Risk
12/12/2008
03:05 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Poor Computer Security Putting Immigrant Data At Risk

Vulnerabilities are common where money transfers, check cashing, bill payment, travel services, auto insurance, or notary services are provided, a research firm found.

About 60% of the computers at multiservice businesses that serve the immigrant community are actively infected with malware, according to a study released on Thursday by Panda Security.

This puts customers at considerable risk of identity theft and money transfer interception.

About 30% of the computers at these businesses had outdated antivirus software.

Panda's findings come following two years of research into the cybersecurity practices at 300 independently owned and operated multiservice businesses in the Los Angeles and Las Vegas metropolitan areas.

The study focused on businesses in predominately Latino neighborhoods. Eighty-five percent were single locations, with the remainder operating from two to eight branches. About 1,500 PCs total were covered by the study.

Multiservice businesses typically offer money transfers, income tax payment, check cashing, bill payment, travel services, auto insurance, notary services, and/or telephone calling card sales. They're commonly used by immigrants to remit funds to Mexico and other countries.

There are some 66,000 comparable businesses in the United States, Panda claims.

"The employees [at these businesses] are frequently minimum wage young adults who spend time chatting, using peer to peer networks and visiting chat sites on the very same computers sending sensitive data," Panda's report explains. "Periodic spyware infections which stop the ability to perform transactions are often viewed as a business expense. Panda Security views this combination of poor maintenance, low security consciousness and end user behavior as a disaster waiting to happen."

A spokesperson for the company said that the study focused on infection rates rather than actual cases of fraud and thus had no examples of actual accounts being compromised. Even so, the gap between risk and compromise isn't large enough that this issue can be ignored. There's no shortage of examples of data and monetary loss arising from credential theft.

The Panda study points out that the presence of a key-logging Trojan on a PC used to initiate a money transfer through an online site could provide an attacker with all the necessary information to intercept and collect the transferred funds.

While one might prefer to believe that banks would prevent anyone but the designated recipient from collecting transferred funds, reality in countries like Mexico is not constrained by such a rosy view of the world.

"The going rate for a false government identification was USD$100, and false birth certificates cost USD$50," the Panda report states. "Due to advanced dye sublimation card printing technologies and corrupt government employees, high quality false documents made with real substrate can be available in mere minutes. In one popular wire transfer service that makes wire pickup available in a large Mexican national bank the beneficiary does not need to pick up the remittance at the designated branch."

In short, money transfers to such countries can be stolen without substantial difficulty if they begin on a compromised computer.

Panda recommends that multiservice businesses beef up their cybersecurity and advises those interested in transferring money to use FDIC-accredited banks or Western Union, which should have higher security standards. Its report can be obtained by sending an e-mail to: CriticalAlert@us.pandasecurity.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7896
Published: 2015-03-03
Multiple cross-site scripting (XSS) vulnerabilities in HP XP P9000 Command View Advanced Edition Software Online Help, as used in HP Device Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Tiered Storage Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Replication Manager 6.x and 7.x before ...

CVE-2014-9283
Published: 2015-03-03
The BestWebSoft Captcha plugin before 4.0.7 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

CVE-2014-9683
Published: 2015-03-03
Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.

CVE-2015-0656
Published: 2015-03-03
Cross-site scripting (XSS) vulnerability in the login page in Cisco Network Analysis Module (NAM) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCum81269.

CVE-2015-0890
Published: 2015-03-03
The BestWebSoft Google Captcha (aka reCAPTCHA) plugin before 1.13 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.