Feeds

Hannaford cc data thieves planted malware on 300 servers

Other retailers may be vulnerable

Mobile application security vulnerability report

The data breach at Hannaford, the US grocery chain, which enabled the theft of info on more than 4.2 million credit card accounts was caused by a sophisticated piece of malware that attackers installed in all the company's retail outlets.

Installed on more than 300 servers in at least six states, the malware was able to intercept credit card data while customers paid for purchases using plastic and transmit the information overseas, The Boston Globe reports. The rogue software was installed on servers in close to 300 different locations, though the company isn't saying how it got there.

The malware lifted "track 2" data stored on the magnetic strip of customers' cards as customers used them at point-of-sale machines. The data includes the card number and expiration date, but not the customer's name. The malware stored records of the purchases in batches and periodically transmitted them to an unidentified offshore internet service provider, according to the company.

Security experts have been eager to figure out how thieves siphoned the data out of Hannaford Brothers Cos. network because the company is believed to have been following payment card industry (PCI) rules. If the east coast chain's systems were vulnerable, plenty of other retailers may be open to the same attack, the experts have warned. By contrast, TJX Cos, which in 2006 was robbed of credit data belonging to more than 100 million of its customers, flouted several important restrictions.

The US Secret Service is investigating the theft. ®

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.