Endpoint
1/28/2014
07:28 AM
Tim Wilson
Tim Wilson
Quick Hits
50%
50%

Secret Service Investigating Breach At Michael's Retail Chain

Retail giant Michael's still has not disclosed source or scope of breach; Secret Service called in

After reporting a major breach on Saturday, the Michael's retail craft store chain still has not revealed the source or scope of a data breach that could affect many of its customers.

In a media alert posted on its website (PDF), Michael's reported that "possible fraudulent activity" had occurred on some U.S. credit cards that had been used at its stores, "suggesting that the company may have experienced a data security attack."

The company is working with federal law enforcement agencies, according to the statement. A report by the Washington Post says the Secret Service has confirmed it is investigating the incident.

"We are concerned there may have been a data security attack on Michaels that may have affected our customers' payment card information and we are taking aggressive action to determine the nature and scope of the issue," said Chuck Rubin, CEO of Michael's, said in the Web statement. "While we have not confirmed a compromise to our systems, we believe it is in the best interest of our customers to alert them to this potential issue so they can take steps to protect themselves, for example, by reviewing their payment card account statements for unauthorized charges."

Michael's did not offer any details on how many customers might have been affected, and it did not provide any information on the source or nature of the breach. The company did experience a compromise of its point-of-sale systems in 2011, and such systems are also suspected in the recent breach of customer data at the Target retail chain.

Experts said the recent breaches at retail chains such as Target, Neiman-Marcus, and Michael's could continue unless retailers do some major rethinking of their security defenses.

"All indications at this point are that Target, Neiman Marcus, and Michael's aren't the only retailers that may have experienced a serious breach late last year, and I expect a number of others will come forward in the coming weeks," says Dmitri Alperovitch, CTO and co-Founder of threat intelligence company CrowdStrike. "CrowdStrike is currently working with a number of retail companies to evaluate their networks for signs of possible breach, and provide them with intelligence on how the attacks were conducted and how they can be discovered and mitigated."

"The continued point-of-sale breaches, regardless of which retailer -- Michael's, Neiman Marcus, Target, or others -- indicates a common threat vector," says Bala Venkat, chief marketing officer at application security vendor Cenzic.

"These POS systems and the back-office systems that reside at remote stores are often resource-constrained," Venkat observes. "While improperly configured remote access technologies could contribute, oftentimes the environment these retailers operate with is not well-suited to downloading and installing patches for core operating systems, critical applications, or anti-malware controls. Unless retailers start immediately putting serious security controls into their POS systems, we're bound to see more breaches of this nature."

W. Hord Tipton, executive director at security professional association (ISC)2, agreed that retailers should be rethinking the payment technologies they use today.

"Outside of the U.S., many countries have adopted EMV smart card technology as a countermeasure to thwart fraud," Tipton observes. "Unless the U.S. follows suit and takes swifter action to secure payment transactions by retiring old-school magnetic stripe cards and moving toward a more secure chip and pin method, we will continue to see more breaches and public outcry."

But Lucas Zaichowsky, enterprise defense architect at incident response company AccessData, notes there is no clear evidence to suggest any commonality between the three major retail breaches.

"Much of the speculation out there as of now is unfounded and incredibly off-base," Zaichowsky says. "Merchant breaches happen daily. It's not as though there's an atypical wave of attacks going on. Historically, most breaches haven't ended up in the news because they're narrowly limited to a single merchant location, and there isn't much public interest nationally. However, the public is currently in a state of hypersensitivity surrounding the topic of card data theft because of the massive Target breach."

Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5395
Published: 2014-11-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Huawei HiLink E3276 and E3236 TCPU before V200R002B470D13SP00C00 and WebUI before V100R007B100D03SP01C03, E5180s-22 before 21.270.21.00.00, and E586Bs-2 before 21.322.10.00.889 allow remote attackers to hijack the authentication of users ...

CVE-2014-7137
Published: 2014-11-21
Multiple SQL injection vulnerabilities in Dolibarr ERP/CRM before 3.6.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) contactid parameter in an addcontact action, (2) ligne parameter in a swapstatut action, or (3) project_ref parameter to projet/tasks/contact.php; (4...

CVE-2014-7871
Published: 2014-11-21
SQL injection vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev36 and 7.6.x before 7.6.0-rev23 allows remote authenticated users to execute arbitrary SQL commands via a crafted jslob API call.

CVE-2014-8090
Published: 2014-11-21
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nes...

CVE-2014-8469
Published: 2014-11-21
Cross-site scripting (XSS) vulnerability in Guests/Boots in AdminCP in Moxi9 PHPFox before 4 Beta allows remote attackers to inject arbitrary web script or HTML via the User-Agent header.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?