Attacks/Breaches
7/24/2014
02:17 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Travel Agency Fined £150,000 For Violating Data Protection Act

That'll teach them not to retain credit card data in perpetuity.

The UK Information Commissioner's Office (ICO) has fined the online travel company Think W3 ₤150,000 ($254,610.75) for violating the country's Data Protection Act, as well as the Payment Card Industry Data Security Standard (PCI-DSS). This penalty was issued in response to a December 2012 SQL injection attack that breached a Think W3 website and nabbed credit card numbers and other personally identifiable information on more than 1 million customers.

The site in question was a staff car parking system (for maintaining costs and availability of parking) that was created in 2006 and meant for internal use only. Unfortunately, it was installed on the same server that contained the company's main e-commerce application used to store customer personal data.

The car parking system had not undergone penetration testing or internal vulnerability scans before or after implementation -- the argument being that security testing was unnecessary, because it wasn't an external-facing site, and it required users to log in.

By compromising that site, however, attackers were able to obtain admin access to the common server. They then created a custom query to extract and decrypt cardholder data using the encryption key, which was not stored securely on the web server. After grabbing the credit card data (excluding CVV numbers), the attackers went on to lift the associated names, addresses, email addresses, and phone numbers.

The car parking system had never been updated, and the customer data had never been deleted, so when the attackers penetrated in December 2012, they were able to obtain records dating all the way back to 2006. Altogether they lifted 1,163,996 credit and debit card records, 733,397 of which were expired.

Investigators found none of these records were ever put to use for financial fraud.

Under the Data Protection Act, a "data controller" can be slammed with a monetary penalty if there is a "serious contravention" of the act, if it was "likely to cause substantial damage or substantial distress," and if it was deliberate, or if the data controller knew or should have known such a thing would occur, or if the controller "failed to take reasonable steps to prevent" it.

The highest penalty allowed by the law is ₤500,000.

Some of the factors that contributed to the size of the ₤150,000 penalty included the fact that the company failed to comply with PCI-DSS, test the site's security, patch software, update anti-virus software, and implement suitable intrusion detection systems, file-integrity monitoring software, encryption key management, and internal policies.

Another data controller was just fined for a Data Protection Act violation. Jayesh Shah, a marketing company owner from Pune, India, was fined ₤4,000 for failing to notify the ICO that he was changing his notification. He allegedly sent "millions of unsolicited text messages," but the offense was not for spamming, but rather for selling data on individuals to other parties.

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Thomas Claburn
50%
50%
Thomas Claburn,
User Rank: Moderator
7/24/2014 | 4:05:36 PM
data is a liability as well as an asset
When it comes to data storage, less is more.
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3409
Published: 2014-10-25
The Ethernet Connectivity Fault Management (CFM) handling feature in Cisco IOS 12.2(33)SRE9a and earlier and IOS XE 3.13S and earlier allows remote attackers to cause a denial of service (device reload) via malformed CFM packets, aka Bug ID CSCuq93406.

CVE-2014-4620
Published: 2014-10-25
The EMC NetWorker Module for MEDITECH (aka NMMEDI) 3.0 build 87 through 90, when EMC RecoverPoint and Plink are used, stores cleartext RecoverPoint Appliance credentials in nsrmedisv.raw log files, which allows local users to obtain sensitive information by reading these files.

CVE-2014-4623
Published: 2014-10-25
EMC Avamar 6.0.x, 6.1.x, and 7.0.x in Avamar Data Store (ADS) GEN4(S) and Avamar Virtual Edition (AVE), when Password Hardening before 2.0.0.4 is enabled, uses UNIX DES crypt for password hashing, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force a...

CVE-2014-4624
Published: 2014-10-25
EMC Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) 6.x and 7.0.x through 7.0.2-43 do not require authentication for Java API calls, which allows remote attackers to discover grid MCUser and GSAN passwords via a crafted call.

CVE-2014-6151
Published: 2014-10-25
CRLF injection vulnerability in IBM Tivoli Integrated Portal (TIP) 2.2.x allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.