<div dir="ltr"><div><div class="gmail_signature"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><a href="http://www.govtech.com/security/Wellington-Fla-Breach-Larger-than-Initially-Thought.html">http://www.govtech.com/security/Wellington-Fla-Breach-Larger-than-Initially-Thought.html</a><br><br clear="all"><div><div dir="ltr"><div dir="ltr"><div dir="ltr"><b><span style="font-size:10pt"></span></b><span style="font-size:10pt"></span><span style="font-family:arial,helvetica,sans-serif"></span><p class="gmail-krtSlug" style="box-sizing:border-box;margin:0px 0px 18px;color:rgb(51,51,51);font-family:Georgia,"Times New Roman",serif;font-size:18.2px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial">Wellington, Fla., Chief information officer William Silliman also said the breach began as an effort to mine for the digital currency Bitcoin, but at some point expanded to include a sophisticated “skimmer” to capture credit card numbers.</p><p class="gmail-krttext" style="box-sizing:border-box;margin:0px 0px 18px;color:rgb(51,51,51);font-family:Georgia,"Times New Roman",serif;font-size:18.2px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial">In a news release last week, Wellington warned that utility customers who made one-time debit or credit card payments between July 2017 and the beginning of this month may have had their credit card numbers stolen as part of the breach.</p><p class="gmail-krttext" style="box-sizing:border-box;margin:0px 0px 18px;color:rgb(51,51,51);font-family:Georgia,"Times New Roman",serif;font-size:18.2px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial">But one-time debit or credit card payments made to the village’s code, building, business licenses, parking tickets and planning departments also were exposed, Silliman said, citing the results of further assessment of the targeted server.</p><p class="gmail-krttext" style="box-sizing:border-box;margin:0px 0px 18px;color:rgb(51,51,51);font-family:Georgia,"Times New Roman",serif;font-size:18.2px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial"><span style="font-size:18.2px">The system now is safe to use, officials said.</span>Other forms of payment — including e-checks and payments made over the phone — were not affected, and credit card numbers that were set up to pay automatically should be safe, Silliman said.</p><p class="gmail-krttext" style="box-sizing:border-box;margin:0px 0px 18px;color:rgb(51,51,51);font-family:Georgia,"Times New Roman",serif;font-size:18.2px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial">The breach did not target Wellington specifically, but rather set its sights on the Click2Gov vendor the village uses to collect online payments. Superion, the software’s creator, notified Wellington at 2 p.m. June 6 that its servers may have been exposed, and within an hour, the decision was made to shut down the system, Silliman said.</p><p class="gmail-krttext" style="box-sizing:border-box;margin:0px 0px 18px;color:rgb(51,51,51);font-family:Georgia,"Times New Roman",serif;font-size:18.2px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial">Wellington isn’t the first municipality to suffer a breach of its Click2Gov system. Numerous communities across the U.S. have reported a similar issue. Lake Worth said in February a breach of its Click2Gov system had left its customers exposed, and two California communities reported similar breaches in February and May.</p><p class="gmail-krttext" style="box-sizing:border-box;margin:0px 0px 18px;color:rgb(51,51,51);font-family:Georgia,"Times New Roman",serif;font-size:18.2px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial">To better understand the breach, Silliman and his team are working with the Sylint Group, a data breach specialist that has worked with other communities where Click2Gov information has been exposed.</p><p class="gmail-krttext" style="box-sizing:border-box;margin:0px 0px 18px;color:rgb(51,51,51);font-family:Georgia,"Times New Roman",serif;font-size:18.2px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial">In Wellington’s case, the hackers switched the server into a mode that made the real code invisible, then layered their Bitcoin-mining and credit card-skimming code on top of that. The code would collect batches of credit card numbers, encrypt them and ship them to parts unknown. Then the code would “clean up after itself,” Silliman said. “It was really well-written and, this is Sylint’s term, specifically written for Click2Gov.”</p><p class="gmail-krttext" style="box-sizing:border-box;margin:0px 0px 18px;color:rgb(51,51,51);font-family:Georgia,"Times New Roman",serif;font-size:18.2px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial">Once Wellington knew the potential severity of the breach, it began building new virtual servers to host its billing system. The new servers have added layers of security beyond what previously existed, Silliman said, declining to elaborate publicly.</p><p class="gmail-krttext" style="box-sizing:border-box;margin:0px 0px 18px;color:rgb(51,51,51);font-family:Georgia,"Times New Roman",serif;font-size:18.2px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial">There was some hint of Click2Gov’s issues beginning last year, when Wellington received an email from Superion in September and another in October, saying some vulnerabilities were possible. Silliman’s team in both cases followed the steps to take care of any issues. Another notification arrived in April, and Wellington followed the same process.</p><p class="gmail-krttext" style="box-sizing:border-box;margin:0px 0px 18px;color:rgb(51,51,51);font-family:Georgia,"Times New Roman",serif;font-size:18.2px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial">Council members and Silliman expressed frustration with Superion, questioning what the company knew and when.</p><p class="gmail-krttext" style="box-sizing:border-box;margin:0px 0px 18px;color:rgb(51,51,51);font-family:Georgia,"Times New Roman",serif;font-size:18.2px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial">While Superion did not answer specific questions for this article, a spokeswoman did send a statement: “Protecting our customers and their clients’ data is of the utmost importance to Superion,” she wrote. “Last year, we reported that a limited number of on-premise clients’ networks were compromised. We continue to investigate any suspicious activity and have engaged a leading forensic investigation firm to assist in our efforts. We notified Superion customers of this incident, including the Village of Wellington, and are working closely with our customers to swiftly resolve and remediate this matter.”</p><br><br></div></div></div></div></div></div></div></div></div></div></div></div>
</div>