Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

The dumb asses at Hannaford had a data breach

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
Home » Discuss » Places » Maine Donate to DU
 
high density Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Mar-17-08 07:45 PM
Original message
The dumb asses at Hannaford had a data breach
Edited on Mon Mar-17-08 08:38 PM by high density
If you shop there with a debit or credit card, keep a close eye on your statements.


http://www.hannaford.com/Contents/News_Events/News/News.shtml

http://www.msnbc.msn.com/id/23678909

Needless to say I will shop at Shaws now, even if they have those cussed little cards.

By the way, here's the link to their contact information, which the links to which are suspiciously "down for maintenance:"

http://www.hannaford.com/Contents/Our_Company/Contact/index.shtml
Refresh | 0 Recommendations Printer Friendly | Permalink | Reply | Top
MaineDem Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-18-08 06:03 AM
Response to Original message
1. I tried to call their "hotline" as advertised on the morning news
Edited on Tue Mar-18-08 06:04 AM by MaineDem
866-591-4580

It's the regular customer service line but it isn't answered until 8:00. Now THAT's really responsive.

My only alternative is WalMart and I'm not about to go there!
Printer Friendly | Permalink | Reply | Top
 
high density Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-18-08 06:40 AM
Response to Reply #1
2. I tried to call my bank this morning to get a new ATM card issued
But I gave up waiting. I'm sure they're swamped, maybe I'll give a few days for the call volume to drop. After all my information has been out there for about 3.5 months so a few more days might not matter (knock on wood.) I'm going to say goodbye to the debit card w/RFID and go back to the old ATM card. That is if they'll let me.
Printer Friendly | Permalink | Reply | Top
 
luckyleftyme2 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-18-08 12:53 PM
Response to Reply #2
3. not to worry
Edited on Tue Mar-18-08 12:53 PM by luckyleftyme2
they say they have the hole plugged now. how that helps anyone who has already been comprised is beyond me. best thing to do is change cards.
are they responsible if someone uses your card? HA HA
Printer Friendly | Permalink | Reply | Top
 
mainegreen Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-18-08 02:52 PM
Response to Original message
4. Interestingly, it sounds like our state law has helped consumers elsewhere..
Edited on Tue Mar-18-08 03:02 PM by mainegreen
Hannaford took responsibility Monday afternoon, shortly after executives notified Maine Attorney General Steven Rowe of the leak.

The company was required to inform the Attorney General's Office under a recently enacted state law meant to warn consumers of potential fraud.


Geee, would they have come forward otherwise?


I'm still not shopping at Shaws. I can't stand that supermarket, and our Hanni's is larger and better stocked than any other local store aside from Whole Paycheck.


I find this bit interesting:
Carol Eleazer, a Hannaford spokeswoman, said thieves accessed card numbers and expiration dates as they were being transmitted for authorization in checkout lines.

I doubt it's a wifi exposure issue, as the card readers use wiring. If it affected so many stores (aka all of them) then it's not a secretly installed packet sniffing hardware at a single location.
That means most likely that a) all their credit card/debit card authorizations go through a single central point, some sort of authorization software package, most likely running on one or more servers at a single location (maybe in Scarborough) and b) that there was a single sniffing software package installed on that network. The good news is (sorta) is that this was probably not a database breach. That would indicate shoddy security practices indeed: both a remote exploit and poor database security. I wonder if this was a version of a man-in-the-middle exploit, with the exploit intercepting the authorization requests, passing it on to the real validating software and then returning the real response from the central system back, or if it was a simple packet sniffer.

What baffles me is that either way, this exploit had to either a) send the data back out onto the internet to a single remote site or to a zombie-exploit network (and re-broadcast to a moving central server) or b) someone was working on the inside to download the sniffed results to a storage medium of some sort and walk it out. Both indicate some serious security issues.

Either way, I'm pissed.

Edited: So it looks like it took them at least a week after they found they had a problem to fix it? Doesn't sound like a packet sniffer to me. They could just nuke that once they were aware of it. Not unless it was the most clever, distributed, self replicating son of a bitch ever. Maybe. Sounding more like some sort of clever man-in-the-middle attack.
Printer Friendly | Permalink | Reply | Top
 
high density Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Mar-18-08 03:03 PM
Response to Reply #4
5. I'm pissed about the amount of time
that it took them to tell us there was a breach. With the info we have so far it sounds like it's very likely that this was at least partially the result of an inside job, possibly relying on access to internal unencrypted communications in one of the scenarios like you had described.
Printer Friendly | Permalink | Reply | Top
 
luckyleftyme2 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Mar-19-08 04:14 AM
Response to Reply #5
6. the 3 and half months

that tells you it was a highly sophisticated operation. standard security procedure would be to try and catch them. you can't do that without warning them your aware of the breach.
I'm sure the decision reached authorities long before it reached the customers.
what I wonder is who provided their secured system? and who or what changes are being made.
do they have any leads? will we the public ever know the outcome?
today Hanaford claims they only found out two weeks ago. and one credit union in maine says over 6,000 debit cards of theirs have been compromised.
I believe in this instance the public will not be responsible for any debt incurred fraudulently.
this tells you how inept homeland security really is.
Printer Friendly | Permalink | Reply | Top
 
luckyleftyme2 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Mar-19-08 06:41 AM
Response to Reply #4
7. interesting

very similar thought process on as maine goes; bonger and pmrsm worth reading.
use to earn a living reading and processing content.
Printer Friendly | Permalink | Reply | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Fri May 03rd 2024, 04:36 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Places » Maine Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC