Lessons from the Target Breach
Last year's attack on Target shows some serious problems with the credit card network. A key lesson is that if a credit card image exists in memory of any PC POS system, it will be stolen. The push for upgrading to EMV is only a bandage on the problem, not a complete solution.
A technical analysis of the virus that got to Target shows a number of factors. One is that the virus scans memory for anything that looks like a credit card track image. That has important implications. PCI requirements have (hopefully) eliminated the card track images on disk. However, this virus can capture the card track images that are in the input buffer and in the buffer used by the request message sent to the authorizer.
There are only two solutions that will eliminate this problem. One is to send each input byte to the host as it is read in and never have the full track data in memory at once. This solution still leaves card track images within host and network computers where they can be captured. The other solution is to encrypt the card image inside the card reader. End to end encryption is the only way to prevent viruses from getting card data.
However, that is a very expensive solution. The biggest problem with that solution is that most host systems and protocols are not designed to handle encrypted card track information. In order to make that solution happen, all those systems will need to be redesigned, recoded, and recertified.
The push by Visa to adopt EMV is only a bandage. All it does is to make such stolen card numbers harder to use at a face to face checkout lane by requiring the person presenting the card to know some extra piece of information. It does nothing for online sales (which are the fastest growing sales). Because it does not help with the future, it is a tacit agreement that credit card numbers will continue to be stolen.
The lead security standards architect for the PCI Council testified that EMV would not have prevented the Target leak.
The current system assumes that we can design perfectly secure networks. That assumption is false because we are all human. At the current rate, we can be sure that eventually, someone will figure out how to get inside the Visa network (most likely through human engineering). The current system has deep flaws and will continue to be broken into.
Those flaws in the current system were highlighted in the Congressional hearings. The general manager for the PCI Council testified that passwords for the network and device access are the weak point of the whole system. Back when VeriFone devices were the dominant credit card device, the hacker magazine published the system password that most devices used. Today, such passwords still get out into the hacker community.
The network can still be hacked and will be hacked again in the future.