The criminal network identified in the US Justice Department indictments this week as having stole tens of millions of credit card numbers used people with skills in technology, finance and black markets -- some whom were notably polite, attentive and productive.
In one chain of ICQ messages excerpted by federal authorities in an indictment, there is back-and-forth about the software used to get credit card data from Dave and Buster's restaurant chain. The US says it was one of nine retailers hit. The hackers gave the chain a positive review: "A very nice place, they have many locations," wrote Albert Gonzalez, of Miami in an instant message.
But little time was wasted on chitchat. Tech support was needed to modify sniffer software for an intrusion. Maksym "Maksik" Yastremskiy, of Kharkov, Ukraine, in a message to Gonzalez, briefly discussed the need and finished by asking: "...could you, please recompile it :-) Thanks."
Gonzalez's response: "I can compile right now." There was no tech support whining in these messages -- just professional interest, and perhaps some pride, in how the software worked: "Did your guy use or say anything about my sniffer for dandb [Dave and Buster's]?"
"My guy told me to tell you big thanks and etc ;-)" was Yastremskiy's reply. Some 5,000 credit card numbers were taken from the chain.
For some employees, praise is as important as money, and this group evidently had both, according to what's in the federal charging documents. They made millions until the feds closed their operations this year.
"These guys collaborate," said Sam Curry, vice president of the identity access and assurance at RSA Security, a division of EMC. "They even have SLAs (service level agreements) and support numbers to reach other. They have specialized roles, sophisticated economics, [and] worldwide reach," he said.
It's the degree of specialization that's a tip-off as to how big these organizations are. It took focus and organization to attack nine major retailers, steal some 40 million credit and debit card numbers, decrypt PIN numbers, withdraw cash and sell the numbers on black markets.
The main targets were retailers. The thieves parked their cars near retail outlets, searched for open networks, and installed programs to capture the wanted data.
Retailers are particularly susceptible to theft because IT departments are kept lean, crucial technology improvements are deferred, and people with the skills needed to configure systems aren't always on staff, said Paul Kocher, president and chief scientist of Cryptography Research.
Amit Sinha, vice president and chief technology officer of AirDefense, a wireless security firm, said retail firms "have been lagging significantly," despite being a favorite target.
Retailers who lose data risk customer ill will, of course, but they also can face also action by the US Federal Trade Commission for letting it happen, said Richard Hackett, an adjunct professor at Boston University School Law.
DSW, the shoe retailer, had its data stolen by this group of thieves in 2005, prompting action by the FTC. In a settlement reached that sae year, DSW agreed to security improvements and regular audits.
Along with Dave and Buster's, other retailers known to have been targeted are BJ's Wholesale Club, TJX, DSW Shoe Warehouse, OfficeMax, Barnes & Noble, Boston Market, Sports Authority and Forever 21.
The FTC's view is that "it is unfair to consumers to take their information and place it in a system that is not reasonably secure from unauthorized access," said Hackett.