Feeds

Hannaford cc data thieves planted malware on 300 servers

Other retailers may be vulnerable

Combat fraud and increase customer satisfaction

The data breach at Hannaford, the US grocery chain, which enabled the theft of info on more than 4.2 million credit card accounts was caused by a sophisticated piece of malware that attackers installed in all the company's retail outlets.

Installed on more than 300 servers in at least six states, the malware was able to intercept credit card data while customers paid for purchases using plastic and transmit the information overseas, The Boston Globe reports. The rogue software was installed on servers in close to 300 different locations, though the company isn't saying how it got there.

The malware lifted "track 2" data stored on the magnetic strip of customers' cards as customers used them at point-of-sale machines. The data includes the card number and expiration date, but not the customer's name. The malware stored records of the purchases in batches and periodically transmitted them to an unidentified offshore internet service provider, according to the company.

Security experts have been eager to figure out how thieves siphoned the data out of Hannaford Brothers Cos. network because the company is believed to have been following payment card industry (PCI) rules. If the east coast chain's systems were vulnerable, plenty of other retailers may be open to the same attack, the experts have warned. By contrast, TJX Cos, which in 2006 was robbed of credit data belonging to more than 100 million of its customers, flouted several important restrictions.

The US Secret Service is investigating the theft. ®

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.