Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security //

Data Leakage

12:17 PM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now

Saks Fifth Avenue, Lord & Taylor Hit With Massive Data Breach

The company behind stores such as Saks Fifth Avenue and Lord & Taylor has sustained a massive data breach that reportedly involves about 5 million credit card numbers.

The company behind such consumer clothing stores as Saks Fifth Avenue and Lord & Taylor is dealing with the fallout of a massive data breach that appears to have involved about 5 million credit card numbers.

Hudson Bay Company, which has corporate offices in Toronto and New York, issued a statement on April 1, acknowledging the data breach, but not offering specifics about how many customers and credit cards have been affected by the breach.

However, Gemini Chief Technology Officer Dmitry Chorine told Reuters that the breach appears to have involved about 5 million credit card numbers and that JokerStash, an online repository for stolen credit card numbers, is preparing to release the data and numbers in the coming days.

(Source: Flickr)
(Source: Flickr)

In statements, Hudson Bay and Saks noted that the breach did not involve online payments on the companies' other digital platforms.

"While the investigation is ongoing, there is no indication that this affects our e-commerce or other digital platforms, Hudson's Bay, Home Outfitters, or HBC Europe. We deeply regret any inconvenience or concern this may cause," according to one statement.

The statements from Saks and Hudson Bay did not offer details about when the breach occurred or why the company announced it on Sunday. However, Saks noted that while the breach involved credit card numbers it did not involve Social Security numbers, driver's license numbers or PINs.

Hudson Bay also noted that it would not hold customers liable for fraudulent charges.

The fundamentals of network security are being redefined -- don't get left in the dark by a DDoS attack! Join us in Austin from May 14-16 at the fifth-annual Big Communications Event. There's still time to register and communications service providers get in free!

While the breach at Saks and Lord & Taylor is significant, it pales in comparison to some of the even larger thefts of credit card numbers that have happened over the last several years.

In 2009, a cybercriminal broke into the network of Heartland Payments Systems and gained access to the information of 130 million credit cards. TJX Companies, TRW/Sears, Home Depot and Target have sustained significant data breaches over the last several years that exposed the information on millions of other credit cards.

Jamil Farshchi, who was hired as the chief information security officer (CISO) at Home Depot following the breach there and helped the big box company recover, has recently been hired at Equifax to help that company to recover from its own massive data breach. (See Equifax Taps Former Home Depot Security Chief as New CISO.)

Related posts:

— Scott Ferguson, is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-01-26
In Bromite through 78.0.3904.130, there are adblock rules in the release APK; therefore, probing which resources are blocked and which aren't can identify the application version and defeat the User-Agent protection mechanism.
PUBLISHED: 2022-01-26
Exposure of Sensitive Information to an Unauthorized Actor in NPM hiep-simple-get prior to 4.0.1.
PUBLISHED: 2022-01-26
The firmware on Moxa TN-5900 devices through 3.1 has a weak algorithm that allows an attacker to defeat an inspection mechanism for integrity protection.
PUBLISHED: 2022-01-26
The firmware on Moxa TN-5900 devices through 3.1 allows command injection that could lead to device damage.
PUBLISHED: 2022-01-26
In Varnish Cache before 6.6.2 and 7.x before 7.0.2, Varnish Cache 6.0 LTS before 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x before 4.1.11r6 and 6.0.x before 6.0.9r4, request smuggling can occur for HTTP/1 connections.