Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

10/30/2014
12:30 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

NEW: Home Depot breach cost credit unions nearly $60M

Target breach cost credit unions nearly $30 million.

WASHINGTON (10/30/14, UPDATED 11:00 a.m. ET)--The data security breach at Home Depot stores in September cost credit unions nearly $60 million to reissue cards, deal with fraud and cover other costs, according to the results of a new survey of credit unions, released today by the Credit Union National Association.

The Home Depot breach was reported on Sept. 18.

The CUNA survey, which asked credit unions to report the effects of the Home Depot breach, found that 7.2 million credit union debit and credit cards were affected. The survey shows that the cost per card reissued by credit unions was $8.02, which included costs for reissuing, as well as fraud and other costs such as additional staffing, member notification, account monitoring and others).

Conducted from Oct. 1 to Oct. 24, the CUNA survey is the second this year by the nation's largest trade group for credit unions to gauge the impact of data breaches on credit unions.

In January, CUNA conducted a similar survey in the wake of the massive information leak at Target stores in December. That survey found that the Target breach cost credit unions nearly $30 million. The Home Depot breach costs--at $57.4 million nearly twice as much as the Target breach--affected more credit union debit and credit cards and the cost per affected card was considerably higher than even in the Target breach.

Further, the most recent CUNA survey found that, to date, credit unions have not been reimbursed for the costs they incurred as a result of the Target breach. 

"The cost to credit unions of data breaches--which seem to be occurring with increasing regularity--is rising, as the CUNA surveys clearly demonstrate," said CUNA President/CEO Jim Nussle. "The bottom line is that credit union members end up paying the costs--despite the fact that the credit unions they own had nothing to do with causing the breach in the first place."

Nussle added that all participants in the payment process have a shared responsibility to protect consumer data. "However, the law and the incentive structure today allow merchants to abdicate that responsibility, making consumers vulnerable," Nussle said.

"Congress has a role to play in addressing the issue of merchant data breaches by making sure all of the participants are playing by the same set of data security rules, and that merchants who hold consumer data and allow that data to be breached, are responsible for the costs incurred by others.

"Congress must act to protect consumers by taking steps to enhance data security standards for merchants," the credit union leader said.

CUNA Chief Economist Bill Hampel, who conducted the survey, said the results show that more than four in every five (80.1%) of credit unions affected by the breach have reissued or will reissue all affected cards. Nearly one in five (18.5%) will reissue or have selectively reissued cards in response to member requests or other factors. The remainder (1.4%) do not plan to reissue any cards.

"Card reissuance is an expensive proposition, representing about a quarter of the total costs to credit unions of these breaches," Hampel, who is also CUNA chief policy officer, said. "But our latest survey found that fraud is the most expensive component of costs, amounting to $4.89 for each card, or 60% of the total costs."

Credit unions responding to the survey (835 total) have issued a total of 20.1 million cards outstanding, comprised of 14.9 million debit cards and 5.2 million credit cards. The total represents 28.2% of the 53 million debit cards issued by credit unions, 32.5% of the 16 million credit cards outstanding, and 29.2% of the total of 69 million cards outstanding.

Check back here today to see a "Preliminary Results" sheet for additional information.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9398
PUBLISHED: 2020-02-25
ISPConfig before 3.1.15p3, when the undocumented reverse_proxy_panel_allowed=sites option is manually enabled, allows SQL Injection.
CVE-2015-5201
PUBLISHED: 2020-02-25
VDSM and libvirt in Red Hat Enterprise Virtualization Hypervisor (aka RHEV-H) 7-7.x before 7-7.2-20151119.0 and 6-6.x before 6-6.7-20151117.0 as packaged in Red Hat Enterprise Virtualization before 3.5.6 when VSDM is run with -spice disable-ticketing and a VM is suspended and then restored, allows r...
CVE-2019-4000
PUBLISHED: 2020-02-25
Improper neutralization of directives in dynamically evaluated code in Druva inSync Mac OS Client 6.5.0 allows a local, authenticated attacker to execute arbitrary Python expressions with root privileges.
CVE-2015-0565
PUBLISHED: 2020-02-25
NaCl in 2015 allowed the CLFLUSH instruction, making rowhammer attacks possible.
CVE-2020-9393
PUBLISHED: 2020-02-25
An issue was discovered in the pricing-table-by-supsystic plugin before 1.8.2 for WordPress. It allows XSS.