Feeds

Hacked to the TK Maxx

Retail chain warns of credit card security breach

High performance access to file storage

TJX, the multi-national which operates the popular clothing store TK Maxx in the UK, is warning its customers that computer systems involved in processing credit card transactions have been broken into by hackers.

The discount retailer discovered the intrusion, which remains under investigation, in mid-December. The breach involved systems handling debit and credit card transactions as well as cheque purchases and refunds involving its TJ Maxx, Marshalls, HomeGoods and A J Wright stores in the US and Puerto Rico; and its Winners and HomeSense stores in Canada.

How many customer records might have been exposed by the attack or the value of financial losses sustained as a result of the assault is unknown, Reuters reports.

Although the extent of the attack remains clear concerns centres around the records of customer transactions made in stores in the US, Canada and Puerto Rico between January 2003 and December 2006. There's also concern UK and Irish customers of the retailer might be affected.

In a statement, TJX CEO Ben Cammarata apologised for any alarm or inconvenience the attack might have caused it customers while promising that the firm is pulling out all the stops to prevent a repetition of the attack. "We have promptly alerted law enforcement authorities and an investigation is underway. We have also engaged two of the very best computer security experts to help us strengthen the security of our systems in order to prevent this from happening again and we believe customers should feel safe shopping in our stores," he said.

TJX has set up a help-line to service queries from concerned customers which can be reached by phoning 866 484 6978 in the US, 866-903-1408 in Canada and 0800 779 015 in the UK and Ireland.

Jamie Cowper at data security expert PGP Corporation said the attack illustrated the need to apply technologies such as encryption to safeguard customer records.

"This is a frightening illustration that when retailer systems are hacked - even if it occurs on the other side of the world - the card details of customers in every country are at risk because of the way companies share and store information globally.

"With standards such as the Payment Card Industry Data Security Standard (PCI DSS) coming into force in June 2007, retailers such as TJX will have to safeguard its customers' card information - or face losing their credit card facilities altogether," he added. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Bad PUPPY: Undead Windows XP deposits fresh scamware on lawn
Installing random interwebs shiz will bork your zombie box
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.