Arrow-right Camera
The Spokesman-Review Newspaper
Spokane, Washington  Est. May 19, 1883

Credit card audits lacking

Brian Bergstein Associated Press

The criminal exploit that exposed 40 million credit card accounts to possible fraud is shedding light on an arcane but sensitive piece of the financial industry: the hundreds of companies that process transactions between merchants and card issuers.

While enormous in scope, the breach disclosed Friday at CardSystems Solutions Inc. was by no means the first such attack on a card processor.

Many analysts believe that banks and credit card companies, despite working hard to tighten their own security, have failed to force payment processors to maintain similar standards.

“They’re not being watched carefully enough,” said Avivah Litan, an analyst with Gartner Inc.

In recent years, card associations such as Visa and MasterCard have set up security requirements for processors to follow. No laws in particular govern this program, but the card associations can impose fines of several hundred thousand dollars for transgressions.

However, Litan said proactive audits of companies like CardSystems don’t really happen.

Credit card companies “just sort of wait for them to have a breach,” she said. “There’s just a lot of vagaries in how it’s enforced.” In fact, she said, several similar breaches have happened before and the public wasn’t told.

Card processors and merchants must certify through third-party monitors that they meet the banks’ and credit card associations’ security standards. But complying can be a long and costly process.

Consequently, several experts said they doubt that CardSystems, which annually process some $15 billion in transactions for more than 105,000 small to mid-sized businesses, is alone among card processors in being vulnerable to hackers.

“It’s quite possible that it could exist elsewhere,” said Michael Petitti, a senior vice president at AmbironTrustWave, one of the companies that performs the industry’s security certifications. CardSystems was not in his company’s purview, he said.

The breach occurred after CardSystems inappropriately held onto card data for “research purposes” rather than deleting it. Forty million accounts were exposed, and records pertaining to at least 200,000 are known to have been stolen, primarily MasterCard and Visa cards.

CardSystems did not return repeated calls seeking comment Monday, but MasterCard spokeswoman Sharon Gamsin said the records — names, banks and account numbers — should have been deleted because “you don’t want that information sitting around.”

“Merchants aren’t allowed to keep it, and these processors aren’t allowed to keep it,” she said.

The FBI is investigating “several different angles,” bureau spokeswoman Deb McCarley said Monday. She would not provide details.

The break-in is the latest high-profile data breach to be publicly disclosed in recent months involving credit card companies, retailers and data brokers that amass and sell consumer data.

Security and fraud experts say two factors are behind the trend:

•Information thieves are becoming ever more sophisticated at grabbing and selling financially sensitive information.

•A California law took effect this year that requires companies to notify state residents when their personal information is compromised. Congress is now debating a national version.

Perhaps the biggest previous security lapse involving a card processor was a 2003 hack on a Nebraska company called Data Processors International Inc., part of TransFirst Holdings Inc. As many as 8 million account numbers became vulnerable.