Media giant Fairfax has confirmed that two of its microsites were hacked this month but claims that up to 10,000 unencrypted credit card details compromised in the same attack were not Fairfax customers.
Hackers revealed to SC Magazine how they managed to exploit vulnerabilities in two third party-hosted web sites, Herald Education and Young Writer.
SC Magazine informed Fairfax of the vulnerabilities as part of responsible information security disclosure. The sites have been taken offline in response.
Fairfax said it was working with an undisclosed third party outsourcer to investigate the incident.
While it could not confirm technical details, a spokesperson for Fairfax said the web sites were hosted in a shared service environment.
"This relates to a small number of our sites that are hosted by external providers and there is no evidence that our major sites – smh.com.au, theage.com.au and our classified and transaction businesses have been compromised," Fairfax company secretary Gail Hambly said in a statement to SC Magazine.
"Fairfax values the integrity of its customer information highly and we are investigating this matter and will be communicating to our customers and relevant authorities about any potential security breach."
Microsites like Young Writer and Herald Education are often easy pickings for hackers if they do not receive the same level of security maintenance as the parent web sites. An outdated microsite run by Sony was hacked during the string of attacks against the company last year.
Questions over credit card data
The hackers claimed that administrator details stored in the Young Writer web site provided access to the Sydney Morning Herald domain from where root access was gained.
SC Magazine was shown a list of hundreds of internal database structures as proof of this attack, including Customer Relationship Management and Fairfax Enterprise databases.
The hackers claim to have accessed full credit card data including CCV numbers along with related information on names, addresses and date of birth using this root access. The hackers had assumed these belonged to subscribers of Fairfax publications including the Sydney Morning Herald.
SC Magazine has witnessed a link hackers claimed would download the credit card database when run in a SQL dump application and forwarded this to Fairfax to assist its investigation.
SC Magazine was unable to independently verify whether this credit card data belonged to Fairfax customers.
Fairfax has insisted that the microsites are run and managed completely separately to its core web sites and transactional engine. It confirmed that third parties do hold the credit card and subscriber information of its customers, but that this data was held in an encrypted format.
The hackers told SC they did not plan to use or publicly disclose the credit card and subscriber information. They claimed to have breached the network to highlight information security vulnerabilities.
The hackers claimed that Fairfax's internal network was flat and presented few security obstacles which would prevent attackers from accessing multiple areas.
Flat or soft networks were common among larger organisations and often require an overhaul to improve.
Hardened networks were cut up into zones separated by firewalls and intrusion detection systems that minimised the risk of one breached system compromising others. The most sensitive systems could be disconnected from networks, or air-gapped.
Degrees of security
The Office of the Federal Privacy Commissoner was asked if it would investigate the attack but was unable to comment at the time of writing.
A veteran of the credit card industry who requested anonymity said the outsourcer of the credit card information may be liable for breaching the Payment Card Industry Data Security Standard (PCI DSS) if CCV data was stored within databases, as the hackers claimed.
But it would not be liable under the standard for storing credit card information on systems provided the data was kept in a secured environment.