Risk
12/12/2008
03:05 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Poor Computer Security Putting Immigrant Data At Risk

Vulnerabilities are common where money transfers, check cashing, bill payment, travel services, auto insurance, or notary services are provided, a research firm found.

About 60% of the computers at multiservice businesses that serve the immigrant community are actively infected with malware, according to a study released on Thursday by Panda Security.

This puts customers at considerable risk of identity theft and money transfer interception.

About 30% of the computers at these businesses had outdated antivirus software.

Panda's findings come following two years of research into the cybersecurity practices at 300 independently owned and operated multiservice businesses in the Los Angeles and Las Vegas metropolitan areas.

The study focused on businesses in predominately Latino neighborhoods. Eighty-five percent were single locations, with the remainder operating from two to eight branches. About 1,500 PCs total were covered by the study.

Multiservice businesses typically offer money transfers, income tax payment, check cashing, bill payment, travel services, auto insurance, notary services, and/or telephone calling card sales. They're commonly used by immigrants to remit funds to Mexico and other countries.

There are some 66,000 comparable businesses in the United States, Panda claims.

"The employees [at these businesses] are frequently minimum wage young adults who spend time chatting, using peer to peer networks and visiting chat sites on the very same computers sending sensitive data," Panda's report explains. "Periodic spyware infections which stop the ability to perform transactions are often viewed as a business expense. Panda Security views this combination of poor maintenance, low security consciousness and end user behavior as a disaster waiting to happen."

A spokesperson for the company said that the study focused on infection rates rather than actual cases of fraud and thus had no examples of actual accounts being compromised. Even so, the gap between risk and compromise isn't large enough that this issue can be ignored. There's no shortage of examples of data and monetary loss arising from credential theft.

The Panda study points out that the presence of a key-logging Trojan on a PC used to initiate a money transfer through an online site could provide an attacker with all the necessary information to intercept and collect the transferred funds.

While one might prefer to believe that banks would prevent anyone but the designated recipient from collecting transferred funds, reality in countries like Mexico is not constrained by such a rosy view of the world.

"The going rate for a false government identification was USD$100, and false birth certificates cost USD$50," the Panda report states. "Due to advanced dye sublimation card printing technologies and corrupt government employees, high quality false documents made with real substrate can be available in mere minutes. In one popular wire transfer service that makes wire pickup available in a large Mexican national bank the beneficiary does not need to pick up the remittance at the designated branch."

In short, money transfers to such countries can be stolen without substantial difficulty if they begin on a compromised computer.

Panda recommends that multiservice businesses beef up their cybersecurity and advises those interested in transferring money to use FDIC-accredited banks or Western Union, which should have higher security standards. Its report can be obtained by sending an e-mail to: CriticalAlert@us.pandasecurity.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8142
Published: 2014-12-20
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.