Vulnerabilities / Threats
5/20/2014
12:10 PM
50%
50%

LifeLock Pulls Apps Over PCI Compliance Failure

Sensitive data stored in LifeLock Wallet apps and on company servers are proactively wiped after the company warns it wasn't being stored securely.

10 Ways To Fight Digital Theft & Fraud
10 Ways To Fight Digital Theft & Fraud
(Click image for larger view and slideshow.)

Warning to users of the mobile wallet apps offered by LifeLock: The next time you open the app on your smartphone or tablet, all data stored therein will be deleted.

That unusual move was announced Friday by the identity theft monitoring service provider, which said it's also removed the application from Apple's App Store, the Amazon Apps store, and Google Play. "We have determined that certain aspects of the mobile app may not be fully compliant with payment card industry (PCI) security standards," chairman and CEO Todd Davis told customers in an "Important Update About LifeLock Wallet" blog post. "I personally apologize for the inconvenience."

The Payment Card Industry Data Security Standard (PCI-DSS) stipulates that any organization that stores or transmits cardholder data must appropriately secure that information, including locking down all the keys used to encrypt the data.

Also Friday, LifeLock filed a Securities and Exchange Commission form 8-K -- for notifying shareholders of any major corporate events -- in which it said that it planned to reissue the apps after they've been reengineered.

"We have temporarily suspended the Wallet mobile application, and are deleting the data -- encrypted or otherwise -- from our servers, until we can operate the Wallet mobile application in accordance with those standards," the filing said. "We have no indication that the data included in the Wallet mobile application servers was compromised."

[Malware-bearing ads are a growing problem, and Congress wants the industry to be more proactive. Read Senators Slam Online Advertisers As 'Malvertising' Spikes.]

In its SEC filing, LifeLock warned shareholders that it informed the Federal Trade Commission on Thursday that it was storing data in violation of PCI requirements. That notification was required since LifeLock reached a $12 million agreement with the FTC and 35 state attorneys general in 2010 to settle charges that the fraud alerts it put on accounts didn't block most types of identity theft, as well as charges that LifeLock made deceptive claims about its ID theft monitoring service and data protection efficacy.

"It is possible that this PCI non-compliance of the Wallet mobile application could result in a determination by the FTC that we are not in full compliance with our FTC consent order," LifeLock said in the SEC filing.

After the filing was released, LifeLock's stock price tumbled 18% in trading Monday.

As of December 2013, LifeLock Wallet -- available for Android and iOS -- had been downloaded 3.6 million times. LifeLock acquired the software through its December 2013 purchase of the mobile wallet developer Lemon for $43 million. When the purchase was announced, LifeLock said the apps allowed consumers to "store a complete digital copy of their personal wallet contents in one location," including credit card numbers, driver's license numbers, ATM card numbers, and loyalty card data.

Since its 2005 inception, LifeLock -- which charges $110 per year or more for its identity theft monitoring service -- has been beset by tepid reviews and criticism that it doesn't do anything that consumers can't already do for themselves for free.

In April, LifeLock began advertising a senior IT auditor position with PCI-related responsibilities. "This role provides management with a review of information systems and ensures compliance with PCI-DSS, SOX and FTC requirements," the job listing read.

A LifeLock spokesman didn't immediately respond to an emailed request for comment about whether the LifeLock Wallet announcement related in any way to the job it was attempting to fill, or if the company had previously undertaken or reviewed PCI compliance audits -- for example, as part of its due diligence before acquiring Lemon.

Next-gen intrusion-prevention systems have fuller visibility into applications and data. But do newer firewalls make IPS redundant? Also in the IPS Makeover issue of Dark Reading Tech Digest: Find out what our 2013 Strategic Security Survey respondents have to say about IPS and firewalls (free registration required).

Mathew Schwartz served as the InformationWeek information security reporter from 2010 until mid-2014. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Randy Naramore
50%
50%
Randy Naramore,
User Rank: Ninja
5/22/2014 | 9:27:34 AM
Lifelock pulls apps over PCI
This will potentially cost lifelock alot of money in fines for non compliance with PCI, as well as loss of reputation with consumers. If people are subject to data being wiped out with this app they will find other alternatives. Maybe an opening for other companies to get some market share.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9605
Published: 2015-09-04
WebUpgrade in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to bypass authentication and create a system backup tarball, restart the server, or stop the filters on the server via a ' (single quote) character in the login and password parameters to webup...

CVE-2015-5612
Published: 2015-09-04
Cross-site scripting (XSS) vulnerability in October CMS build 271 and earlier allows remote attackers to inject arbitrary web script or HTML via the caption tag of a profile image.

CVE-2015-5688
Published: 2015-09-04
Directory traversal vulnerability in lib/app/index.js in Geddy before 13.0.8 for Node.js allows remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the PATH_INFO to the default URI.

CVE-2015-6807
Published: 2015-09-04
Cross-site scripting (XSS) vulnerability in the Mass Contact module 6.x-1.x before 6.x-1.6 and 7.x-1.x before 7.x-1.1 for Drupal allows remote authenticated users with the "administer mass contact" permission to inject arbitrary web script or HTML via a category label.

CVE-2015-6808
Published: 2015-09-04
Cross-site scripting (XSS) vulnerability in the Spotlight module 7.x-1.x before 7.x-1.5 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via a node title.

Dark Reading Radio
Archived Dark Reading Radio
Another Black Hat is in the books and Dark Reading was there. Join the editors as they share their top stories, biggest lessons, and best conversations from the premier security conference.