I...there are no words for this
http://consumerist.com/2011/06/how-hackers-stole-200000-citi-accounts-by-exploiting-basic-browser-vulnerability.html
QuoteDetails have emerged has to how hackers were able to steal over 200,000 Citi customer accounts, including names, credit card numbers, mailing addresses and email addresses. It turns out quite easily, in fact. All they had to do was log in as a customer and change around a few numbers into the browser's URL bar, NYT reports. Facepalm.
Basically after you logged into your account as a Citi customer, the URL contained a code identifying your account. All you had to do was change around the numbers and boom, you were in someone else's account.
So if the URL was something like citibank.com/user/12345, all you had to do was change it to citibank.com/user/123456 and you had access to all of their account information.
The hackers then used a simple script that automatically scraped all the account information, saved it, and then changed the numbers in the URL and repeated the process. Hundreds of thousands of times.
:x
Well, a real security system might have cost money.
:lulz:
wwwwwow.
can you imagine the glee when the thieves figured this out?
they must have set up the scripts while soiling themselves with laughter and then head off down to the pub to raise a glass to citi's stupidity.
HOLY FUCK!
:facepalm:
Quote from: Iptuous on June 15, 2011, 09:04:51 PM
wwwwwow.
can you imagine the glee when the thieves figured this out?
they must have set up the scripts while soiling themselves with laughter and then head off down to the pub to raise a glass to citi's stupidity.
:lulz:
but yeah, that's a pretty dumb mistake. Usually you would give users one-time hashed tokens (not a technical term), like you wouldn't give them 00001-99999 or whatever, but rather an unpredictable semi-random string like kf7f47dhaKHd84d4hu48.
wow.
just. wow.
The sad downside to this story is (IIRC) Citi are claiming no responsibility for the stolen money. It's up to you to protect your money, once it's in the bank.
(if it is not them, then some bank argued this very recently - and the court agreed).
Quote from: Cain on June 16, 2011, 01:12:36 PM
The sad downside to this story is (IIRC) Citi are claiming no responsibility for the stolen money. It's up to you to protect your money, once it's in the bank.
(if it is not them, then some bank argued this very recently - and the court agreed).
I was under the impression that it was the information that was stolen, not the money. I know I've read several times that this happens pretty regularly and the banks just don't make it public. They are approached by the hackers with the information they've stolen and demand a ransom and the bank just pays it quietly rather than have the fallout from a public announcement.
I'm pretty sure any actual stolen money (under $250,000) would fall under the FDIC guarantee. I don't see how any bank could or would want to get around that.
Quote from: Cain on June 16, 2011, 01:12:36 PM
The sad downside to this story is (IIRC) Citi are claiming no responsibility for the stolen money. It's up to you to protect your money, once it's in the bank.
(if it is not them, then some bank argued this very recently - and the court agreed).
Its not our fault the money that we leave laying in a wheel barrow outside the bank was stolen its yours.
Quote from: Cain on June 16, 2011, 01:12:36 PM
The sad downside to this story is (IIRC) Citi are claiming no responsibility for the stolen money. It's up to you to protect your money, once it's in the bank.
(if it is not them, then some bank argued this very recently - and the court agreed).
The court agreed with that? wtf?!
when i read the OP, i immediately assumed there would be a class action suit that would be open and shut...
It was another bank, sorry. I was mistaken.
http://www.wired.com/threatlevel/2011/06/bank-ach-theft/
QuoteA judge in Maine has ruled that a bank that allowed hackers to steal more than $300,000 from a customer's online account isn't responsible for the lost money, saying the customer should have done more to protect the account credentials.
Magistrate Judge John Rich sided with Ocean Bank in recommending that the U.S. District Court in Maine grant the bank's motions for a summary dismissal of a complaint filed by Patco Construction Company. The ruling was reported Monday by BankInfoSecurity.
The case raises questions about how much security banks and other financial institutions may be reasonably required to provide commercial customers. It could set a precedent for liability in circumstances where customer systems are hacked and banking credentials are stolen. Small and medium-sized businesses around the United States have lost hundreds of millions of dollars in recent years to such activity, known as fraudulent ACH (Automated Clearing House) transfers.
Patco Construction Company, a family-owned business in Sanford Maine, sued Ocean Bank, which is owned by People's United Bank, after discovering in May 2009 that hackers were siphoning about $100,000 per day from its online bank account. The hackers had sent a malicious e-mail to employees that allowed them to surreptitiously install the Zeus password-stealing trojan on an employee computer.
After obtaining Patco's banking credentials and waiting for its account to fill up with money, the hackers used the credentials to initiate a series of electronic money transfers. Nearly $600,000 worth of transfers were made out of the account before Patco realized it had been hacked.
Ocean Bank, after being notified of the fraud, was able to block about $240,000 in transfers. But Patco was unable to retrieve the rest.
Patco sued the bank for failing to notice the fraudulent activity and stop it. According to Patco, the out-of-character transactions triggered alarms inside the bank, but the bank didn't notice them and let the transfers go through. Patco also accused the bank of failing to implement "best" security practices of requiring customers to use multifactor authentication.
Ocean maintained that it had done its due diligence in verifying that the ID and password used were authentic.
Judge Rich agreed that Ocean Bank could have done more to authenticate that the person initiating the transfers was indeed an authorized party.
"It is apparent, in the light of hindsight, that the Bank's security procedures in May 2009 were not optimal," he wrote in his ruling. "The Bank would have more effectively harnessed the power of its risk-profiling system, if it had conducted manual reviews in response to red flag information instead of merely causing the system to trigger challenge questions."
But he nonetheless concluded that the law does not require the bank to implement the "best" security measures available, and that the bank is clear to customers when they sign up about the level of security it provides and the amount of liability it will assume if money is stolen from a customer account. The judge also noted that Ocean's level of security was comparable to that offered by other banks. Ultimately, he determined that Patco was responsible for the loss, because it had not better secured its account credentials.
Quote
[...] the customer should have done more to protect the account credentials.
:lulz: :lulz: :lulz: :lulz: :lulz:
This wouldn't happen if people didn't trust their bank info with unscrupulous corporations like, ya know, their banks.
Quote from: PresidentLincPwln on June 18, 2011, 05:37:28 AM
This wouldn't happen if people didn't trust their bank info with unscrupulous corporations like, ya know, their banks.
I find your lack of faith in our glorious civilization...disturbing, citizen.