Feeds

1.1 MILLION customers' credit card data was swiped in Neiman Marcus breach

It was the old 'malware on point-of-sale terminal' wheeze again

The essential guide to IT transformation

US luxury retailer Neiman Marcus has confirmed that details from 1.1 million customers' cards were stolen in a recently detected high-profile breach.

Card details were lifted after hackers successfully planted malware on payment systems over a period that ran between 18 July and 30 October last year, far earlier than previously suspected.

Around 2,400 of the compromised credit card details have subsequently been abused to make fraudulent purchases, according to an update by Neiman Marcus on the breach.

While the forensic and criminal investigations are ongoing, we know that malicious software (malware) was clandestinely installed on our system. It appears that the malware actively collected or "scraped" credit card data from July 16, 2013 to October 30, 2013.

During those months, approximately 1,100,000 customer payment cards could have potentially been visible to the malware.

To date, Visa, MasterCard and Discover have notified us that approximately 2,400 unique customer payment cards used at Neiman Marcus and Last Call stores were subsequently used fraudulently.

The retailer said it has already taken extensive security precautions to prevent a repetition of the breach, which has become the subject of ongoing forensic investigation and law enforcement interest.

Neiman Marcus said it is not aware of any connection between its breach to the spill of 40 million credit card details by fellow retailer Target.

In an associated statement Karen Katz, president and chief exec at Neiman Marcus Group, said "was very sorry that some of our customers' payment cards were used fraudulently after making purchases at our stores".

Neiman Marcus is offering affected customers free credit card monitoring services.

"The timeline of the Neiman Marcus compromise demonstrates the need for organisations to store long term forensic audit trails in order to investigate breaches," said Tim "TK" Keanini, CTO at security tools firm Lancope. "According to Neiman Marcus, the attack activity took place between July 16th and October 30th, 2013. However, the compromise was not discovered until January of 2014."

How deep does the rabbit hole go?

Shopping giant Target and Neiman Marcus both publicly announced huge breaches in December and January, respectively.

The Target breach at least has been narrowed down to a specific malware tool (a modified version of BlackPOS) that affected its point-of-sale systems and, according to some security experts, enterprise payment processing servers.

Reuters previously reported that at least three other unnamed retailers may have been hit by attacks using similar techniques and tools. On Thursday it reported that the Feds have since expanded their victim list to include 20 identified victims of hacking over the last year. The FBI has put out a warning to retailers urging them to review their security arrangements and to prepare for future possible attacks.

The spate of retailer credit card breaches, apparently geographically confined to North America, has led some observers to suggest the introduction of Chip and PIN would be enough to frustrate future frauds along the same lines. Anti-fraud firm Easy Solutions argues upgrading to Chip and PIN alone won't be enough.

Other experts suggest that vulnerable Point of Sale systems are the main villains in the Target and Neiman Marcus breaches.

Security researchers at Cisco have published a blog on detecting future payment card compromises and shortening the remediation window for such attacks.

The payment card data attacks on Target and other retailers were possible because the POS payment technology includes third party software installed on a computer/terminal. The problem is that the payment card data is susceptible to interception in memory before the encryption process and transmission across the network.

Hardware encryption devices at the point of sale (POS) can be used to thwart this particular line of attack, Levi Gundert, technical lead at Cisco Threat Research, Analysis, and Communications (TRAC) argues. ®

Next gen security for virtualised datacentres

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?