Fidus Information Security are a UK-based penetration and security testing consultancy. Our services are Tiger scheme compliant and CHECK approved, and our specialists are fully CREST, Tiger or Cyber Scheme certified.
To solve real-world security issues
Companies face a broad range of IT threats and security compliance demands. Fidus is here to help them address those concerns with minimal disruption and inconvenience.
To deliver an open, transparent service
IT security is a complex specialism that is constantly evolving with every new technology advance. We work hard to ensure you know what we are doing, and have all the information you need to make informed strategic decisions.
To uphold industry best-practice standards
By applying industry best-practice principles to your IT security, the risk of successful data breaches are reduced. Fidus are CHECK certified, Cyber Scheme and Tiger Scheme, confirming our commitment to these principles.
To help you succeed
IT security breaches have the potential to destroy a business. Fidus services are designed to better protect our clients, and to give them a stable, secure IT infrastructure on which to build and grow.
Founded in 2017, Fidus Information Security provide advanced penetration services to help businesses assess and strengthen their IT security posture. Businesses across the world rely on our team of hand-picked cyber security consultants to think like hackers and act like professionals, exposing and repairing vulnerabilities before they can be exploited by malicious actors.
A sign of our commitment to the highest ethical and quality standards, all of our consultants hold industry recognised certifications, including CREST. Fidus are also members of the TIGER and Cyber scheme, and an approved Cyber Essentials Plus provider. From FTSE100 giants, to smaller businesses, all of our customers receive the same high quality service and advice
We’re here to provide advice and guidance regarding every aspect of your IT security systems, including assistance with achieving industry standard accreditations.
Demonstrating professional excellence
The Fidus team does not take shortcuts. We always apply best practice principles to ensure our clients are fully protected.
Taking our place at the leading edge
The Fidus team is constantly learning and training to ensure that we can keep pace with cybercriminals and new security techniques and technologies.
Delivering results for our customers
We are fully committed to building security frameworks and processes that our customers can rely on.
Honesty, integrity and dependability
By consistently demonstrating personal honesty, integrity and dependability, our team can build long-term relationships with our clients.
Penetration testing reveals your most sensitive network vulnerabilities – so you need a partner you can trust. Fidus Information Security are an NCSC CHECK Green Light and TIGER scheme approved consultancy. Our cyber security experts hold some of the most recognised certifications in the industry, including CREST Certified Tester and Senior Security Tester. Fidus is also a Cyber Essentials verified company. Every assessment we perform is carried out according to UK industry approved methodologies (OWASP, PETS, NIST) along with our own internal testing frameworks.
More than just identifying security vulnerabilities, our cyber security experts are on hand to help you fix them too.
Certified Security Consultants
Our CREST and TIGER approved team holds a range of industry-leading security certifications including OSCP, CCT, SST and CISSP
Easy to Understand Reports
We’ll ensure that your executives and technical teams properly understand our assessment findings using plain-English reporting.
Fixed Price Proposals
The price you’re quoted is the price you’ll pay. Our quotes are broken down into a detailed costing table so you know exactly what to expect.
Other approaches we've witnessed have included convoluted steps and commonly ends with incorrect information being handed to the consultant assigned to the engagement.
Our approach to security involves a qualified security consultant through the entire process to ensure quality, accuracy and consistency.
“Andrew Mabbitt, founder of U.K. cyber security firm Fidus Information Security, first discovered and disclosed the remote code execution bug to TP-Link in October 2017.…“
“ Andrew Mabbitt, founder of cyber security company Fidus Information Security and who originally flagged the issue to Motherboard, said. Kurtis Baron from Fidus also worked on.… “
“ However, an analysis of the site’s payment processing by security firm Fidus suggests there is a brief window “in which malicious code is able to siphon credit card details before the data is encrypted… “
“ U.K.-based cyber security company Fidus Information Security then detailed some security failings on the site. After an investigation and a temporary block enforced on credit card… “
“ The staggering security breach was uncovered by researchers at British cyber security firm Fidus Information Security, who have published a report about their astonishing findings… “
Recently members of the Fidus team noticed an interesting blog post on the OnePlus forum by an individual discussing recent fraudulent attempts made on two of their credit cards. The forum user states that the only place both cards were used was on the OnePlus website in November 2017, they go on to ask whether other members of the community have had the same issue (spoiler:they had). OnePlus are currently using the Magento eCommerce platform, which is a common platform in which credit card hacking takes place.
These findings do not confirm OnePlus have suffered a breach. Instead, they look into the current structure of the payment flow and how it could have been achieved.
A further update has been posted at the bottom of this blog post.
We stepped through the payment process on the OnePlus website to have a look what was going on. Interestingly enough, the payment page which requests the customer’s card details is hosted ON-SITE. This means all payment details entered, albeit briefly, flow through the OnePlus website and can be intercepted by an attacker. Whilst the payment details are sent off to a third-party provider upon form submission, there is a window in which malicious code is able to siphon credit card details before the data is encrypted.
Straight away there are two issues that stand out:
Credit card fraud is not new to the Magento eCommerce platform. Sucuri blogged about this very issue back in 2015.
The other method commonly used by attackers, as described in the Sucuri blog, is modification of the app/code/core/Mage/Payment/Model/Method/Cc.php file. This method requires shell access to the server and indicates a serious compromise.
The Cc.php file handles the saving of card details on the eCommerce website. Regardless if card details are actually saved or not, the file is called regardless. Attackers are able to place code within this file which allows for payment details to be compromised and sent to an off-site location controlled by the attacker. Since this takes place within the prepareSave() function within Cc.php, the card details are not yet encrypted and are at risk. An example of malicious code can be seen below:
The below image highlights exactly where an attacker is able to compromise raw credit card data.
As it stands, the poll on the OnePlus forum regarding affected users has over 39 users complaining of recent fraudulent attempt. Numerous users of Reddit have also complained of the same issue.
Users of twitter have also started to question this potential issue.
The safest option to prevent credit card fraud is to use an OFF-SITE payment processor, or a processor who offers iFrame integration with checkout pages. Third-party payment providers have created PCI compliant sandboxes for the very purpose of securely taking card payments; utilise it.
Furthermore, it is highly recommended to conduct regular penetration testing assessments against your eCommerce websites to highlight any security risks.
Upon further review of the payment system, it should be noted that OnePlus are currently making use of the CyberSource Magento add-on, as can be seen below.
CyberSource note on their Magento marketplace page that all data submission is done within the client’s browser and never touches the eCommerce infrastructure (Fidus do not currently have an environment to test this statement).
If this is true, this leaves 2 potential avenues for attack and rules out the Cc.php theory:
It is also worth noting CyberSource have a statement within their Data Sheet PDF which states:
Secure Acceptance Silent Order POST limits your exposure to payment data, which reduces your PCI DSS scope, because many of the controls may no longer be applicable. For certain businesses, this can mean having to complete the PCI-DSS Self-Assessment Questionnaire (SAQ) versus a full scale audit. No payment solution, however, negates the need to validate compliance. You should consult with your acquiring bank to uate the level compliance required for your organization.
An update posted on the OnePlus website and an e-mail sent out to affected customers has confirmed a breach did occur and 40,000 customers had their payment details stolen.