[NSRCA-discussion] FMA Database Compromised

Archie Stafford astafford at swtexas.net
Wed Nov 19 17:39:35 AKST 2008


Chris,

 

A lot of companies now are requiring the full billing address now for
verification, not just the zip code as it used to be.  

 

Arch

 

 

  _____  

From: nsrca-discussion-bounces at lists.nsrca.org
[mailto:nsrca-discussion-bounces at lists.nsrca.org] On Behalf Of Chris Moon
Sent: Thursday, November 20, 2008 7:03 AM
To: General pattern discussion
Subject: Re: [NSRCA-discussion] FMA Database Compromised

 

Guys:
I kind of doubt it was simply a breach of their external credit card
processor, and here's why.  On Monday, I received a small print order (less
than $6) from an online printing company.  The small box had my name and
address correctly on it and it was from a company that had 3 of the
fraudulent charges on my credit card.  I did not order this stuff of course,
but the thieves clearly had not only my valid credit card number and
expiration date as a processing company might have, but had my correct name
and address to go with it.  One of the online forums had a posting from a
guy who said they had enough info on him to get this bank to release the
pin# for his card to THEM and subsequently took out $400 in cash advances.
So unless the credit card processors need the name and address data too in
order to process the charges (I know for a fact they did not need this data
years ago), I think it was the FMA internal server that was hacked, or an
inside job from an employee or ex-employee - which I think is most likely.  

Chris

Pete Cosky wrote: 

That's the truth. A lock only keeps an honest man honest.

 

>From what I gathered it wasn't FMA that was compromised, it was their
payment processor, which begs the question how many other businesses are
impacted by this breach.

----- Original Message ----- 

From: Archie Stafford <mailto:astafford at swtexas.net>  

To: 'General pattern <mailto:nsrca-discussion at lists.nsrca.org>  discussion' 

Sent: Wednesday, November 19, 2008 7:29 PM

Subject: Re: [NSRCA-discussion] FMA Database Compromised

 

Matt,

 

The security symbol would not have helped here.  I'm sure FMA has a fairly
secure site.  Their database was what was compromised.  Technology improves
daily for this type of fraud.but so do the people doing it.  

 

Arch

 

 


  _____  


From: nsrca-discussion-bounces at lists.nsrca.org
[mailto:nsrca-discussion-bounces at lists.nsrca.org] On Behalf Of MATT LIPRIE
Sent: Thursday, November 20, 2008 4:53 AM
To: mups1953 at yahoo.com; General pattern discussion
Subject: Re: [NSRCA-discussion] FMA Database Compromised

 

That is why I am so leary of using a credit card somewhere like that.   Plus
I do always check if the website has a little security symbol on the bottom
of the page.

 

Matthew L.

----- Original Message ----- 

From: mike mueller <mailto:mups1953 at yahoo.com>  

To: General pattern <mailto:nsrca-discussion at lists.nsrca.org>  discussion 

Sent: Wednesday, November 19, 2008 7:52 AM

Subject: Re: [NSRCA-discussion] FMA Database Compromised

 


 Bingo, that explains it. Good catch!

--- On Tue, 11/18/08, MKMSG <mkmsg at cox.net> wrote:

From: MKMSG <mkmsg at cox.net>
Subject: [NSRCA-discussion] FMA Database Compromised
To: "NSRCA Discussion List" <nsrca-discussion at lists.nsrca.org>
Date: Tuesday, November 18, 2008, 11:14 PM

If any of you have recently bought products on line from FMA Direct using a
credit card, check your credit card account.  FMA's database has been
compromised/hacked and whoever has the information is making charges against
the credit cards.  I read this in the electric forum on Ezonemag.com.
Sure enough, when I brought up my VISA account, there was a NAPSTER charge
there so I cancelled the card.  You might want to check yours if you've done
business on line with FMA recently.

 

Mike

 

_______________________________________________
NSRCA-discussion mailing list
NSRCA-discussion at lists.nsrca.org
http://lists.nsrca.org/mailman/listinfo/nsrca-discussion

 


  _____  


_______________________________________________
NSRCA-discussion mailing list
NSRCA-discussion at lists.nsrca.org
http://lists.nsrca.org/mailman/listinfo/nsrca-discussion 


  _____  



No virus found in this incoming message.
Checked by AVG - http://www.avg.com 
Version: 8.0.175 / Virus Database: 270.9.7/1799 - Release Date: 11/19/2008
8:58 AM


  _____  


_______________________________________________
NSRCA-discussion mailing list
NSRCA-discussion at lists.nsrca.org
http://lists.nsrca.org/mailman/listinfo/nsrca-discussion

 





  _____  



 
_______________________________________________
NSRCA-discussion mailing list
NSRCA-discussion at lists.nsrca.org
http://lists.nsrca.org/mailman/listinfo/nsrca-discussion
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.nsrca.org/pipermail/nsrca-discussion/attachments/20081120/f2e81e7a/attachment.html>


More information about the NSRCA-discussion mailing list