Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security //

Data Leakage

// // //
12:17 PM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now

Saks Fifth Avenue, Lord & Taylor Hit With Massive Data Breach

The company behind stores such as Saks Fifth Avenue and Lord & Taylor has sustained a massive data breach that reportedly involves about 5 million credit card numbers.

The company behind such consumer clothing stores as Saks Fifth Avenue and Lord & Taylor is dealing with the fallout of a massive data breach that appears to have involved about 5 million credit card numbers.

Hudson Bay Company, which has corporate offices in Toronto and New York, issued a statement on April 1, acknowledging the data breach, but not offering specifics about how many customers and credit cards have been affected by the breach.

However, Gemini Chief Technology Officer Dmitry Chorine told Reuters that the breach appears to have involved about 5 million credit card numbers and that JokerStash, an online repository for stolen credit card numbers, is preparing to release the data and numbers in the coming days.

(Source: Flickr)
(Source: Flickr)

In statements, Hudson Bay and Saks noted that the breach did not involve online payments on the companies' other digital platforms.

"While the investigation is ongoing, there is no indication that this affects our e-commerce or other digital platforms, Hudson's Bay, Home Outfitters, or HBC Europe. We deeply regret any inconvenience or concern this may cause," according to one statement.

The statements from Saks and Hudson Bay did not offer details about when the breach occurred or why the company announced it on Sunday. However, Saks noted that while the breach involved credit card numbers it did not involve Social Security numbers, driver's license numbers or PINs.

Hudson Bay also noted that it would not hold customers liable for fraudulent charges.

The fundamentals of network security are being redefined -- don't get left in the dark by a DDoS attack! Join us in Austin from May 14-16 at the fifth-annual Big Communications Event. There's still time to register and communications service providers get in free!

While the breach at Saks and Lord & Taylor is significant, it pales in comparison to some of the even larger thefts of credit card numbers that have happened over the last several years.

In 2009, a cybercriminal broke into the network of Heartland Payments Systems and gained access to the information of 130 million credit cards. TJX Companies, TRW/Sears, Home Depot and Target have sustained significant data breaches over the last several years that exposed the information on millions of other credit cards.

Jamil Farshchi, who was hired as the chief information security officer (CISO) at Home Depot following the breach there and helped the big box company recover, has recently been hired at Equifax to help that company to recover from its own massive data breach. (See Equifax Taps Former Home Depot Security Chief as New CISO.)

Related posts:

— Scott Ferguson, is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Machine Learning, AI & Deep Learning Improve Cybersecurity
Machine intelligence is influencing all aspects of cybersecurity. Organizations are implementing AI-based security to analyze event data using ML models that identify attack patterns and increase automation. Before security teams can take advantage of AI and ML tools, they need to know what is possible. This report covers: -How to assess the vendor's AI/ML claims -Defining success criteria for AI/ML implementations -Challenges when implementing AI
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-09-24
The secp256k1-js package before 1.1.0 for Node.js implements ECDSA without required r and s validation, leading to signature forgery.
PUBLISHED: 2022-09-24
Nepxion Discovery is a solution for Spring Cloud. Discover is vulnerable to SpEL Injection in discovery-commons. DiscoveryExpressionResolver’s eval method is evaluating expression with a StandardEvaluationContext, allowing the expression to reach and interact with Java classes suc...
PUBLISHED: 2022-09-24
Nepxion Discovery is a solution for Spring Cloud. Discovery is vulnerable to a potential Server-Side Request Forgery (SSRF). RouterResourceImpl uses RestTemplate’s getForEntity to retrieve the contents of a URL containing user-controlled input, potentially resulting in Information...
PUBLISHED: 2022-09-24
Jodit Editor is a WYSIWYG editor written in pure TypeScript without the use of additional libraries. Jodit Editor is vulnerable to XSS attacks when pasting specially constructed input. This issue has not been fully patched. There are no known workarounds.
PUBLISHED: 2022-09-24
Besu is a Java-based Ethereum client. In versions newer than 22.1.3 and prior to 22.7.1, Besu is subject to an Incorrect Conversion between Numeric Types. An error in 32 bit signed and unsigned types in the calculation of available gas in the CALL operations (including DELEGATECALL) results in incor...