The criminal exploit that exposed 40 million credit card accounts to possible fraud is shedding light on an arcane but sensitive piece of the financial industry: the hundreds of companies that process transactions between merchants and card issuers.
While enormous in scope, the breach disclosed Friday at CardSystems Solutions Inc. was by no means the first such attack on a card processor.
Many analysts believe that banks and credit card companies, despite working hard to tighten their own security, have failed to force payment processors to maintain similar standards.
“They’re not being watched carefully enough,” said Avivah Litan, an analyst with Gartner Inc.
In recent years, card associations such as Visa and MasterCard have set up security requirements for processors to follow. No laws in particular govern this program, but the card associations can impose fines of several hundred thousand dollars for transgressions.
However, Miss Litan said aggressive audits of companies like CardSystems aren’t being done.
Credit card companies “just sort of wait for them to have a breach,” she said. “There’s just a lot of vagaries in how it’s enforced.”
In fact, she said, several similar breaches have occurred and the public wasn’t told.
Card processors and merchants must certify through third-party monitors that they meet the banks’ and credit card associations’ security standards. But complying can be a long and costly process.
Consequently, several experts said they doubt that CardSystems, which annually processes some $15 billion in transactions for more than 105,000 small- to mid-sized businesses, is alone among card processors in being vulnerable to hackers.
“It’s quite possible that it could exist elsewhere,” said Michael Petitti, a senior vice president at AmbironTrustWave, one of the companies that performs the industry’s security certifications. CardSystems was not in his company’s purview, he said.
The breach occurred after CardSystems inappropriately held onto card data for “research purposes” rather than deleting it. Forty million accounts were exposed, and records pertaining to at least 200,000 are known to have been stolen, primarily MasterCard and Visa cards.
CardSystems did not return repeated calls seeking comment yesterday, but MasterCard spokeswoman Sharon Gamsin said the records — names, banks and account numbers — should have been deleted because “you don’t want that information sitting around.”
“Merchants aren’t allowed to keep it, and these processors aren’t allowed to keep it,” she said.
The FBI is investigating “several different angles,” bureau spokeswoman Deb McCarley said yesterday. She would not provide details.
The break-in is the latest high-profile data breach to be publicly disclosed in recent months involving credit card companies, retailers and data brokers that amass and sell consumer data.
Security and fraud experts say two factors are behind the trend:
Information thieves are becoming ever more sophisticated at grabbing and selling financially sensitive information.
A California law took effect this year that requires companies to notify state residents when their personal information is compromised. Congress is now debating a national version.
Perhaps the biggest previous security lapse involving a card processor was a 2003 hack on a Nebraska company called Data Processors International Inc., part of TransFirst Holdings Inc. As many as 8 million account numbers became vulnerable.
TransFirst spokesman Scott Jones would not say whether the company is confident a similar attack couldn’t happen again.
He said only that the company’s data banks are encrypted and watched by monitoring software in order to comply with Visa and MasterCard requirements.
Mike Gibbons, a former chief cybercrime investigator for the FBI, says financial services companies have done better overall than most industries in developing tight computer security.
Consumer advocates believe a more pervasive problem is at work: Retailers and banks are reluctant to do anything to change the credit system because they fear it would slow the process by which consumers get and use credit.
“Information travels through the credit system and stops in so many places where it could be illegally used that consumers have no idea what a hodgepodge of a system the credit card companies have created,” said Edmund Mierzwinski, consumer program director at U.S. Public Interest Research Group.
That system, he said, is mainly designed to extract fees from consumers and businesses, “but very little of it is designed for security.”
A spokesman for a credit card processor who wished to remain unnamed said that the system was driven by price pressure. Customers prefer to use credit cards, so merchants look for the cheapest way to process transactions. Merchants should know who is handling their processing and know if the processors comply with strict regulations set up by Visa and other credit card associations.
Visa’s Cardholder Information Security Program (CISP) lays out rules for processors to ensure that data is encoded, not stored, and otherwise secure.
“Everybody who touches data needs to be CISP compliant,” said a spokesman for another large third-party processor.
Staff writer Sarah Lesher contributed to this report.