltrate retailers' PCs, an exploit made possible by the fact whoever installed it had not changed the default passwords.

"The stores relied on local consultants who they were not experts on PCI-DSS, they just wanted to set up a simple small business network," Marden explained. That left RDP ignored and open to attack.

The second issue was un-patched point of sale software.

The third vulnerability that made the attack possible was an insecure point-of-sale PIN pad that Marden said was in the process of being addressed by banks, which issue the devices.

Once attackers were able to access PCs through RDP they were then able to operate the point of sale software and access credit card numbers collected from the PIN pads.

Marden said 46 of the 100 PCs known to have been hit offered sufficient evidence of the source of the hacking and that Australia's banks gathered evidence to help the force pursue the case.

Both vulnerabilities have since been addressed and an education campaign has commenced to inform small retailers about the need to update their software and hardware.

The gang came to the AFP's attention in June 2011 and the revelation of its activities set in motion a 13-nation effort that yesterday culminated in the detention of 16 people, among them champion Graeco-Roman wrestler and mixed martial arts practitioner Gheorghe 'The Carpathian Bear' Ignat, according to the ABC.

Georghe 'The Carpathian Bear' Ignat

Source: Wikipedia

The Carpathian Bear was not one of seven people arrested over the matter, which saw $AUD30m of purchases made with purloined credit card numbers. Those transactions took place around the world.

The AFP says those purchases were made with 30,000 credit cards, but that the gang managed to get its hands on half a million.

Australian financial institutions have made sure punters aren't out of pocket, refunding them for fraudulent purchases.

The news may not be as good for the retailers, as contracts offered by banks down under can make them liable for fraudulent transactions if they've not taken all requisite safeguards to protect credit cards. ®

Beginner's guide to SSL certificates

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.