Please report this via the US-CERT at https://www.us-cert.gov/report
This will allow you to report it, eventually from an anonymous email address, without exposing you directly to the bank which might react bad to you. CERT can handle the coordination with the bank, this is what they do.
> “It’s fine, there are more checks in place to prevent unauthorised transactions”
> “Also, it’s insured”
Well ok, that means the bank is protected, but what about my (sensitive) data such as transaction history?
> “If anyone does anything bad, law enforcement will step in”
Yeah, I totally trust a bank that can’t even properly deal with something as basic as passwords to notice breaches reliably.
> “It would be too expensive to replace legacy systems”
And that’s the consumer’s problem?
I really hope none of you apologists are moving fast and breaking things at any company that is entrusted with people’s personal information or is needed for more critical infrastructure of everyday life than cat pics and funny polls.
In Europe banks also don’t like paying to replace legacy systems to maintain security, but such a failure to protect consumer data and privacy would be in serious breach of legislation and result in significant fines.
The risk analysis and mitigation discussion for these institutions goes something like this:
1) We cant have good password storage so we will require a 2nd factor and attempt to ensure these systems reside in our most secure network.
2) There is nothing we can do, so we will simply rely on the fact that if someone logs into an account illegally, we send in the men with guns. For some strange reason when a bank calls the FBI things move with a high level of expediency.
There is much more to this than just the technical aspect of "oh my goodness why aren't you hashing your passwords". How much ripping would HN impose on one of these institutions if they attempted a 100% best practices secure password upgrade and then subsequently had a complete IT disaster unfold (I can certainly link articles). For many banks and other financial institutions, going down for even 1 hour is a complete catastrophe. If people can't get their money out right away, they are leaving for the competition and you will likely get dinged by regulators. Bad people will continue to do bad things until the end of time. Killing your business to handle every edge case, even if it seems obvious, is not a good path to go down.
I would also consider this: These banks' IT systems are storing things that many of us would argue are much more valuable than your passwords. A bank's core system also represents the actual monetary value of every customer's account. We are talking about password security in a system domain where there are arguably far more valuable assets to secure. These assets are already implicitly protected by a massive apparatus extending as far as Ohio Class nuclear submarines patrolling the Pacific ocean.
American Express passwords are not case sensitive.
It is possible that they UPPER(...) the password before hashing it and then compare against that when you log in. This explanation would only be a little dumb because it reduces the domain of the password space. It also strains credulity.
Wait, that alone doesn't necessarily indicate that they're storing clear text passwords. I notice you didn't say that they just repeated your password to you-- why do you think they store the whole thing in clear text?
HN readers are apt to demand hardcore passphrases, salting, 2FA, etc. But the reality is that banks have to deal with all kinds of people and situations. Your security as a bank customer hinges on more than just one password, it's also about monitoring patterns of behavior, being aware of what's coming and going from your account, and protection mechanisms like the bank's insurance.
That said, one would think that large institutions have learned their lesson about clear text passwords, perhaps this one hasn't? Is there a law against clear text passwords? How does anyone actually know if a financial institution has sound IT practices, by happenstance incidents like this? Really?
https://banking.westpac.com.au/
I complained to them about this years ago, they replied explaining they knew what they were doing and it was a balance between security and simplicity...
In your case, they may or may not be storing the password in cleartext. They might be using the two way encryption instead of one-way hash. Passwords should be hashed (with salt) and it is irreversible.
For a financial institution, revealing your password by a customer service rep is a big red flag. I would reach out to concerned authorities and do a proper disclosure.
FWIW I have seen two companies that store passwords properly in a one way hash with salt but store statistics on every password like number of case changes and count of numbers and total length. I personally think that practice is infinitely stupid but can explain why they can say it has 3 numbers in it. One major marketing firm I did work for did that until we showed them why it was so dangerous. They were just trying to make users life easier but that wasn’t a smart trade off.
Personally I would like to know which bank. I have accounts at a number of major US banks and if one I use is doing this I’ll move everything out of them immediately.
Edit: to answer your question I’d hand the info to a major investigative news source and let them dig more. The FTC and banking regulators I don’t think will get involved unless there was damage.
It certainly isn't going to be news to the bank itself, so there aren't responsible disclosure concerns here.
And since the top advice here is to leave the bank, wouldn't the best thing you can do be to alert the public, so others can protect themselves as well?
Try @briankrebs on Twitter.
As other point out: maybe they store some things about your password like "has four digits, starts with an S".
This does not mean they store your password in plain text.
Everybody here starts shaming and naming but be very careful with that. Before you know it you shame a company while there is nothing going on.
Legislation should have and likely still should be put in place.
I don't think we have enough knowledge of the risk and processes in place at this bank to say if it's an issue.
My bank calls me to talk to me and insists I give them my date of birth and address to ‘verify’ myself.
Meaning anyone can call me, pretend to be my bank, I am supposed to give them this info, and then they have what they need to verify themself as me.
Banks are dumb.
Not sure how they were doing that if they weren't storing the password in plaintext.
Here we have something called BankID which comes in two flavors, one that is a physical token that generates TOPT used to log in, either in a combination with a password or a PIN on the token device itself, referred to as BankID. And the other, much slicker solution, called BankID on Mobile, which runs as SIM-application on your phone where you digitally sign the login request using a PIN. The user can also verify the request visually on both the computer and phone using a unique keyword.
One killer feature with BankID is that you can use it to log in to any service that has BankID, like your insurance company, looking at your tax return, other banks, etc. This is perhaps the biggest issue with it since the system can get overloaded when there's a country wide rollouts of tax returns and such. This has become much better lately since they've started to roll out things like tax returns as soon as they're ready instead of doing bulk releases.
Now that banks aren't paying useful interest rates they are mostly only tolerable for security and convenient access to your money. If they can't do those two then... what exactly are they for? Likely nothing.
I was thinking maybe Capital One?
I looked quickly online but the only reference I could find was that "passwords are protected by strong cryptography in transit and at rest", which seems to allow wiggle room to store passwords in reversible but encrypted format.
If the authentication still requires using some kind of good 2FA then it's less serious to have the password in plaintext. Still bad of course.
If this is for some other service that doesn't let you do any transactions then it's not as serious either (still bad and embarrassing, but not that serious)
Even with properly hashed passwords etc I'd be worried if my bank allowed login with only a username/password and no further security. I didn't think even that was a thing in 2020.
I'm not sure how the bot protection software was deployed but looking at marketing materials I suspect the data was sent to the third party as part of a SAAS service.
We believe this was accidental because a later version of the software stopped doing it. I'm not sure if there was a notification by the third party to users about this flaw.
It's very likely that your bank is based and regulated by New York State, even if it isn't physically based there. Contact the NY State attorney general's office, they should take you seriously.
Don't get me wrong, plaintext stored in a DB is bad enough, if the DB gets compromised, but apparently they don't even need that as they have an interface that customer service can use to view your password.
How secure do you think that system is?
Ask yourself these questions:
Are you sure it was your password? Did they generate a password for you? Did they verify that you are the account owner by asking you to enter the "hotline-pin"?
https://whyisthisinteresting.substack.com/p/why-is-this-inte...
But it is a pain when I switch phones and need to get the old one deactivated and the new one authorized.
Still awful, but not as awful.
What you should do: Never reuse a password when working with financial institutions older than 5 years old.
Don’t agonize about it so much it’s not like you’re going to hurt the banks feelings.
No one will notice or care anyway and banks deserve what they get if they do this.
And if the bank does pay attention they’ll just fix it and move on. Don’t know why you feel this is such a big deal.
Who would you tell that would even care? I can’t imagine the police jumping into their car with sirens screaming. “I wish to report a terrible crime”.
Proud of my bank in India (State Bank of India) which is crazy over security. Secure password requirements for login. Another completely different password for managing my banking profile and adding bank transfer beneficiaries. OTP for each money transfer related activities I do from the bank.
but.. something doesn't look right here..
OP is a throwaway account created today, which I can understand for this type of thing.. but...
they withheld the bank name in the title/desc.. okay again a responsible thing to do.. but...
when asked what the bank name was in the comments they were not shy at naming it..
Something just doesn't feel right. Why the sudden change of heart?
For everyone's sake I hope I'm right, that this is just FUD.. to the OP if you really are serious I'm sorry, and please do report this ASAP.