Vulnerabilities / Threats
5/20/2014
12:10 PM
50%
50%

LifeLock Pulls Apps Over PCI Compliance Failure

Sensitive data stored in LifeLock Wallet apps and on company servers are proactively wiped after the company warns it wasn't being stored securely.

10 Ways To Fight Digital Theft & Fraud
10 Ways To Fight Digital Theft & Fraud
(Click image for larger view and slideshow.)

Warning to users of the mobile wallet apps offered by LifeLock: The next time you open the app on your smartphone or tablet, all data stored therein will be deleted.

That unusual move was announced Friday by the identity theft monitoring service provider, which said it's also removed the application from Apple's App Store, the Amazon Apps store, and Google Play. "We have determined that certain aspects of the mobile app may not be fully compliant with payment card industry (PCI) security standards," chairman and CEO Todd Davis told customers in an "Important Update About LifeLock Wallet" blog post. "I personally apologize for the inconvenience."

The Payment Card Industry Data Security Standard (PCI-DSS) stipulates that any organization that stores or transmits cardholder data must appropriately secure that information, including locking down all the keys used to encrypt the data.

Also Friday, LifeLock filed a Securities and Exchange Commission form 8-K -- for notifying shareholders of any major corporate events -- in which it said that it planned to reissue the apps after they've been reengineered.

"We have temporarily suspended the Wallet mobile application, and are deleting the data -- encrypted or otherwise -- from our servers, until we can operate the Wallet mobile application in accordance with those standards," the filing said. "We have no indication that the data included in the Wallet mobile application servers was compromised."

[Malware-bearing ads are a growing problem, and Congress wants the industry to be more proactive. Read Senators Slam Online Advertisers As 'Malvertising' Spikes.]

In its SEC filing, LifeLock warned shareholders that it informed the Federal Trade Commission on Thursday that it was storing data in violation of PCI requirements. That notification was required since LifeLock reached a $12 million agreement with the FTC and 35 state attorneys general in 2010 to settle charges that the fraud alerts it put on accounts didn't block most types of identity theft, as well as charges that LifeLock made deceptive claims about its ID theft monitoring service and data protection efficacy.

"It is possible that this PCI non-compliance of the Wallet mobile application could result in a determination by the FTC that we are not in full compliance with our FTC consent order," LifeLock said in the SEC filing.

After the filing was released, LifeLock's stock price tumbled 18% in trading Monday.

As of December 2013, LifeLock Wallet -- available for Android and iOS -- had been downloaded 3.6 million times. LifeLock acquired the software through its December 2013 purchase of the mobile wallet developer Lemon for $43 million. When the purchase was announced, LifeLock said the apps allowed consumers to "store a complete digital copy of their personal wallet contents in one location," including credit card numbers, driver's license numbers, ATM card numbers, and loyalty card data.

Since its 2005 inception, LifeLock -- which charges $110 per year or more for its identity theft monitoring service -- has been beset by tepid reviews and criticism that it doesn't do anything that consumers can't already do for themselves for free.

In April, LifeLock began advertising a senior IT auditor position with PCI-related responsibilities. "This role provides management with a review of information systems and ensures compliance with PCI-DSS, SOX and FTC requirements," the job listing read.

A LifeLock spokesman didn't immediately respond to an emailed request for comment about whether the LifeLock Wallet announcement related in any way to the job it was attempting to fill, or if the company had previously undertaken or reviewed PCI compliance audits -- for example, as part of its due diligence before acquiring Lemon.

Next-gen intrusion-prevention systems have fuller visibility into applications and data. But do newer firewalls make IPS redundant? Also in the IPS Makeover issue of Dark Reading Tech Digest: Find out what our 2013 Strategic Security Survey respondents have to say about IPS and firewalls (free registration required).

Mathew Schwartz served as the InformationWeek information security reporter from 2010 until mid-2014. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Randy Naramore
50%
50%
Randy Naramore,
User Rank: Ninja
5/22/2014 | 9:27:34 AM
Lifelock pulls apps over PCI
This will potentially cost lifelock alot of money in fines for non compliance with PCI, as well as loss of reputation with consumers. If people are subject to data being wiped out with this app they will find other alternatives. Maybe an opening for other companies to get some market share.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5395
Published: 2014-11-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Huawei HiLink E3276 and E3236 TCPU before V200R002B470D13SP00C00 and WebUI before V100R007B100D03SP01C03, E5180s-22 before 21.270.21.00.00, and E586Bs-2 before 21.322.10.00.889 allow remote attackers to hijack the authentication of users ...

CVE-2014-7137
Published: 2014-11-21
Multiple SQL injection vulnerabilities in Dolibarr ERP/CRM before 3.6.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) contactid parameter in an addcontact action, (2) ligne parameter in a swapstatut action, or (3) project_ref parameter to projet/tasks/contact.php; (4...

CVE-2014-7871
Published: 2014-11-21
SQL injection vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev36 and 7.6.x before 7.6.0-rev23 allows remote authenticated users to execute arbitrary SQL commands via a crafted jslob API call.

CVE-2014-8090
Published: 2014-11-21
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nes...

CVE-2014-8469
Published: 2014-11-21
Cross-site scripting (XSS) vulnerability in Guests/Boots in AdminCP in Moxi9 PHPFox before 4 Beta allows remote attackers to inject arbitrary web script or HTML via the User-Agent header.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?