Home Forums Bike Forum CRC security issues?

Viewing 40 posts - 721 through 760 (of 946 total)
  • CRC security issues?
  • andytherocketeer
    Full Member

    I find it hard to believe a website of the size of CRC would be subject to a SQL injection attack

    Company size has very little to do with vulnerability. Might even make them a bigger target with hackers. SQL Injection, Cross-site scripting, buffer overflows, etc. must surely be one of the biggest and most common reasons for all the patches and updates.
    Will admit I’ve not done any pen-testing for years, but some of the bugs out there online are insanely dumb and easy to crack. Some are documented and not patched for months, others get reported, patch made available, and the hackers are defacing sites within hours, before updates can even be applied.

    DavidB
    Free Member

    I find it hard to believe a website of the size of CRC would be subject to a SQL injection attack

    Believe you me the hackers out there are REALLY good. I have spent years developing very secure sites working with sensitive information and we wrote layers of security traps to counter SQL injection. We also employed white hats to attack the site and find any flaws that we may have left in. They were able to do some really scary stuff and I learnt all about blind SQL injection as a way of enumerating database information. This was a result of a line line mistake by one of our devs. That is all it takes, one simple coding assumption and you have had it.

    xiphon
    Free Member

    We have a Dev here at work who has a strong interest in web security – he pen tests his own work sites, to see how far he can get from ‘the other side’. It’s a fascinating art.

    About 5% of the time, he can get in – so he re-writes the code, and tests it again.

    I would not be surprised if Export Technologies IRP software had numerous security holes/bugs, yet to be discovered by their own team.

    sheffield43
    Free Member

    Doesn’t using stored procedures for all db access, rudimentary user input checking plus having a decent security object security setup on your database eliminate SQL injection attacks?

    DavidB
    Free Member

    sheffield43: no, it mitigates against them

    GHill
    Full Member

    All this so soon after the antichainreaction website springs up, suspicious eh – I mean there is a spanish connection with some of the rail tickets being bought.

    *please be aware this post is not at all serious, there may be an attempt at subtle humour.*

    quiddity
    Free Member

    CRC turned over £77 million in 2009. This is information in the public domain.

    I have no idea how accurate the following is so it’s totally open to debate but we can play with some of the numbers and use them to narrow down to the unknowns. Then we can play plug in made up numbers and see if the answers meet our expectations.

    Around £6 million a month in orders
    Average order value say £25… or £50… or £100 ? Lets take these 3 and see what happens.

    6 million/£25 = 240,000 orders a month.
    @ £50 = 120,000 orders
    @ £100 = 60,000 orders

    0.1% of 240,000 = 240
    0.1% of 120,000 = 120
    0.1 % of 60,000 = 60

    We have on this site 158 complaints. That sits between average order values of £25 – £50 but we can’t assume that those 158 are all the complaints. There will undoubtedly be more.

    The largest unknown is the average CRC order. I could be all over the place with my guess. Maybe a straw poll of readers last purchase values will help us narrow that down to a more accurate figure. Anyway, I think the method is sound if not all the figures within it. The other unknown is how representative our 158 complaints are of the total complaints. These two figures are open to debate and supposition.

    well make that 159!

    just joined to say that i’ve been done as well. ordered a £6.99 tyre on the 8th then had a transaction on the 12th (showed up on the 15th) for £187.02 for some posh fruit drink from america!
    natwest refunded me that day & know about the CRC frauds. phoned CRC who wont admit it is something to do with them (yet) but they are investigating

    sheffield43
    Free Member

    no, it mitigates against them

    So is it impossible to implement a secure payment portal that’s invunerable to SQL injection attacks (specifically)?

    footspokeouch
    Free Member

    while everyone is discussing 0.1% or whatever it equates to, in terms of CRC client numbers, which is agreed that if you are servicing 5-10,000 orders a day, on an estimated £90-100m pound annual turnover, is ‘minimal,’ but has anyone simply added up the various defrauded values up in total from this forum? any forum?

    That may focus the mindset of the subdued cycling media ?
    It’s often reported fairly quick when CRC were the victims of various thefts…

    http://www.chainreactioncycles.com/News.aspx?NewsID=1532
    http://www.singletrackworld.com/2011/02/nigel-page-has-seven-bikes-stolen/

    Forgive the criticism, but card fraud, credit, debit or however produces a victim, whether thats CRC, the customers, or collectively, all of the shoppers who ultimately end up paying for the crime by increased costs at all levels.

    (unsure whether debit cards users, are generally protected/notified as to the rights of credit card users?)

    Cycle Outlet falls victim/suffers credit fraud of ‘x pounds’ amount may have more of an ‘impact’ in capturing the focus of this thread, rather than a standardised line ‘a minute percentage of our daily customers relative to our large sales suffered an inconvenience’ Meaningless insulting corporate drivel.

    DavidB
    Free Member

    So is it impossible to implement a secure payment portal that’s invunerable to SQL injection attacks (specifically)?

    That is not what I said. The common misconception is that you implement stored procedures and bingo, don’t worry about injection. But if your procedures are crap then vulnerabilities will arise, I can show you examples if you like of poor coding that will lead to this. I’ve also seen security classes that have introduced vulnerabilities and all sorts of other tosh. The number of times I’ve heard people say “Oh..we are safe from that because we’ve implemented <insert fashionable security package X>” ..when the safest path to a properly secure site is to design security in ground up AND constantly review and attack the source code.

    Cougar
    Full Member
    sheffield43
    Free Member

    That is not what I said. The common misconception is that you implement stored procedures and bingo, don’t worry about injection

    Fair enough.

    MrNutt
    Free Member

    I just saw that Cougar, its news now, personally I’ve not had any problems, but then I’ve not bought from CRC for about a year and a half, only because I’m skint though 😀

    kamina
    Free Member

    That is not what I said. The common misconception is that you implement stored procedures and bingo, don’t worry about injection. But if your procedures are crap then vulnerabilities will arise, I can show you examples if you like of poor coding that will lead to this. I’ve also seen security classes that have introduced vulnerabilities and all sorts of other tosh. The number of times I’ve heard people say “Oh..we are safe from that because we’ve implemented <insert fashionable security package X>” ..when the safest path to a properly secure site is to design security in ground up AND constantly review and attack the source code.

    Bingo. We run a pretty busy website with hundreds of millions of monthly clicks. We get attacked a lot so we try to stay on top of things. We have many layers of security, but all it takes is one tiny mistake to open up a hole.

    So basically you have to try to stay on top of it, and keep maintaining quality. Unfortunately the one who actually wrote the code might easily not notice it. Automated tools might not notice it, and often cost 10000€ per year per computer. maintaining a team of people just for that is also quite expensive.

    I would imagine cases like this will force them to reevaluate how they handle their security. Generally security is seen purely as an expense. You talk about risks, but they are hard to quantify. The only clear thing is that your developers will be doing something where the benefits (from the managements point of view) are not as clear as when they make a new great feature which will directly affect sales. However when a risk materializes it actually wakes people up, and forces management to divert development effort towards increasing security.

    cinnamon_girl
    Full Member

    I need to order something, can’t get it from anywhere else, so is it safe to order from CRC? I don’t have a Paypal account.

    Confused C_G

    Ecky-Thump
    Free Member

    C_G
    No, there has been nothing at all to suggest (let alone confirm) that it is safe <EDIT> with a credit/debit card </EDIT>.
    Paypal does appear to be safe and doesn’t take long to set up. I’d suggest you go down that route if you have an urgent need for bits.

    <EDIT> I’ve NOT been stung, bought loads, including during suspect period, but always through Paypal </EDIT>

    xiphon
    Free Member

    cinnamon_girl – Member
    I need to order something, can’t get it from anywhere else, so is it safe to order from CRC? I don’t have a Paypal account.

    Confused C_G

    Yes, it’s safe – if you don’t mind paying for a hotel in France and some O2 Top-ups.

    Suddenly CRC doesn’t look so cheap….

    uplink
    Free Member

    I don’t think you need a PP account to use it with a retailer

    I’d stick with PP for now TBH

    sheffield43
    Free Member

    Yes you can use PP without an account – so you can do that to avoid using their credit card system.

    Mark
    Full Member

    Select Paypal as your payment option at Checkout… you are then taken to the paypal website to login to your Paypal Account.. Howvere if you don;t have an account there is also a ‘Don’t have a Paypal Account?’ link on that page. Click that and it will take you to a page where you can use a card for payment. Your card details will then be handled exclusively by Paypal and not the retailer.

    druidh
    Free Member

    There is also a “bank transfer” option. Was that always there?

    rapiddescent
    Full Member

    keep checking your credit card statements.

    It sounds like the details have been sold on far and wide and are still being attempted.

    cinnamon_girl
    Full Member

    Thanks very much for helpful replies. 🙂

    harman_mogul
    Free Member

    Some of you guys may be baffled by the geekspeak in some of the more searching postings here. All you need to know about SQL injection attacks is here[/url].

    bigjim
    Full Member

    I’m too scared to click on that incase my sql gets injected.

    leffeboy
    Full Member

    harman_mogul – thanks for that. That’s another evening wasted then 😥

    DT78
    Free Member

    Yes, it’s safe – if you don’t mind paying for a hotel in France and some O2 Top-ups.

    Suddenly CRC doesn’t look so cheap….

    lol, so true

    noteeth
    Free Member

    PayPal is refusing to let me pay at ChainReaction – though it’s fine elsewhere…

    Jonny5
    Free Member

    Been stung here too. Order placed last Sunday phone call from my CC company the friday after. Again some O2 top ups in Slough. Reluctant to ever use CRC again.

    Plus now signing up with paypal. Though one question I did look but do PP charge for transactions? I saw a charge of 3.4% but not sure if that was for buying from online retailers.

    blades2000
    Free Member

    Just read this, perhaps it is not totally Chain Reaction Cycles fault….

    perhaps it is not CRC fault

    PS sorry if this has been posted before.

    leffeboy
    Full Member

    I was wondering something along the same lines, ie. if it may not actually be CRC but we think it is because we have been scammed AND have used CRC. The problem being that the stats are heavily skewed because if you are on this forum there is a good chance that you have actually used CRC recently so the CRC link is from being a forum reader and not from them being the source of the scam?

    Janesy
    Free Member

    No its CRC, they have admitted it to me on the phone.

    Janesy
    Free Member

    blades2000 – but to use 02 you have to have card details. Have you read the entire thread?

    mybike
    Free Member

    blades2000 – but to use 02 you have to have card details. Have you read the entire thread?

    I’d rather have my card cloned

    cinnamon_girl
    Full Member

    Hmmmm an interesting one. I ordered something yesterday from CRC and used the Paypal credit card checkout, all went through. Last night I tried to order online from a well-known music/dvd etc retailer and my card was rejected.

    This morning I received a call from my card provider to say that it had been flagged up (I have used this music retailer before with this card) and there had been some fraudulent activity involving them. My card has therefore been cancelled and am awaiting a new one. 🙁

    allthepies
    Free Member

    I ordered something yesterday from CRC

    I won’t be using CRC for the forseeable, even if I could pay by sending them gold plated wood cuttings.

    cinnamon_girl
    Full Member

    allthepies – I did ask the question yesterday as I don’t have a Paypal account and was advised of this alternative method.

    Thing is, we had this with another equally well-known retailer a couple of years ago.

    luckydog
    Free Member

    £292 of my hard-earned bought tickets on french railway!! luckydog no longer it seems…although HSBC refunded whilst they investigate. Bought from CRC day before…

    blades2000
    Free Member

    Janesy – Member
    blades2000 – but to use 02 you have to have card details. Have you read the entire thread?

    Nope, not read the entire thread however the article I linked to suggests that they don’t need a card number as these are only computer generated, ie they generate there own numbers and test them out. Therefore all I was suggesting was that It may have been the case that CRC was not hacked however further posts seem to indicate they might have been.

    Thanks for informing all of us. We can now only hope that the culprit/s are caught.

    beej
    Full Member

    I believe O2 have updated their systems – someone earlier in the thread mentioned you need house number or postcode as well. Not being an O2 user I can’t confirm this…

    However, I can use the internet. From their site

    There is no registration process involved all you need is the mobile number you wish to Top-Up and a valid credit or debit card to follow our easy to use 3 Step process.

    Step 1
    Just enter the mobile number you wish to Top-Up, the credit/debit card type and the amount you want to Top-Up by.

    Step 2
    Enter your credit/debit card details and registered billing address.

    Step 3
    Confirm your Top-Up request.

    So billing address is needed… therefore random card generation won’t work.

Viewing 40 posts - 721 through 760 (of 946 total)

The topic ‘CRC security issues?’ is closed to new replies.