lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <001001c2d874$cca53420$6401a8c0@rms2>
From: rms at computerbytesman.com (Richard M. Smith)
Subject: Data Processors International was broken into

http://news.yahoo.com/news?tmpl=story2&cid=528&ncid=528&e=6&u=/ap/200302
19/ap_on_hi_te/credit_card_hack

OMAHA, Neb. (AP) - A hacker who recently gained access to millions of
credit
card numbers appears to have done it by breaking into a computer system
at a
company that processes transactions for catalog companies and other
direct
marketers. 

Data Processors International, based in Omaha, said Wednesday that "an
unauthorized outside party" had tapped into its computer system,
prompting a
criminal investigation. 

Scott Jones, a company spokesman, refused to comment on when the hacker
gained access and how many credit card account numbers may have been
compromised. 

Credit card companies and the Secret Service have said that as many as 8
million account numbers were accessed. The card companies said they were
notified of the incident early this month. 

When the security breach was detected, Data Processors immediately
notified credit card companies and the appropriate law enforcement
agencies, Jones said. He added that the company is sharing all of its
information with the Secret Service and the FBI. 

A government investigator, speaking on condition of anonymity, confirmed
that the credit card hack had been traced to Data Processors
International. 

"All indications are the attack on this company's (Internet) address
came from the outside, and efforts continue to analyze this attack to
see if it could be traced to the attacker," the investigator said. 

.....





Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ