Cyber Crime

Target retailer investigating data breach involving 40M card accounts

US retailer Target is investigating a data breach potentially involving millions of customer credit and debit card data occurred during holiday shopping.

Nearly 40 Million credit and debit card accounts belonging to customers of American retailing company Target may have been stolen during the traditional holiday shopping season.

The news has been provided by the company with a public statement published, all the users who have shopped at Target’s stores during the Black Friday weekend are advised.

“We wanted to make you aware of unauthorized access to Target payment card data. The unauthorized access may impact guests who made credit or debit card purchases in our U.S. stores from Nov. 27 to Dec. 15, 2013.” ” Additionally, Target alerted authorities and financial institutions immediately after we discovered and confirmed the unauthorized access, and we are putting our full resources behind these efforts.” states the advisory.

At risk are all those customers who made purchases by swiping their cards at terminals in the stores of the Target company during the above period.

Credit and debit card numbers are precious commodities sold in the underground, numerous black markets offer them to criminal gangs that need to prepare bogus cards for scams.

Just to provide you an idea of the value of a similar information I report the price list from the study proposed by security experts Stewart from Dell SecureWorks and independent researcher David Shearhave who explored online underground marketplace for stolen data.

 

As usual, the excellent Brian Krebs of KrebsOnSecurity produced a detailed description of the events clarifying that the possible victims of the alleged data breach don’t include online shoppers.

Target hasn’t provided further information on the incident, but anyway it has reassured its customers announcing that it has fixed the issue that caused the problem and credit card account holders can continue shopping.

KrebOnSecurity remarked that it’s not clear how many card thieves may have stolen in the breach, but sources from two major card issuers said they have so far been notified by one of the credit card associations regarding more than one million of cards total from both issuers that were thought to have been compromised in the breach.

“A third source at a data breach investigation firm said it appears that “when all is said and done, this one will put its mark up there with some of the largest retail breaches to date.” ” reported Brian Krebs.

This period of the year is very profitable for cyber criminals due to the intensification of shopping activities, due this reason it is necessary to adopt all necessary measures to stay secure.

As suggested in the statement issued by Target it is necessary to “remain vigilant for incidents of fraud and identity theft by regularly reviewing your account statements and monitoring free credit reports” , to early discover ongoing illegal activities.

If users discover any suspicious activity on their accounts it is indispensable to immediately report to law enforcement and financial institutions.

In the specific case, it is suggested to the customers of Target to contact the Federal Trade Commission (“FTC”) or law enforcement to report incidents of identity theft

“To learn more, you can go to the FTC’s Web site, at www.consumer.gov/idtheft, or call the FTC, at (877) IDTHEFT (438-4338) or write to Federal Trade Commission, Consumer Response Center, 600 Pennsylvania Avenue, NW, Washington, DC 20580.”

Just for curiosity it is interesting to highlight that company’s stock was down more than 2 percent in afternoon trading.

The breach appears comparable to the one occurred in 2007 to TJ Maxx parent TJX Companies when sensitive data on 45.7 million credit card accounts was harvested from compromised systems within the retailer’s network.

The TJX company spent years rebuilding its reputation and total damage was estimated to be more than  $256m.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs –  Target, data breach)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks

Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…

9 hours ago

Hackers hijacked the eScan Antivirus update mechanism in malware campaign

A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute…

16 hours ago

US offers a $10 million reward for information on four Iranian nationals

The Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned four Iranian nationals for their…

23 hours ago

The street lights in Leicester City cannot be turned off due to a cyber attack

A cyber attack on Leicester City Council resulted in certain street lights remaining illuminated all…

23 hours ago

North Korea-linked APT groups target South Korean defense contractors

The National Police Agency in South Korea warns that North Korea-linked threat actors are targeting…

1 day ago

U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activity

The U.S. Department of State imposed visa restrictions on 13 individuals allegedly linked to the…

2 days ago

This website uses cookies.