• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Orange reports major cyberattack, warns of service disruptions

 | 

Hackers leak images and comments from women dating safety app Tea

 | 

Pro-Ukraine hacktivists claim cyberattack on Russian Airline Aeroflot that caused the cancellation of +100 flights

 | 

Seychelles Commercial Bank Reported Cybersecurity Incident

 | 

Microsoft uncovers macOS flaw allowing bypass TCC protections and exposing sensitive data

 | 

U.S. CISA adds Cisco ISE and PaperCut NG/MF flaws to its Known Exploited Vulnerabilities catalog

 | 

Critical WordPress Post SMTP plugin flaw exposes 200K+ sites to full takeover

 | 

Scattered Spider targets VMware ESXi in using social engineering

 | 

China-linked group Fire Ant exploits VMware and F5 flaws since early 2025

 | 

Allianz Life data breach exposed the data of most of its 1.4M customers

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 55

 | 

Security Affairs newsletter Round 534 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Law enforcement operations seized BlackSuit ransomware gang’s darknet sites

 | 

Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme

 | 

Operation CargoTalon targets Russia’s aerospace with EAGLET malware,

 | 

Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access

 | 

Koske, a new AI-Generated Linux malware appears in the threat landscape

 | 

Mitel patches critical MiVoice MX-ONE Auth bypass flaw

 | 

Coyote malware is first-ever malware abusing Windows UI Automation

 | 

SonicWall fixed critical flaw in SMA 100 devices exploited in Overstep malware attacks

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Cyber Crime
  • Data Breach
  • Target retailer investigating data breach involving 40M card accounts

Target retailer investigating data breach involving 40M card accounts

Pierluigi Paganini December 20, 2013

US retailer Target is investigating a data breach potentially involving millions of customer credit and debit card data occurred during holiday shopping.

Nearly 40 Million credit and debit card accounts belonging to customers of American retailing company Target may have been stolen during the traditional holiday shopping season.

The news has been provided by the company with a public statement published, all the users who have shopped at Target’s stores during the Black Friday weekend are advised.

“We wanted to make you aware of unauthorized access to Target payment card data. The unauthorized access may impact guests who made credit or debit card purchases in our U.S. stores from Nov. 27 to Dec. 15, 2013.” ” Additionally, Target alerted authorities and financial institutions immediately after we discovered and confirmed the unauthorized access, and we are putting our full resources behind these efforts.” states the advisory.

At risk are all those customers who made purchases by swiping their cards at terminals in the stores of the Target company during the above period.

Credit and debit card numbers are precious commodities sold in the underground, numerous black markets offer them to criminal gangs that need to prepare bogus cards for scams.

Just to provide you an idea of the value of a similar information I report the price list from the study proposed by security experts Stewart from Dell SecureWorks and independent researcher David Shearhave who explored online underground marketplace for stolen data.

Target price list card underground

 

target store

As usual, the excellent Brian Krebs of KrebsOnSecurity produced a detailed description of the events clarifying that the possible victims of the alleged data breach don’t include online shoppers.

Target hasn’t provided further information on the incident, but anyway it has reassured its customers announcing that it has fixed the issue that caused the problem and credit card account holders can continue shopping.

KrebOnSecurity remarked that it’s not clear how many card thieves may have stolen in the breach, but sources from two major card issuers said they have so far been notified by one of the credit card associations regarding more than one million of cards total from both issuers that were thought to have been compromised in the breach.

“A third source at a data breach investigation firm said it appears that “when all is said and done, this one will put its mark up there with some of the largest retail breaches to date.” ” reported Brian Krebs.

This period of the year is very profitable for cyber criminals due to the intensification of shopping activities, due this reason it is necessary to adopt all necessary measures to stay secure.

As suggested in the statement issued by Target it is necessary to “remain vigilant for incidents of fraud and identity theft by regularly reviewing your account statements and monitoring free credit reports” , to early discover ongoing illegal activities.

If users discover any suspicious activity on their accounts it is indispensable to immediately report to law enforcement and financial institutions.

In the specific case, it is suggested to the customers of Target to contact the Federal Trade Commission (“FTC”) or law enforcement to report incidents of identity theft

“To learn more, you can go to the FTC’s Web site, at www.consumer.gov/idtheft, or call the FTC, at (877) IDTHEFT (438-4338) or write to Federal Trade Commission, Consumer Response Center, 600 Pennsylvania Avenue, NW, Washington, DC 20580.”

Just for curiosity it is interesting to highlight that company’s stock was down more than 2 percent in afternoon trading.

The breach appears comparable to the one occurred in 2007 to TJ Maxx parent TJX Companies when sensitive data on 45.7 million credit card accounts was harvested from compromised systems within the retailer’s network.

The TJX company spent years rebuilding its reputation and total damage was estimated to be more than  $256m.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs –  Target, data breach)

[adrotate banner=”5″]

[adrotate banner=”13″]


facebook linkedin twitter

credit card Cybercrime data breach Database Breached fraud Hacking shopping season Target

you might also like

Pierluigi Paganini July 29, 2025
Hackers leak images and comments from women dating safety app Tea
Read more
Pierluigi Paganini July 29, 2025
Seychelles Commercial Bank Reported Cybersecurity Incident
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Orange reports major cyberattack, warns of service disruptions

    Security / July 29, 2025

    Hackers leak images and comments from women dating safety app Tea

    Data Breach / July 29, 2025

    Pro-Ukraine hacktivists claim cyberattack on Russian Airline Aeroflot that caused the cancellation of +100 flights

    Hacktivism / July 29, 2025

    Seychelles Commercial Bank Reported Cybersecurity Incident

    Data Breach / July 29, 2025

    Microsoft uncovers macOS flaw allowing bypass TCC protections and exposing sensitive data

    Hacking / July 29, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT