Attacks/Breaches
1/27/2014
11:45 AM
Connect Directly
RSS
E-Mail
50%
50%

Michaels Stores Investigates Data Breach

Arts-and-crafts retailer goes into damage-control mode after banks report fraud possibly tied to shoppers' credit cards.

Top 10 Retail CIO Priorities For 2014
Top 10 Retail CIO Priorities for 2014
(Click image for larger view and slideshow.)

Arts-and-crafts retailer Michaels Stores is the latest business to confirm that it's investigating an apparent hack attack against its systems resulting in the theft of shoppers' credit and debit card details.

"We recently learned of possible fraudulent activity on some US payment cards that had been used at Michaels, suggesting we may have experienced a data security attack," said Michaels CEO Chuck Rubin in a statement Friday.

"Although the investigation is ongoing, based on the information we have received and in light of the widely reported criminal efforts to penetrate the data systems of US retailers, we believe it is appropriate to notify our customers that a potential issue may have occurred," he added. The company also posted a link to the statement -- "Important Notice About Certain Customer Payment Card Information" -- at the top of its website's homepage.

Michaels' statement came just hours after security journalist Brian Krebs first reported that multiple sources in the banking industry said elevated levels of fraud were traced to the accounts of people who shopped at the retailer.

[Are retailers trying to shift the blame? See why one commentator says Target Mocks, Not Helps, Its Data Breach Victims.]

So far, however, Michaels has yet to offer any breach-related details, such as attack timing or the number of cards that may have been compromised. But the retailer did say Friday that it's brought in third-party digital forensic investigators, continues to work with law enforcement agencies, will offer regular updates about the investigation on the Michaels website, and will extend ID theft monitoring to anyone who was affected. "If we find as part of our investigation that any of our customers were affected, we will offer identity protection and credit monitoring services to them at no cost," Rubin said.

Michaels operates more than 1,250 stores in the United States and Canada -- some under the Aaron Brothers name -- and appears to have quickly gone into damage-control mode. Notably, the retailer Saturday began offering a seven-day "40% off any one regular price item" promotion. That fast response could relate to the company's plans to go public this year. According to a related document filed in December with the Securities and Exchange Commission, the retailer booked $4.4 billion in 2012 revenue.

The apparent Michaels breach suggests that the retailer is the latest victim of hackers wielding memory-scraping point-of-sale (POS) malware. Previous victims have included Target, Neiman Marcus, and a handful of other retailers that have yet to disclose that they were breached.

How bad have those breaches been? For starters, the Target breach resulted in the theft of 40 million credit and debit cards used by shoppers in Target's retail stores, as well as personal information on 70 million Target customers. Meanwhile, Neiman Marcus disclosed Thursday that 1.1 million credit and debit cards -- though not PIN codes -- were compromised by hackers during a three-month attack. Those cards were all used by shoppers in its Neiman Marcus and Last Call stores. To date, Discover, MasterCard, and Visa have reported seeing about 2,400 of the stolen payment cards being used for fraudulent purchases.

In the past 10 months, US-CERT, which is part of the Department of Homeland Security, has published three security advisories warning retailers about the increasing threat of POS-malware attacks, as well as how to protect themselves.

In other data breach news, Coca-Cola disclosed Friday that a laptop stolen by a former employee contained personal information -- including social security and driver's license numbers -- on 74,000 current and former employees in North America, including information on about 4,500 contractors and vendors.

Unlike the breaches at Target and Neiman Marcus, however, Coke said its data breach occurred after a former employee stole 55 company laptops over a six-year period. Coke said it recovered the laptops in November and December and began reviewing the 200,000 files collectively stored on the machines for signs of personal information.

Coke found that the exposed personal information had been stored on the laptops in unencrypted form, thus in violation of Coke's data-encryption security policies. The company told The Wall Street Journal that it notified people who were affected by the breach within 45 days, which is the time limit set by states with the most stringent data breach laws.

Mathew Schwartz is a freelance writer, editor, and photographer, as well the InformationWeek information security reporter.

Having a wealth of data is a good thing -- if you can make sense of it. Most companies are challenged with aggregating and analyzing the plethora of data being generated by their security applications and devices. This Dark Reading report, How Existing Security Data Can Help ID Potential Attacks, recommends how to effectively leverage security data in order to make informed decisions and spot areas of vulnerability. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Mathew
50%
50%
Mathew,
User Rank: Apprentice
1/29/2014 | 11:30:31 AM
Re: Promising Career Path

Wait for it, wait for it: Michaels sued over possible data breach.

And yes, "digital forensic investigator" looks like an already hot job prospect that's just going to keep getting hotter.

BobH088
50%
50%
BobH088,
User Rank: Apprentice
1/28/2014 | 1:24:40 PM
data loss
One of the most common causes of data getting in the wrong hands is the loss of mobile devices that often contain a frightening amount of private information. I want to share a protection option that worked for me. Tracer tags let someone who finds your lost stuff contact you directly without exposing your private information.  I use them on almost everything I take when I travel after one of the tags was responsible for getting my lost laptop returned to me in Rome one time. You can get them at mystufflostandfound.com
Ariella
50%
50%
Ariella,
User Rank: Apprentice
1/27/2014 | 3:34:30 PM
Re: Killing debits
@Lorna even before all these huge breaches made the headlines, I was warned that debit cards are not very secure. The only time I ever used one for purchase was by mistake -- the chashier must have entered debit as a default.
D. Henschen
50%
50%
D. Henschen,
User Rank: Apprentice
1/27/2014 | 2:14:01 PM
Promising Career Path
Looking for a promising career path related to the growth of big data and online transactions? Try "digital forensic investigator," as mentioned above. I'm guessing this is a white-hot niche within the already hot, larger category of computer security.
Lorna Garey
50%
50%
Lorna Garey,
User Rank: Ninja
1/27/2014 | 12:44:35 PM
Killing debits
At what point does all this breach news kill the willingness of consumers to enter PIN numbers to use debit cards? I never have done so, and just recently advised several family members to stop using debit.

That will cost banks and retailers -- and ultimately consumers -- money as CCs become the only game in town.  
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7298
Published: 2014-10-24
adsetgroups in Centrify Server Suite 2008 through 2014.1 and Centrify DirectControl 3.x through 4.2.0 on Linux and UNIX allows local users to read arbitrary files with root privileges by leveraging improperly protected setuid functionality.

CVE-2014-8346
Published: 2014-10-24
The Remote Controls feature on Samsung mobile devices does not validate the source of lock-code data received over a network, which makes it easier for remote attackers to cause a denial of service (screen locking with an arbitrary code) by triggering unexpected Find My Mobile network traffic.

CVE-2014-0619
Published: 2014-10-23
Untrusted search path vulnerability in Hamster Free ZIP Archiver 2.0.1.7 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the current working directory.

CVE-2014-2230
Published: 2014-10-23
Open redirect vulnerability in the header function in adclick.php in OpenX 2.8.10 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) dest parameter to adclick.php or (2) _maxdest parameter to ck.php.

CVE-2014-7281
Published: 2014-10-23
Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.