Feeds

TJX security breach fears grow

How deep does the rabbit-hole go?

Choosing a cloud hosting partner with confidence

TJX, the US retailing giant,says a hacker intrusion against its credit card transaction processing system is more serious than first reported.

The breach, detected in December 2006, affected systems handling debit and credit card transactions as well as cheque purchases and refunds at the company's TJ Maxx, Marshalls, HomeGoods and A J Wright stores in the US and Puerto Rico; and its Winners and HomeSense stores in Canada.

Last month, TJX said the intrusion took place between May 2006 to January 2007. The firm now reckons attacks date back to July 2005 and involve transactions up to June 2004 - previously, it thought they were confined to 2003. It still maintains names and addresses were not included with the credit and debit card data reckoned to have been compromised. But It's beginning to look more likely that some of the chain's customers in the UK and Ireland, the retailer operates the popular clothing store TK Maxx, may have been put at risk. TJX’s investigators have found evidence of an intrusion to the portion of its computer system that processes T.K. Maxx customer transactions.

TJX now reckons a number of drivers' license numbers together with related names and addresses were also compromised. This data relates to receipted merchandise returns at its T.J. Maxx, Marshalls, and HomeGoods stores in the US and Puerto Rico for the last four months of 2003 and May and June 2004. TJX intends to write to customers in this category, warning that their details might have been exposed.

TJX has hired a team of 50 security consultants to investigate the breach. But the number of customer records that might have been exposed by the attack and the value of financial losses sustained as a result of the assault is still unknown. TJX has taken a $5m charge to cover the investigation, legal fees and costs associated with explaining the problem to its customers. But it has not made any contingencies for legal penalties or restitution that it could be foreced to make.

An update on TJX's investigation can be found in a press release here.

The update on the hacking investigation came on Wednesday as TJX announced its annual financial results. TJX's sales for the year were $17.4bn, a nine per cent increase over last year, with net income of $738,000. ®

Internet Security Threat Report 2014

More from The Register

next story
FYI: OS X Yosemite's Spotlight tells Apple EVERYTHING you're looking for
It's on by default – didn't you read the small print?
Russian hackers exploit 'Sandworm' bug 'to spy on NATO, EU PCs'
Fix imminent from Microsoft for Vista, Server 2008, other stuff
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
Microsoft pulls another dodgy patch
Redmond makes a hash of hashing add-on
NOT OK GOOGLE: Android images can conceal code
It's been fixed, but hordes won't have applied the upgrade
Apple grapple: Congress kills FBI's Cupertino crypto kybosh plan
Encryption would lead us all into a 'dark place', claim G-Men
'LulzSec leader Aush0k' found to be naughty boy not worthy of jail
15 months home detention leaves egg on feds' faces as they grab for more power
China is ALREADY spying on Apple iCloud users, claims watchdog
Attack harvests users' info at iPhone 6 launch
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.