T.J. Maxx Data Theft Likely Due To Wireless 'Wardriving'
Industry analysts suggest some 45 million credit and debit card data could have been poached from a thief with a laptop, a telescope antenna, and a wireless LAN adapter.
TJX, the parent company of T.J. Maxx, Marshalls, and other retailers, has not acknowledged how data on more than 45 million credit and debit card users who had shopped at the company's retail locations was stolen and sold to fraudsters.
Still, a recent article in the Wall Street Journal fingering a wireless data poaching tactic known as "wardriving" and the deficiencies of an aging wireless security protocol known as Wired Equivalent Privacy as the culprits has ignited a storm of speculation among security researchers over how the crime was pulled off and who's to blame.
It's likely that the cyber attacker or attackers who stole millions of customer records from TJX stumbled across a vulnerable store location while staking out a strip mall or shopping center from their car using a laptop, a telescope antenna, and an 802.11 wireless LAN adapter. "The cyber thieves most likely went to a strip mall shopping center and pointed it at the different stores," says Mark Loveless, senior security researcher for network-access control technology vendor Vernier, who goes by the online handle of "Simple Nomad." While the TJX store wasn't likely at the top of their list, they found that it was accessible and yielded information they could use to further penetrate TJX's IT systems. "The allure was too good to pass up," he adds.
Wardriving describes the practice of driving one's car around with laptop and antenna to detect wireless access points and see how they're configured. When a global positioning system receiver is added, a map can be made of the different access points. A telescope antenna lets wireless poachers attack their targets from miles away; they don't even have to be sitting in the store's parking lot. Competitions at past Black Hat security conferences have seen some wardriving systems detect wireless data up to 45 miles away, Loveless says.
"Once the attacker is connected into the wireless network, they can sniff traffic to see what data's going where," Loveless says. For example, an attacker might see that all applications are being logged to a central server, such as barcode scanning software accessing a SQL database. "So that's where you concentrate your efforts," he adds. Eventually, an attacker is able to compromise a PC, domain name system server, or VPN servers.
This sort of attack happens all the time, according to Loveless and a number of other security researchers. What makes the TJX hit so special is the sheer volume of information stolen. This meant that time is also a factor in understanding how the attack was perpetrated. Given that data can only moves across a network so fast, it would have taken the cyber thieves hours to sit in their parked car and download tens of millions of records. More likely, "they set up a machine at home or on the Net that used some of the stolen information to break in and steal more," Loveless says.
"If they indeed break into the system through this Marshall's store (as reported), one can easily imagine the store was not storing 45 million credit card records there," agrees Cedric Blancher, head of European Aeronautic Defence and Space Company's computer security research department in France and a specialist in wireless security.
Further, since the initial attack against TJX required the cyber thieves to be in the proximity of a TJX store, it's unlikely that they were involved in an international conspiracy to steal customer data. "I highly doubt that the Russian mafia flew overseas and sat with a directional antenna trying to grab this information," Loveless says. "It was probably done by people living right here in this country." Once the information was stolen, however, all bets are off, as the customer data could have appeared in countless underground marketplaces where purloined data is bought and sold.
Yet wardriving is not foolproof. In fact, it relies on weak security to be effective. Often, "when a company puts in wireless, they don't put it in securely," Loveless says. "They forget that wireless is yet another way in. inviting people to come in through a side window."
Security researchers say that, if TJX was securing the Marshalls location using Wired Equivalent Privacy, or WEP, they were using an outdated protocol that's notorious for allowing small amounts of data to leak from data packets flowing across a wireless network. "If you sniff the traffic, you'll find those bits going back and forth across the network," Loveless says. Companies that have already invested in access points supporting WEP might be reluctant to replace this equipment with new equipment that supports WPA or WPA2, he acknowledges.
Still, security pros have for years know about WEP's deficiencies, in particular its propensity to give up its encryption key when attacked. While the technology has improved over the years, so have the techniques for attacking it. In April, an attack published by security researchers to the Web reduced the time to crack WEP encryption from about 30 minutes to as quickly as one minute, Blancher says. "In standard WEP, every device uses the same key," he adds. "If an attacker breaks the key, he has complete control of network."
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.