Back to all incidents

Heartland Payment Systems — 2008 card breach

A SQL-injection attack on Heartland's web platform seeded memory-resident sniffers across the payment processor's network, exposing 130 million cards across 250,000 merchants.

Target
Heartland Payment Systems — 2008 card breach
Date public
20 January 2009
Sector
Financial Services
Attack type
Data Breach
Threat actor
Albert Gonzalez and co-conspirators
Severity
Critical
Region
United States

In January 2009 Heartland Payment Systems, then the sixth-largest US card processor, disclosed that attackers had been resident on its corporate network for several months and had installed packet-capture sniffers on its payment-processing infrastructure. The sniffers harvested card-track data — magnetic-stripe contents and CVVs — as the data transited Heartland's network in clear text. The result was 130 million card numbers exposed across roughly 250,000 merchants, the largest card breach in US history at disclosure. The lead operator, Albert Gonzalez, was a former US Secret Service informant who had used his cooperation to gain knowledge of fraud-investigation techniques while running the hacking crew on the side. The breach drove the industry-wide adoption of end-to-end card-data encryption from terminal to issuer-bank.

Heartland Payment Systems, then the sixth-largest credit-card processor in the United States, disclosed on 20 January 2009 that attackers had been resident on its corporate network for several months and had installed packet-capture sniffers on its payment-processing infrastructure. The sniffers harvested card-track data — magnetic-stripe contents and CVVs — as it transited Heartland’s network in clear text between merchants and the card networks. The intrusion exposed an estimated 130 million card numbers across roughly 250,000 merchants, the largest payment-card breach disclosed at that point in US history.

The intrusion began with SQL injection against a Heartland web property, opening initial access to the corporate environment. From there the attackers moved laterally over a period of months until they reached the payment-processing network, where they planted memory-resident malware on systems that handled card authorisations. The crucial design weakness was that Heartland was contractually compliant with PCI-DSS standards of the era, but PCI compliance permitted card data to traverse the processor’s internal network unencrypted between the cardholder-data environment and adjacent processing components. The attackers did not need to defeat encryption; they just needed to be on the right network segment, which they had been for months.

Albert Gonzalez, a former US Secret Service informant who had used his cooperation to gain knowledge of fraud-investigation techniques while continuing to run a hacking crew on the side, was the lead operator. The same group conducted the 2007 TJX Companies breach (94 million cards), the 2008 Hannaford supermarket breach (4 million cards), and the Dave & Buster’s breach. Gonzalez was arrested in 2008, indicted in 2009, and sentenced in 2010 to 20 years in federal prison — the longest sentence imposed for hacking offences at the time of conviction.

Heartland’s recovery cost approximately $140 million in fines, settlements and remediation, including settlements with American Express ($3.5M), Visa ($60M), MasterCard ($41.4M) and Discover ($5M). The company was suspended from the Visa list of compliant service providers, regained compliant status after demonstrating remediation, and was acquired by Global Payments in 2016. CEO Bob Carr publicly led the industry response, founding the Payments Processor Information Sharing Council and pushing the deployment of end-to-end encryption between the merchant terminal and the issuer that has since become standard. The breach is also commonly cited as the catalyst for the eventual US adoption of EMV chip cards, although the actual transition was triggered by the Target breach four years later.

Defender takeaway: PCI compliance is a baseline, not a ceiling. Heartland was certified compliant when it was breached, and the auditors who certified it were not negligent — they were applying the standard as written. The standard at the time permitted in-flight clear-text card data inside the cardholder-data environment, and the attackers exploited exactly that gap. End-to-end encryption from merchant terminal to issuer-bank gateway, point-to-point encryption (P2PE) standards, and tokenisation that removes raw PANs from merchant systems entirely, are all post-Heartland industry responses. The other lesson is the perennial one: SQL injection in 2008 was not a sophisticated attack. The way SQLi turned into a hundred-million-card breach was a flat internal architecture in which a public-internet-facing web server could ultimately reach the same network as the payment-authorisation hosts.

Sources

Back to all incidents