Feeds

1.1 MILLION customers' credit card data was swiped in Neiman Marcus breach

It was the old 'malware on point-of-sale terminal' wheeze again

Build a business case: developing custom apps

US luxury retailer Neiman Marcus has confirmed that details from 1.1 million customers' cards were stolen in a recently detected high-profile breach.

Card details were lifted after hackers successfully planted malware on payment systems over a period that ran between 18 July and 30 October last year, far earlier than previously suspected.

Around 2,400 of the compromised credit card details have subsequently been abused to make fraudulent purchases, according to an update by Neiman Marcus on the breach.

While the forensic and criminal investigations are ongoing, we know that malicious software (malware) was clandestinely installed on our system. It appears that the malware actively collected or "scraped" credit card data from July 16, 2013 to October 30, 2013.

During those months, approximately 1,100,000 customer payment cards could have potentially been visible to the malware.

To date, Visa, MasterCard and Discover have notified us that approximately 2,400 unique customer payment cards used at Neiman Marcus and Last Call stores were subsequently used fraudulently.

The retailer said it has already taken extensive security precautions to prevent a repetition of the breach, which has become the subject of ongoing forensic investigation and law enforcement interest.

Neiman Marcus said it is not aware of any connection between its breach to the spill of 40 million credit card details by fellow retailer Target.

In an associated statement Karen Katz, president and chief exec at Neiman Marcus Group, said "was very sorry that some of our customers' payment cards were used fraudulently after making purchases at our stores".

Neiman Marcus is offering affected customers free credit card monitoring services.

"The timeline of the Neiman Marcus compromise demonstrates the need for organisations to store long term forensic audit trails in order to investigate breaches," said Tim "TK" Keanini, CTO at security tools firm Lancope. "According to Neiman Marcus, the attack activity took place between July 16th and October 30th, 2013. However, the compromise was not discovered until January of 2014."

How deep does the rabbit hole go?

Shopping giant Target and Neiman Marcus both publicly announced huge breaches in December and January, respectively.

The Target breach at least has been narrowed down to a specific malware tool (a modified version of BlackPOS) that affected its point-of-sale systems and, according to some security experts, enterprise payment processing servers.

Reuters previously reported that at least three other unnamed retailers may have been hit by attacks using similar techniques and tools. On Thursday it reported that the Feds have since expanded their victim list to include 20 identified victims of hacking over the last year. The FBI has put out a warning to retailers urging them to review their security arrangements and to prepare for future possible attacks.

The spate of retailer credit card breaches, apparently geographically confined to North America, has led some observers to suggest the introduction of Chip and PIN would be enough to frustrate future frauds along the same lines. Anti-fraud firm Easy Solutions argues upgrading to Chip and PIN alone won't be enough.

Other experts suggest that vulnerable Point of Sale systems are the main villains in the Target and Neiman Marcus breaches.

Security researchers at Cisco have published a blog on detecting future payment card compromises and shortening the remediation window for such attacks.

The payment card data attacks on Target and other retailers were possible because the POS payment technology includes third party software installed on a computer/terminal. The problem is that the payment card data is susceptible to interception in memory before the encryption process and transmission across the network.

Hardware encryption devices at the point of sale (POS) can be used to thwart this particular line of attack, Levi Gundert, technical lead at Cisco Threat Research, Analysis, and Communications (TRAC) argues. ®

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
Plug and PREY: Hackers reprogram USB drives to silently infect PCs
BadUSB instructs gadget chips to inject key-presses, redirect net traffic and more
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?