Target customers' card data at risk after store thefts
The information may have been stolen through card devices at Target stores, according to reports
IDG News Service - Credit and debit card information of many Target customers may have been stolen during the Black Friday weekend, according to reports.
The thieves got access to data stored on the magnetic stripe on the back of the credit and debit cards through card swiping devices that could have been tampered with at the retailer's stores, reported the Wall Street Journal on Wednesday, citing people familiar with the matter.
The data on the stripe could be used to make counterfeit cards. If the thieves also intercepted PIN (personal identification number) data for debit transactions, they "would theoretically be able to reproduce stolen debit cards and use them to withdraw cash from ATMs," wrote security news writer Brian Krebs.
Target did not immediately respond to a request for comment.
Millions of cardholders could be vulnerable as a result of the breach that is believed to have affected about 40,000 card devices at store registers, the Journal said, citing people familiar with the incident. The breach extends to nearly all Target locations in the U.S., said Krebs, who quoted unnamed sources at two of the top 10 credit card issuers.
Krebs reported that it was initially thought that the breach extended from just after Thanksgiving 2013 to Dec. 6. But investigators found evidence that the breach lasted longer, possibly as far as Dec. 15, he reported, citing two unnamed sources.
The Secret Service is investigating the breach but would not discuss details of an ongoing investigation , a spokesman told the Wall Street Journal.
A breach of credit card information was reported last year by Global Payments. The payments processing services company said information on up to 1.5 million card numbers may have been "exported" as a result of an unauthorized access into its processing system.
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts