T.J. Maxx Data Theft Likely Due To Wireless 'Wardriving' - InformationWeek
Business & Finance
05:33 PM
Lean Analytics for 2018
Nov 27, 2017
Alistair Croll, Author of Lean Analytics joins AllAnalytics radio Nov. 27, find out more. ...Read More>>

T.J. Maxx Data Theft Likely Due To Wireless 'Wardriving'

Industry analysts suggest some 45 million credit and debit card data could have been poached from a thief with a laptop, a telescope antenna, and a wireless LAN adapter.

TJX, the parent company of T.J. Maxx, Marshalls, and other retailers, has not acknowledged how data on more than 45 million credit and debit card users who had shopped at the company's retail locations was stolen and sold to fraudsters.

Still, a recent article in the Wall Street Journal fingering a wireless data poaching tactic known as "wardriving" and the deficiencies of an aging wireless security protocol known as Wired Equivalent Privacy as the culprits has ignited a storm of speculation among security researchers over how the crime was pulled off and who's to blame.

It's likely that the cyber attacker or attackers who stole millions of customer records from TJX stumbled across a vulnerable store location while staking out a strip mall or shopping center from their car using a laptop, a telescope antenna, and an 802.11 wireless LAN adapter. "The cyber thieves most likely went to a strip mall shopping center and pointed it at the different stores," says Mark Loveless, senior security researcher for network-access control technology vendor Vernier, who goes by the online handle of "Simple Nomad." While the TJX store wasn't likely at the top of their list, they found that it was accessible and yielded information they could use to further penetrate TJX's IT systems. "The allure was too good to pass up," he adds.

Wardriving describes the practice of driving one's car around with laptop and antenna to detect wireless access points and see how they're configured. When a global positioning system receiver is added, a map can be made of the different access points. A telescope antenna lets wireless poachers attack their targets from miles away; they don't even have to be sitting in the store's parking lot. Competitions at past Black Hat security conferences have seen some wardriving systems detect wireless data up to 45 miles away, Loveless says.

"Once the attacker is connected into the wireless network, they can sniff traffic to see what data's going where," Loveless says. For example, an attacker might see that all applications are being logged to a central server, such as barcode scanning software accessing a SQL database. "So that's where you concentrate your efforts," he adds. Eventually, an attacker is able to compromise a PC, domain name system server, or VPN servers.

This sort of attack happens all the time, according to Loveless and a number of other security researchers. What makes the TJX hit so special is the sheer volume of information stolen. This meant that time is also a factor in understanding how the attack was perpetrated. Given that data can only moves across a network so fast, it would have taken the cyber thieves hours to sit in their parked car and download tens of millions of records. More likely, "they set up a machine at home or on the Net that used some of the stolen information to break in and steal more," Loveless says.

"If they indeed break into the system through this Marshall's store (as reported), one can easily imagine the store was not storing 45 million credit card records there," agrees Cedric Blancher, head of European Aeronautic Defence and Space Company's computer security research department in France and a specialist in wireless security.

Further, since the initial attack against TJX required the cyber thieves to be in the proximity of a TJX store, it's unlikely that they were involved in an international conspiracy to steal customer data. "I highly doubt that the Russian mafia flew overseas and sat with a directional antenna trying to grab this information," Loveless says. "It was probably done by people living right here in this country." Once the information was stolen, however, all bets are off, as the customer data could have appeared in countless underground marketplaces where purloined data is bought and sold.

Yet wardriving is not foolproof. In fact, it relies on weak security to be effective. Often, "when a company puts in wireless, they don't put it in securely," Loveless says. "They forget that wireless is yet another way in. inviting people to come in through a side window."

Security researchers say that, if TJX was securing the Marshalls location using Wired Equivalent Privacy, or WEP, they were using an outdated protocol that's notorious for allowing small amounts of data to leak from data packets flowing across a wireless network. "If you sniff the traffic, you'll find those bits going back and forth across the network," Loveless says. Companies that have already invested in access points supporting WEP might be reluctant to replace this equipment with new equipment that supports WPA or WPA2, he acknowledges.

Still, security pros have for years know about WEP's deficiencies, in particular its propensity to give up its encryption key when attacked. While the technology has improved over the years, so have the techniques for attacking it. In April, an attack published by security researchers to the Web reduced the time to crack WEP encryption from about 30 minutes to as quickly as one minute, Blancher says. "In standard WEP, every device uses the same key," he adds. "If an attacker breaks the key, he has complete control of network."

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
1 of 2
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
2017 State of IT Report
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll