Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 28 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

More US payment cards compromised, as Kmart next to investigate

by The Gurus
October 13, 2014
in Editor's News
Share on FacebookShare on Twitter

US retailer Kmart has admitted some customer payment cards have been compromised after it discovered that point of sale systems had been breached.
 
While investigations are ongoing, initial indications are that the infections had started early last month. In a statement, Kmart president and chief member officer Alasdair James said that the retailer is working closely with federal law enforcement authorities, its banking partners and security experts in an ongoing investigation.
 
He said that the IT team detected the breach last Thursday and found that the payment data systems at Kmart stores were purposely infected with a new form of malware which resulted in debit and credit card numbers being compromised.
 
“Based on the forensic investigation to date, no personal information, no debit card PIN numbers, no email addresses and no social security numbers were obtained by those criminally responsible,” he said.
 
“There is also no evidence that Kmart customers were impacted. This data breach has been contained and the malware has been removed. I sincerely apologise for any inconvenience this may cause our members and customers.”
 
Adam Kujawa, head of Malware Intelligence at Malwarebytes Labs, said: “Every large chain organisation should be doing everything they can to revamp their security procedures on their financial systems and hopefully avoid attacks against their customers. Those who haven’t can feel with a good amount of certainty that they will be next and those who have beefed up security but have already been attacked we will most likely hear about in the coming weeks.”
 
Craig Young, security researcher at Tripwire, said: “Although Kmart is indicating PINs or general customer data have not been compromised in this attack, it does appear that track 2 data has been stolen. In laymen’s terms, this means that the hackers made off with just enough information to complete a transaction.
 
“This data can be used to print a fake card and purchase high-priced items. Merchandise from these purchases is resold in a number of ways including underground markets which rely on the TOR network for anonymity.”
 

FacebookTweetLinkedIn
Tags: BreachKmartPayment CardUS
ShareTweetShare
Previous Post

North Korea expands to 6,000 offensive cyber agents

Next Post

Snowden – Abandon Dropbox for more secure alternatives

Recent News

Blue Logo OUTPOST24

New Research Examines Traffers and the Business of Stolen Credentials

March 28, 2023

How to Succeed As a New Chief Information Security Officer (CISO)

March 28, 2023

The Importance of Data Security and Privacy for Individuals and Businesses in the Digital Age

March 28, 2023
penetration testing

Cymulate’s 2022 Cybersecurity Effectiveness Report reveals that organizations are leaving common attack paths exposed

March 28, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information