CheckFree warns 5 million customers after hack

It’s not sure how many customers may have been exposed to malware

January 6, 2009 (IDG News Service) CheckFree Corp. and some of the banks that use its electronic bill payment service are notifying more than 5 million customers that criminals took control of several of the company’s Internet domains and redirected customer traffic to a malicious Web site hosted in the Ukraine.

The Dec. 2 attack was widely publicized shortly after it occurred, but in a notice filed with the New Hampshire Attorney General, CheckFree disclosed that it was warning many more customers than previously thought.

That’s because CheckFree is not only notifying users of its own Web site of the breach, it is also working with banks to contact people who tried to pay bills from banks that use the CheckFree bill payment service.

“The 5 million people who were notified about the CheckFree redirection were a combination of two groups,” said Melanie Tolley, vice president of communications at CheckFree’s parent company, Fiserv Inc., in a statement. “1.) those who we were able to identify who had attempted to pay bills from our client’s bill pay sites and minus those who actually completed sessions on our site, and 2.) anyone enrolled in”

Tolley wouldn’t say what banks were affected by the hack, but the majority of these 5 million customers were CheckFree’s own users, she said. In total, about 42 million customers access CheckFree’s bill payment site, she said.

Customers who went to CheckFree’s Web sites between 12:35 a.m. and 10:10 a.m. on the day of the attack were redirected to a Ukrainian Web server that used malicious software to try and install a password-stealing program on the victim’s computer.

The criminals were able to take control of several CheckFree Web domains after logging into the company’s Internet domain registrar, Network Solutions, and changing the CheckFree DNS settings. This same technique was used by hackers one year ago to take control of Comcast’s Web site. It is not clear how the attackers were able to get CheckFree’s Network Solutions password, but some security experts believe that CheckFree may have fallen prey to a phishing attack.

Looking at typical Web site traffic patterns, Fiserv guesses that about 160,000 consumers were exposed to the Ukrainian attack site, but not all of these customers would have been infected. For the attack to work, the victim would have to be a PC user without antivirus software who was also using an out-of-date version of Adobe Acrobat. Because of these conditions, Fiserv believes that “a very small number” of people were affected, Tolley said.

However, because the company lost control of its Web domains, it doesn’t know exactly who was hit. And so it must warn a much larger number of customers.

With the mobility of employees and the ease with which external devices can be brought in and out of a network, continuing to build your security plan for network servers and clients is a must. Fortunately, there is much that organizations can do to protect themselves from attacks - internal and external. Having the right policies, procedures and server configurations is critical…

It could have been much worse. CheckFree processes bill payments for more than half of the banking institutions in the U.S., according to Gartner Inc. analyst Avivah Litan.

Although larger banks typically do not do this, some smaller banks simply turn their online bill payment services over to CheckFree, she said. “If they turn it over to CheckFree, chances are all those users were redirected to the CheckFree domain, but it was branded as the bank’s domain.”

CheckFree has deals to provide electronic bill payment services to banks such as Wachovia and Bank of America. It is not clear whether or not these banks were affected by the attack.

This kind of incident could also happen with fund transfer services, which are also frequently outsourced, Litan said. “Bank security is only as strong as its weakest link, and the weakest links in banking are online payment and fund transfer [services],” Litan said.

The maleware has infacted the computer literate all around the world and the most of the online business is facing the problem of the malware attack. While the malware itself was not particularly sophisticated, it nevertheless has been used for harmful purposes. The two infected machines were used to spy on their owners as well as to participate in distributed denial of service (DDoS) attacks against political dissent is the message containing blogs. Specifically, these attacks have tried to squelch opposition to Vietnam, the country in an important and emotionally charged issue of bauxite mining efforts.