Risk
12/12/2008
03:05 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Poor Computer Security Putting Immigrant Data At Risk

Vulnerabilities are common where money transfers, check cashing, bill payment, travel services, auto insurance, or notary services are provided, a research firm found.

About 60% of the computers at multiservice businesses that serve the immigrant community are actively infected with malware, according to a study released on Thursday by Panda Security.

This puts customers at considerable risk of identity theft and money transfer interception.

About 30% of the computers at these businesses had outdated antivirus software.

Panda's findings come following two years of research into the cybersecurity practices at 300 independently owned and operated multiservice businesses in the Los Angeles and Las Vegas metropolitan areas.

The study focused on businesses in predominately Latino neighborhoods. Eighty-five percent were single locations, with the remainder operating from two to eight branches. About 1,500 PCs total were covered by the study.

Multiservice businesses typically offer money transfers, income tax payment, check cashing, bill payment, travel services, auto insurance, notary services, and/or telephone calling card sales. They're commonly used by immigrants to remit funds to Mexico and other countries.

There are some 66,000 comparable businesses in the United States, Panda claims.

"The employees [at these businesses] are frequently minimum wage young adults who spend time chatting, using peer to peer networks and visiting chat sites on the very same computers sending sensitive data," Panda's report explains. "Periodic spyware infections which stop the ability to perform transactions are often viewed as a business expense. Panda Security views this combination of poor maintenance, low security consciousness and end user behavior as a disaster waiting to happen."

A spokesperson for the company said that the study focused on infection rates rather than actual cases of fraud and thus had no examples of actual accounts being compromised. Even so, the gap between risk and compromise isn't large enough that this issue can be ignored. There's no shortage of examples of data and monetary loss arising from credential theft.

The Panda study points out that the presence of a key-logging Trojan on a PC used to initiate a money transfer through an online site could provide an attacker with all the necessary information to intercept and collect the transferred funds.

While one might prefer to believe that banks would prevent anyone but the designated recipient from collecting transferred funds, reality in countries like Mexico is not constrained by such a rosy view of the world.

"The going rate for a false government identification was USD$100, and false birth certificates cost USD$50," the Panda report states. "Due to advanced dye sublimation card printing technologies and corrupt government employees, high quality false documents made with real substrate can be available in mere minutes. In one popular wire transfer service that makes wire pickup available in a large Mexican national bank the beneficiary does not need to pick up the remittance at the designated branch."

In short, money transfers to such countries can be stolen without substantial difficulty if they begin on a compromised computer.

Panda recommends that multiservice businesses beef up their cybersecurity and advises those interested in transferring money to use FDIC-accredited banks or Western Union, which should have higher security standards. Its report can be obtained by sending an e-mail to: [email protected].

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Things Every Business Executive Should Know About Cybersecurity
Don't get lost in security's technical minutiae - a clearer picture of what's at stake can help align business imperatives with technology execution.
Flash Poll
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Social engineering, ransomware, and other sophisticated exploits are leading to new IT security compromises every day. Dark Reading's 2016 Strategic Security Survey polled 300 IT and security professionals to get information on breach incidents, the fallout they caused, and how recent events are shaping preparations for inevitable attacks in the coming year. Download this report to get a look at data from the survey and to find out what a breach might mean for your organization.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Security researchers are finding that there's a growing market for the vulnerabilities they discover and persistent conundrum as to the right way to disclose them. Dark Reading editors will speak to experts -- Veracode CTO and co-founder Chris Wysopal and HackerOne co-founder and CTO Alex Rice -- about bug bounties and the expanding market for zero-day security vulnerabilities.