NexusFi: Find Your Edge


Home Menu

 





AMP Trading data breach (70 gigs, ~100k files - customer data)


Discussion in Brokers

Updated
      Top Posters
    1. looks_one Big Mike with 9 posts (30 thanks)
    2. looks_two xplorer with 7 posts (5 thanks)
    3. looks_3 samsin78626 with 5 posts (0 thanks)
    4. looks_4 DeliberatingDinos with 4 posts (2 thanks)
      Best Posters
    1. looks_one Jigsaw Trading with 5 thanks per post
    2. looks_two Big Mike with 3.3 thanks per post
    3. looks_3 mattz with 3 thanks per post
    4. looks_4 rleplae with 3 thanks per post
    1. trending_up 29,652 views
    2. thumb_up 69 thanks given
    3. group 23 followers
    1. forum 54 posts
    2. attach_file 1 attachments




 
Search this Thread

AMP Trading data breach (70 gigs, ~100k files - customer data)

  #41 (permalink)
 
Jigsaw Trading's Avatar
 Jigsaw Trading  Jigsaw Trading is an official Site Sponsor
 
Posts: 2,988 since Nov 2010
Thanks Given: 831
Thanks Received: 10,393


trystanj View Post
I agree absolutely. It shows their utter contempt towards their retail customers and security.

Not really.

If there is a hole found in your security - it makes sense to ensure it is plugged before you alert people.

If the hole is still there - announcing it is INVITING more people to exploit it.

If you have any questions about the products or services provided, please send me a Private Message or use the futures.io " Ask Me Anything" thread
Visit my NexusFi Trade Journal Reply With Quote

Can you help answer these questions
from other members on NexusFi?
Better Renko Gaps
The Elite Circle
Increase in trading performance by 75%
The Elite Circle
NT7 Indicator Script Troubleshooting - Camarilla Pivots
NinjaTrader
Exit Strategy
NinjaTrader
Trade idea based off three indicators.
Traders Hideout
 
Best Threads (Most Thanked)
in the last 7 days on NexusFi
Diary of a simple price action trader
26 thanks
Just another trading journal: PA, Wyckoff & Trends
25 thanks
Tao te Trade: way of the WLD
23 thanks
My NQ Trading Journal
16 thanks
HumbleTraders next chapter
9 thanks
  #42 (permalink)
 
Heph333's Avatar
 Heph333 
Springfield, MO/USA
 
Experience: Advanced
Platform: Jigsaw
Broker: AMP CQG
Trading: ZN, ZB
Posts: 43 since Oct 2009
Thanks Given: 49
Thanks Received: 88

I guess the real question remains: has their customers data been comprimised? Or was the vulnerability found and repaired first?

Sent using the NexusFi mobile app

Follow me on Twitter Reply With Quote
Thanked by:
  #43 (permalink)
 
samsin78626's Avatar
 samsin78626 
Georgetown, TX/USA
 
Experience: Intermediate
Platform: Ninja Trader
Broker: Ninja Trader/EQG
Trading: Emini ES, Crude CL, NQ
Posts: 6 since Jul 2015
Thanks Given: 17
Thanks Received: 1



Heph333 View Post
I guess the real question remains: has their customers data been comprimised? Or was the vulnerability found and repaired first?

Sent using the NexusFi mobile app

Or did it happen at all?

Reply With Quote
  #44 (permalink)
 
Heph333's Avatar
 Heph333 
Springfield, MO/USA
 
Experience: Advanced
Platform: Jigsaw
Broker: AMP CQG
Trading: ZN, ZB
Posts: 43 since Oct 2009
Thanks Given: 49
Thanks Received: 88

I think this raises bigger issues. Like the need to stop using social security numbers as an I. D. outside of government purposes.

Sent using the NexusFi mobile app

Follow me on Twitter Reply With Quote
Thanked by:
  #45 (permalink)
 
xplorer's Avatar
 xplorer 
London UK
Site Moderator
 
Experience: Beginner
Platform: CQG
Broker: S5
Trading: Futures
Posts: 5,969 since Sep 2015
Thanks Given: 15,475
Thanks Received: 15,367


Heph333 View Post
I think this raises bigger issues. Like the need to stop using social security numbers as an I. D. outside of government purposes.

I don't think the problem is about what kind of documentation to use to authenticate identities. Sometimes an organization requires a specific document type for operational reasons and there's little recourse to that.

I believe the issue has to do with leaving sensitive data such as passport scans or social security numbers unencrypted.


My two cents.

Reply With Quote
Thanked by:
  #46 (permalink)
 trystanj 
Alicante Spain
 
Experience: Intermediate
Platform: NinjaTrader
Trading: ZW, ZS, ZC
Posts: 4 since Dec 2013
Thanks Given: 6
Thanks Received: 3


DionysusToast View Post
Not really.

If there is a hole found in your security - it makes sense to ensure it is plugged before you alert people.

If the hole is still there - announcing it is INVITING more people to exploit it.

Thanks for your comments Pete. I agree with what you're saying. I think we are on a different page here though. There seems to have been a bit of conflict over whether the info has been made public on the net or if the vulnerability had been patched before customers were alerted as well as whether the info was in plain text as initially indicated or encrypted as per AMP's notice. I may have been a bit presumptive as to what the situation was early on.

I understand that there will always be vulnerabilities in software and hardware. There always has been. But my point really is why many of these companies it seems stores so much of our sensitive information unencrypted. Maybe I'm making assumptions again. Maybe I'm just a little cynical. Perhaps it comes down to a commercial decision, ie adding added layers of complexity and cost. I guess being in the vendor game yourself you would have a better insight than most.

Reply With Quote
  #47 (permalink)
 
Scalpguy's Avatar
 Scalpguy 
Helsinki, Finland
 
Experience: Advanced
Platform: SC and TWS
Broker: IB and AMP/CQG
Trading: ES, CL
Posts: 206 since Jul 2010
Thanks Given: 17
Thanks Received: 166


xplorer View Post
It may be that they are using a distribution list service to send these emails. Most companies with a large audience do that nowadays.
If that's the case, it's nothing to worry about.

I got an answer from AMP and this was the case. Still I think it was not their intention to use these "dubbed" links becuase they generate security alerts in customer end.

So no phishing here and it looks everything was ok.

It takes nothing to be a Pig
Reply With Quote
  #48 (permalink)
 
dakine's Avatar
 dakine 
Volcano, HI
 
Experience: None
Platform: Ninja
Broker: AMP/CQG
Trading: Futura2000
Posts: 200 since Dec 2009
Thanks Given: 389
Thanks Received: 166

I'm an AMP customer and haven't received this email. Anyone else?

Reply With Quote
  #49 (permalink)
 
stoicbuddha's Avatar
 stoicbuddha 
Seattle, WA
 
Experience: Intermediate
Platform: NinjaTrader 8
Broker: AMP/CQG
Trading: Indices
Frequency: Every few days
Duration: Minutes
Posts: 96 since Feb 2012
Thanks Given: 1,038
Thanks Received: 96


dakine View Post
I'm an AMP customer and haven't received this email. Anyone else?


Me neither!

Our life is our own today. Tomorrow you will be dust, a shade, a tale that is told. Live mindful of death, the hour flies.
Visit my NexusFi Trade Journal Reply With Quote
  #50 (permalink)
 Hood 
London
 
Experience: Beginner
Platform: Ninjatrader
Trading: FGBL, CL
Posts: 31 since Jan 2014
Thanks Given: 8
Thanks Received: 15


"
We are sending you this email as an update following the notice we sent to you on April 28, 2017 (available here: https://clients.ampfutures.com/notice-customer-data-incident-report) in order to keep you abreast of the most recent developments.

As you were informed in that notice, a well-known Cybersecurity research company had reached out to us to alert us about a possible vulnerability in one in-house back-up file storage server. There was only one server of this type on our network and only this server has an apparently open design flaw. Since AMP had not authorized anyone else’s entry into its systems, we took immediate steps to secure our customers data. We took care to follow our Cybersecurity procedures which have previously been reviewed by our industry regulators as well as federal government agencies.

AMP has confirmed that no one other than the research company accessed the database:

Due to the nature of the access, AMP has been able to determine only one instance of outside access to the server through a thorough examination of the server logs. This access was traced directly to the point the security firm contacted AMP. The backdoor this research company exposed is an app that allows access to the server. This access leaves a definitive trace log, and is the only way into the server without authorization. AMP’s IT providers studied the trace logs and confirmed there was only one access that was unaccounted for, which was the research company’s activity. Hence, we have an account of all of the traffic to the server. At no point prior to the research company gaining access did any other entry occur. Therefore, we can say with certainty that only the research company’s access was successful, and hence our customer data was not accessed by anyone else.

The contents of the database that the research company was able to access:

The database that this research company was able to access includes but is not limited to account opening documentation done on paper only, of accounts that opened before October 2010 and 1099 tax documents of US customers from 2015 and before, which qualifies as Personal Identifying Information. However, we have been reassured that this research company has taken steps to keep the data secure and encrypted. The research company has stated that they are working with the SEC and will follow instructions from them regarding the fate of the data they were able to access. AMP is working with federal authorities to ensure that our customer data is safe and secure and will not be used for unlawful purposes such as identity theft.

Data is not accessible to the public

We have no evidence that suggests that personal information accessed by the research company from the database has been or will be used to commit identity theft. On the contrary, it is our belief that this research company is on a mission to make the world of cyberspace a safer place. To be clear, that access was limited to our back-up file storage server, that has a design flaw which the research company knows and understands well. We took their guidance as well as our own IT providers to block access to the server and take it off line. There was no access to the AMP Customer Portal, Customer funds, and no access to any of the trading platforms networks.

Subsequent actions by AMP

The access into the back-up file storage server was quickly determined and that access blocked, and very soon thereafter we decommissioned the accessed server altogether. We have also taken steps to implement end-to-end encryption on all of AMP’s housed data, for all data both in transit and at rest.

AMP has been in contact with various federal agencies as well as our regulators, and is working under their guidance, along with the research company to ensure the safety of our customer data.

AMP continues to be alert and monitor for evidence of identity theft. We will continue to provide alerts throughout this process if any further circumstances arise.

Additional precautions

As always, we encourage you to remain alert in guarding your personal information, regularly review your account statements and monitor your credit activity from the major reporting agencies. You may change your password to your portal and trading platform as an additional precaution, change your passwords for other online accounts for which you use the same password, and take any other steps that you may deem appropriate to safeguard your personal information online."

Reply With Quote
Thanked by:




Last Updated on May 31, 2018


© 2024 NexusFi™, s.a., All Rights Reserved.
Av Ricardo J. Alfaro, Century Tower, Panama City, Panama, Ph: +507 833-9432 (Panama and Intl), +1 888-312-3001 (USA and Canada)
All information is for educational use only and is not investment advice. There is a substantial risk of loss in trading commodity futures, stocks, options and foreign exchange products. Past performance is not indicative of future results.
About Us - Contact Us - Site Rules, Acceptable Use, and Terms and Conditions - Privacy Policy - Downloads - Top
no new posts