You are here: Home » Finance » News » Others
Business Standard

Debit card breach: Hitachi owns up to systems being compromised in mid-2016

3.2 mn cards were affected by the breach, causing a scare over security of card-based transactions

Press Trust of India  |  Mumbai 

debit, credit, card, swipe,
Photo: Shutterstock

Payments Services on Thursday accepted its systems were compromised by a sophisticated malware in mid-2016 which led to one of the biggest cyber security breaches in country, with 3.2 million cards being affected, causing a scare over security of card-based transactions.

The National Payments Corporation of India (NPCI) had said over 600 customers had reported losses of at least Rs 1.3 crore due to the



The company, a wholly owned subsidiary of the Japanese Hitachi, made the acknowledgement following the receipt of final assessment report from payments and information security audit firm SISA Information Security, and said it "regrets" the inconvenience caused.

In what poses more scope for worries, the company said the amount of data exfiltrated is "unascertainable due to secure deletion by the malware".

"We confirm that our security systems had a during mid-2016," its Managing Director Loney Anthony said, adding this happened despite following adequate security measures and adopting the standards of internationally- accepted best practices.

The compromise period has been identified between May 21 and July 11. It had come out in public after a slew of banks, including those not serviced by Hitachi, approached customers making either card replacements or ATM PIN changes compulsory.

Out then, the compromise was suspected to have happened through one of the ATMs of Yes Bank, one of the biggest clients of the company.

Yes Bank's Rana Kapoor had called for stricter vigil on the outsourced service providers following the compromise.

"There needs to be a lot more vigilance where there are outsourcing partners to make sure they don't endanger the delivery and system risk, and there's a fair amount of policing as far as outsourcing risks are concerned," he said.

"Payment Services regrets the inconvenience caused to banks and its customers due to this lapse in its security infrastructure. We assure you of our highest commitment to building a robust infrastructure in our systems and preventing such cyber frauds in future," Anthony said.

Quoting the SISA report, the statement said a sophisticated malware (a piece of malicious software code) was injected in Payment Services' systems, which led to compromise the details of

The malware had been able to "work undetected and had concealed its tracks during the compromise period", it added.

Its behaviour and penetration into the network has been deciphered, but the amount of data exfiltrated is "unascertainable", it said.
The company acknowledged the system-wide trouble, that

was caused due to the lapse at its end, saying banks had to take remedial action like blocking payments at international locations, reduced withdrawal limits, asking for PIN changes and monitoring of unusual patterns.

The company said the actions limited the extent of compromise and claimed that there has not been any "further misuse due to the containment measures deployed by Payment Services".

The RBI has been asking banks to enhance their digital security and the statement comes a day after the central bank announced formation of an inter-disciplinary standing committee on cyber security to review threats, study security standards and suggest appropriate policy interventions.

RECOMMENDED FOR YOU

Debit card breach: Hitachi owns up to systems being compromised in mid-2016

3.2 mn cards were affected by the breach, causing a scare over security of card-based transactions

3.2 million cards had been affected by the breach, causing a scare over security of card-based transactions Payments Services on Thursday accepted its systems were compromised by a sophisticated malware in mid-2016 which led to one of the biggest cyber security breaches in country, with 3.2 million cards being affected, causing a scare over security of card-based transactions.

The National Payments Corporation of India (NPCI) had said over 600 customers had reported losses of at least Rs 1.3 crore due to the

The company, a wholly owned subsidiary of the Japanese Hitachi, made the acknowledgement following the receipt of final assessment report from payments and information security audit firm SISA Information Security, and said it "regrets" the inconvenience caused.

In what poses more scope for worries, the company said the amount of data exfiltrated is "unascertainable due to secure deletion by the malware".

"We confirm that our security systems had a during mid-2016," its Managing Director Loney Anthony said, adding this happened despite following adequate security measures and adopting the standards of internationally- accepted best practices.

The compromise period has been identified between May 21 and July 11. It had come out in public after a slew of banks, including those not serviced by Hitachi, approached customers making either card replacements or ATM PIN changes compulsory.

Out then, the compromise was suspected to have happened through one of the ATMs of Yes Bank, one of the biggest clients of the company.

Yes Bank's Rana Kapoor had called for stricter vigil on the outsourced service providers following the compromise.

"There needs to be a lot more vigilance where there are outsourcing partners to make sure they don't endanger the delivery and system risk, and there's a fair amount of policing as far as outsourcing risks are concerned," he said.

"Payment Services regrets the inconvenience caused to banks and its customers due to this lapse in its security infrastructure. We assure you of our highest commitment to building a robust infrastructure in our systems and preventing such cyber frauds in future," Anthony said.

Quoting the SISA report, the statement said a sophisticated malware (a piece of malicious software code) was injected in Payment Services' systems, which led to compromise the details of

The malware had been able to "work undetected and had concealed its tracks during the compromise period", it added.

Its behaviour and penetration into the network has been deciphered, but the amount of data exfiltrated is "unascertainable", it said.
The company acknowledged the system-wide trouble, that

was caused due to the lapse at its end, saying banks had to take remedial action like blocking payments at international locations, reduced withdrawal limits, asking for PIN changes and monitoring of unusual patterns.

The company said the actions limited the extent of compromise and claimed that there has not been any "further misuse due to the containment measures deployed by Payment Services".

The RBI has been asking banks to enhance their digital security and the statement comes a day after the central bank announced formation of an inter-disciplinary standing committee on cyber security to review threats, study security standards and suggest appropriate policy interventions.
image
Business Standard
177 22

Debit card breach: Hitachi owns up to systems being compromised in mid-2016

3.2 mn cards were affected by the breach, causing a scare over security of card-based transactions

Payments Services on Thursday accepted its systems were compromised by a sophisticated malware in mid-2016 which led to one of the biggest cyber security breaches in country, with 3.2 million cards being affected, causing a scare over security of card-based transactions.

The National Payments Corporation of India (NPCI) had said over 600 customers had reported losses of at least Rs 1.3 crore due to the

The company, a wholly owned subsidiary of the Japanese Hitachi, made the acknowledgement following the receipt of final assessment report from payments and information security audit firm SISA Information Security, and said it "regrets" the inconvenience caused.

In what poses more scope for worries, the company said the amount of data exfiltrated is "unascertainable due to secure deletion by the malware".

"We confirm that our security systems had a during mid-2016," its Managing Director Loney Anthony said, adding this happened despite following adequate security measures and adopting the standards of internationally- accepted best practices.

The compromise period has been identified between May 21 and July 11. It had come out in public after a slew of banks, including those not serviced by Hitachi, approached customers making either card replacements or ATM PIN changes compulsory.

Out then, the compromise was suspected to have happened through one of the ATMs of Yes Bank, one of the biggest clients of the company.

Yes Bank's Rana Kapoor had called for stricter vigil on the outsourced service providers following the compromise.

"There needs to be a lot more vigilance where there are outsourcing partners to make sure they don't endanger the delivery and system risk, and there's a fair amount of policing as far as outsourcing risks are concerned," he said.

"Payment Services regrets the inconvenience caused to banks and its customers due to this lapse in its security infrastructure. We assure you of our highest commitment to building a robust infrastructure in our systems and preventing such cyber frauds in future," Anthony said.

Quoting the SISA report, the statement said a sophisticated malware (a piece of malicious software code) was injected in Payment Services' systems, which led to compromise the details of

The malware had been able to "work undetected and had concealed its tracks during the compromise period", it added.

Its behaviour and penetration into the network has been deciphered, but the amount of data exfiltrated is "unascertainable", it said.
The company acknowledged the system-wide trouble, that

was caused due to the lapse at its end, saying banks had to take remedial action like blocking payments at international locations, reduced withdrawal limits, asking for PIN changes and monitoring of unusual patterns.

The company said the actions limited the extent of compromise and claimed that there has not been any "further misuse due to the containment measures deployed by Payment Services".

The RBI has been asking banks to enhance their digital security and the statement comes a day after the central bank announced formation of an inter-disciplinary standing committee on cyber security to review threats, study security standards and suggest appropriate policy interventions.

image
Business Standard
177 22