The Palm Beach Post

Data breach wider than thought

Wellington’s Click2Gov vendor used for online payments was targeted.

- By Kristina Webb Palm Beach Post Staff Writer

WELLINGTON — A recently discovered data breach hit more customers than initially reported and remains under investigat­ion, a village official said in an update to the council at its Tuesday night meeting.

Chief informatio­n officer William Silliman also said the breach began as an effort to mine for the digital currency Bitcoin, but at some point expanded to include a sophistica­ted “skimmer” to capture credit card numbers.

In a news release last week, Wellington warned that utility customers who made one-time debit or credit card payments between July 2017 and the beginning of this month may have had their credit card numbers stolen as part of the breach.

But one-time debit or credit card payments made to the village’s code, building, business licenses, parking tickets and planning department­s also were exposed, Silliman said, citing the results of further assessment of the targeted server.

Other forms of payment — including e-checks and payments made over the phone — were not affected, and credit card numbers that were set up to pay automatica­lly should be safe, Silliman said.

The system now is safe to use, officials said.

The breach did not target Wellington specifical­ly but, rather, set its sights on the Click2Gov vendor the village uses to collect online payments. Superion, the soft- ware’s creator, notified Wellington at 2 p.m. June 6 that its servers may have been exposed, and within an hour, the decision was made to shut down the system, Sil- liman said.

Wellington isn’t the first munic i pa l ity to suffer a breach of its Click2Gov system. Numerous communitie­s across the U.S. have reported a similar issue. Lake Worth said in Februarya breach of its Click2Gov system had left its customers exposed, and two California communitie­s reported similar breaches in February and May.

To better understand the breach, Silliman and his team are working with the Sylint Group, a data breach specialist that has worked with other communitie­s where Click2Gov informatio­n has been exposed.

In Wellington’s case, the hackers switched the server into a mode that made the real code invisible, then layered their Bitcoin-mining and credit card-skimming code on top of that. The code would collect batches of credit card numbers, encrypt them and ship them to parts unknown. Then the code would “clean up after itself,” Silliman said. “It was really well-written and, this is Sylint’s term, specifical­ly written for Click2Gov.”

Once Wellington knew the potential severity of the breach, it began building new virtual servers to host its billing system. The new servers have added layers of security beyond what previously existed, Silliman said, declining to elaborate publicly.

There was some hint of Click2Gov’s issues beginning last year, when Wellington received an email from Superion inSeptembe­r and another in October, saying some vulnerabil­ities were possible. Silliman’s team in both cases followed the steps to take care of any issues. Another notificati­on arrived in April, and Wellington followed the same process.

Council members and Silliman expressed frustratio­n with Superion, questionin­g what the company knew and when.

While Superion did not answer specific questions for this article, a spokeswoma­n did send a statement: “Protecting our customers and their clients’ data is of the utmost importance to Superion,” she wrote. “Last year, we reported that a limited number of on-premise clients’ networks were compromise­d. We continue to investigat­e any suspicious activity and have engaged a leading forensic investigat­ion firm to assist in our efforts. We notified Superion customers of this incident, including the Village of Wellington, and are working closely with our customers to swiftly resolve and remediate this matter.”

Newspapers in English

Newspapers from United States