Inside Job Blamed For Leak Of 2.3 Million People's Personal Info

from the it-wasn't-our-fault dept

The latest massive data leak comes from Certegy Check Services, a Florida company that provides check-processing services. Personal information, including credit card and bank data, on 2.3 million people was stolen, with the company blaming a “rogue employee.” They say a former database administrator stole the data, and sold it to a data broker, which then sold it to direct-marketing agencies, which used the info to solicit the people by phone and mail. They hasten to add that they don’t believe any of the info has been used for identity theft, and they’ve asked a court to tell the companies to turn the data back over to them and not use it any longer. Of course, there’s no guarantee of any of that. For a long time, this sort of inside job has been been a huge security problem for many companies, and little has been done about it. Just as we’ve wondered why some people think it’s a good idea to carry 25 million people’s personal info around on a laptop, it’s also not clear why so many companies retain personal info, nor allow so many employees unfettered access to it. But as long as the corrective measures to data leaks remain to be weak reactive fines, don’t expect anything to change.

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Inside Job Blamed For Leak Of 2.3 Million People's Personal Info”

Subscribe: RSS Leave a comment
_Jon (user link) says:


Poor choice of terms, IMO.
I doubt that a “database administrator” has “unfettered” access to a database. I’m sure s/he has an account with password protection via PC with a USB drive just like 99% of the rest of the commercial world.

In fact, due to Sarbanes / Oxley, companies have to prove (attest w/ external auditor) that only the required people have access to data like that. So if it is a publicly traded company with a market cap in excess of $1MM, it is hardly “unfettered”.

The other points are good, however.

_Jon (user link) says:


Well, despite your insults (that makes for good debate), I think we are on the same page. I used to be a DBA and I had access to a lot of information. Running a query isn’t that hard. Saving the output to a removable drive isn’t hard.

That was my point.

But, hey, you guys just keep on making this an unfriendly place to comment on and guess what – people will stop commenting. Good job. Assholes.

DS says:

Separation of roles

DBAs have access to data… encrypted data. Unix admins have access to encryption keys, but not databases. Developers have access to code, but no encryption key or db. Takes 2 bad people minimum to get anything useful out of the database. Yeah, it’s a pain to work around, but that’s the price of security.

Bryan (user link) says:

This is the symptom of the problem

I would venture to guess that the ‘rogue’ employee was also a disgruntled one. Upper management shat upon his head every day, treating the person like crap – then they wonder why this kind of thing happens. Happy, Sane employees do not venture out to cause damage to a company for a few bucks (or a few thousand), especially if they feel they are being treaded well.

Companies need to stop obsessing about the almighty $$, start concerning themselves with their employees (the life blood of their operation) and their customers (where the money comes from in the first place), the $$ will follow. With the continuing downfall of corporate workplaces, I feel we will see more and more of this in the future.

iPir4te says:

Re: This is the symptom of the problem

I think you hit the nail on the head with this comment. Overworked, underpaid, “we wanted that info yesyerday,” etc. I don’t know much about DB admin, but being an ex-coder, I can appreciate the fact.
Undoubtedly, there had to have been at least 2 people in on this job – obviously the IT or Security types weren’t in on it…

Sean says:

Re. Unfettered v. IT Security

Administrators should always be the most CLOSELY watched and the most RESTRICTED users. This kind of theft is only possible where the admins are too lazy or the company is too cheap to implement and monitor proper controls.
Until there are good legislative kick-ass penalties, companies won’t give a f$ck about our personal data. If they got hit with a fine of 10 bucks per person for the leak…

Bah who needs one (user link) says:

If I were a disgruntled DB admin, nothing so silly as this would happen.

Instead, I’d pop in late one night looking like the dedicated if underappreciated loyal employee, do some fiddling with computers, and leave, as often is the case. Only the next morning the guys in the three-piece suits with the seven-figure annual salaries are greeted with garbage data and an email saying “I have the decryption key. Give me three billion dollars in small, nonsequential, unmarked bills and get me to Rio on the company jet and you can have it. Send the cops or anything like that, and I rip up the paper I wrote it on and set it on fire. Oh and I won’t be able to remember it afterward, it’s a 256 bit key. Have a nice day.”

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...