TJX Is Biggest Data Breach Ever 104
jcatcw writes "Jaikumar Vijayan reports for Computerworld that TJX is finally offering more details about the extent of the compromise which, at 45.6M cards, is the biggest ever. He has been following the story since it started. The systems that were broken into processed payment card, checks, and returns for customers of T.J. Maxx, Marshalls, HomeGoods, and A.J. Wright stores in the U.S. and Puerto Rico, and customers of Winners and HomeSense stores in Canada and T.K. Maxx in the U.K. Customer names and addresses were not included in the stolen data. So far the company has spent about $5 million in connection with the breach. Several lawsuits that have been filed against the company, including a suit by the Arkansas Carpenters Pension Fund, one of its shareholders, for failure to divulge more details about the breach."
Suggested (Score:5, Interesting)
Re: (Score:1, Informative)
Not to mention there was only 1 guy that was running the portion that led to the infiltration ! That is plain and simple nuts ! What a shame though they are a really nice group of folks around that shop and this breach was not just them.
Also I wonder exactly how many folks were affected and they didn't know until they got a new bank card or credit card.
Also this is an example of retail , where making money is #1 and all else is #2.
Re: (Score:3, Funny)
Re: (Score:2)
our bank did good (Score:2)
-nB
Re: (Score:1)
Does this mean that the ass-hats that did this are in France? Can we blame France?
New PINs too (Score:5, Funny)
Re: (Score:1, Funny)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
What ATM lets you change the PIN on your ATM card? That sounds like it'd be a security hole bigger than Mr. Goatse.cx's backside.
Re: (Score:2)
Re: (Score:2)
My VISA company sucks...
Legal ramifications (Score:3, Interesting)
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
Well, you can be damn sure they'd find a way if 45 million people owed them money.
Re: (Score:3, Informative)
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
And just to add, TJX/TJ Max/Etc, is just the latest in a long history of comprimises occurring. In Example, about a year or so ago, Mastercard just had trouble with one of it's Vendors not meeting minimum require
Re: (Score:1)
All encompassing (Score:4, Interesting)
The six named people must have had some deep insight to the code on which these systems were running. Maybe they had inside help. If I really wanted to be paranoid I'd suggest that the six named people were caught port-scanning the servers and they're being used as the fall guys so that the real criminals, probably insiders, can slip out the back door.
Patriot illegal HP domestic wiretap Enron insider FBI trading Martha 9/11 Stewart Congressional inquiry comes to mind.
Re: (Score:2)
Re: (Score:1)
The ecosystem, in this example, is trafficking in taxpayer money and insider trading information.
Re: (Score:1)
Re:All encompassing (Score:5, Informative)
watching too many episodes of 24 .. (Score:4, Insightful)
An interesting exercise in fallacious reductio ad absurdum. Just because they passed the cards don't mean they wrote the code and the Florida police caught them port-scaning the server and only arrested them to give the real criminals time slip out the back door.
Do you seriously think the hackers would drive about Florida trying to pass the stolen cards, especially months after it went public. The six are more likely to be down stream crooks that purchased the stolen card details not realising where they came from.
Re:All encompassing (Score: 5, Interesting
deep insight? the odds are against it. (Score:5, Informative)
Deep insight is mainly useful to attackers who seek a very specific set of data from a particular target. People after credit card data typically just cast a wide net and exploit the low hanging fruit. Let a worm loose, it gets in somewhere. See what it finds. Exploit it. Much, much simpler. Of course since we lack the technical details you mentioned (and others) we have no idea what really happened, and the technical details would probably be interesting. I suspect that the weeks long delay in releasing the information that came out today was due to the fact that the investigators suspected, or merely feared, an inside job.
This is a common and largely emotional response to an attack like this. "Somebody broke into our highly secure system and stole 45 million customer records complete with credit card numbers? Inconceivable!" ("You keep using that word. I do not think it means what you think it means.")
It's certainly *not* a requirement to have "deep insight" into the code or even the specific computing infrastructure of the typical corporation in order to steal data. In fact, ordinary insight is sufficient once you have access, given the attacker has basic technical skills. Rather than deep insight, what is usually seen is a plodding industrial spam-like approach.
This sounds like a smokescreen. The "technology" might be quite simple and common. Any of these could apply, for example:
Re: (Score:1)
NPR had a bit on this on the news at noon. Apparently, some 'software' was discovered on several computers in one of their corporate offices back in December. At that time, they turned the case over to law enforcement. The magnitude of the breach has only recently become evident, requiring TJX to notify the SEC about events that may have a material effect on their financial status. IBM has been working on the
Virus ridden defense contractors (Score:1)
Sounds like damage control doublespeak (Score:4, Informative)
Customer names and addresses were not included with any of the payment card data believed stolen from the Framingham systems, TJX said. Also, the company "generally" did not store Track 2 data from the magnetic stripe on the back of payment cards for transactions
Also from TFA:
It is hard to know exactly what kind of data was stolen because a lot of the information accessed by intruders was deleted by the company in the normal course of business. "In addition, the technology used by the intruder has, to date, made it impossible for us to determine the contents of most of the files we believe were stolen in 2006," the company said.
Sounds like they're just desparately trying to control the obviously egregious oversights that happened here. It also sounds like they're still trying to figure out what has happened. To say that heads are rolling is probably the biggest understatement ever.
The Answer is... (Score:5, Insightful)
The simple answer for users, and it exists now: Revokeable Credit Cards.
The long term is separation of credit and banking from the Social Security system.
Re: (Score:2)
Re: (Score:2)
How is THAT the answer, when only 3 places in the 5 years you've used the card, support reading the chip on it? Doesn't sound very pervasive to me.
Re: (Score:2)
The Complicator's Card (Score:4, Interesting)
Fortunately, we don't have to so that. It's way simpler.
1. Require all credit cards to add a photograph to the back as well as a signature panel. Overlay parts of the photo with holograms to make sure it's tough to copy. (It's not like the "lost card" field does fuck all when you've lost the card.)
2. Put identity photographs in everyone's credit history. If you're getting a mortgage or credit card or something else where you have to go in person, then it's pretty obvious if you're faking it.
3. Have the credit agency computers call a number listed in the credit history every time the history is accessed. ("This is Equifax. Beardo has applied for a $500k mortgage. If you are not aware of this transaction, call 1-800-HEY-WAIT.")
That's it.
The reason we won't see this - ever - is because it will cost the banks money to implement. When they can instead blame the victims for their DARING to have their stuff stolen, why bother to invest in making a secure environment? After all, it's perfectly secure from the bank's point of view.
Re: (Score:1)
3. Have the credit agency computers call a number listed in the credit history every time the history is accessed. ("This is Equifax. Beardo has applied for a $500k mortgage. If you are not aware of this transaction, call 1-800-HEY-WAIT.")
You can do something like this now by filing a "fraud alert [experian.com] which will be shared between the three credit bureaus (equifax, transunion, experian).
You can require that a phone number (provided by you) be called each time a credit application is processed using your information.
You can set this up for 90-days, or 7-years. This also will remove your name from appearing on credit card junk mail. (A different process is involved in stopping the mails altogether.)
(I became aware of this service only recently, af
Re:No No! No! (Score:2)
But this is not about "banking" transactions. This is an almost unregulated gray area where the retailer is processing/managing it's own credit accounts. It sounds like those accounts stored individuals banking information along with their internal account info. (duhh!) This explains the ability for some bad guys to buy things elsewhe
Re: (Score:2)
Most of the time, the "store card" is offered by a bank. CompUSA's credit card program is administered by HSBC, etc...
Re: (Score:1)
One involves issuing payment instruments. One involves being responsible for accepting those transactions and settling with whomever did issue that payment instrument.
It is frequently worthwhile for large, national merchants to maintain their own relationships to the issuing associations; they control all the data, and they don't have to pay a merchant processor a cut. Tater's Toe Service may only ha
How will that help? (Score:1)
If congress were to pass a law that forbids banks from collecting social security numbers and mandates that they destroy all social security numbers already collected, has congress just solved the Identity Theft problem?
(Hint: the answer is "no")
Re: (Score:1)
You may as well advocate the elimination of private property while you're at it.
Example (Score:5, Insightful)
Ok, so you're not responsible.
How do you know how they got your info? It could have been from a call center, when you called about double billing you over and over. It could have been when you called your bank, which also has call centers in India. It could have been when you lost your card, someone found it.
Point is, you probably will never know how they got your info. Only that they did. Even if you did find out, could you prove it in a court of law enough to sue TJX?
Re: (Score:3, Insightful)
I have no pity for someone who doesn't at least look at their monthly statements.
The risk to your credit is absolutely minimal if you pay attention, and call the 1-800 number on the back of the card to dispute the claims immediately.
As for suing TJX, you wouldnt. You just g
Re: (Score:2)
Re: (Score:2, Interesting)
how they got your info .. (Score:2)
Well according to the article how they got the information by hacking TJX and using it to purchase large quantities of gift cards from Wal-Mart and Sam's Club. So in this case we don't have to wonder.
'in filings with the U.S. Securities and Exchange Commission yesterday, the company said 45.6 million credit and debit card numbers were stolen from one of its systems [computerworld.com] over a period of more than 18 months by an unknown number of intruders'
'in partnership with
Re: (Score:3, Interesting)
I was traveling internationally, lost my wallet, reported cards as stolen. Ended up finding the wallet (with money, yay!) but had to wait for my new cards to get to my house in the US, and then to me in Europe.
Fast forward 2 weeks. I receive my cards in Europe and 2 days later I notice that there's a charge on one of my cards for something I didn't buy. And it was made BETWEEN the times that I reported my card "stolen" and when I activated my new card. The charges a
Re: (Score:2)
interesting is the way that.. (Score:2)
inevitable (Score:1, Insightful)
I wonder if making the upper management personally respon
what OS was it running on .. (Score:4, Interesting)
Re: (Score:1)
As much as I want to jump on Microsoft and nail a couple more in the coffin I doubt that it is an OS issue and more an inside job.
Re: (Score:2)
, Anonymous Coward
.. I doubt that it is an OS issue and more an inside job'
It was the ecommerce server that was compromised, unless you know different.
'Just because their webserver is running IIS doesn't necessarely mean that everything else is
What does their internal billing systems run on. How is it connected to the front end. How was the breach achieved. Did they break in through the front end.
Re: (Score:1)
Why would I need to... don't they have a brain?
Re: (Score:1, Insightful)
Re: (Score:2)
Re: (Score:2)
I totally believe that you work for TJX as it wouldn't be that you are intoducing a tiny fib to corroborate the rest of your story.
It was the AS/400 that got hacked was it? Like they have a mixed NT AS/400 shop and it wasn't the NT as you say so. So you can tell us exactly how the hack was done.
For Canadians, Winners and HomeSense affected (Score:2)
More importantly, there has been recent arrests in Florida [www.cbc.ca] relating to this case.
Re: (Score:2)
Re: (Score:2)
A message [tjx.com] on TJX's corporate web site advise customers to take certain steps [tjx.com] (Canadian version), which include getting a credit report.
I did that, since we shop at Winners occasionally, and did not find anything unusual, and our credit cards have not shown any unusual transactions.
Because they were aware since at least December... (Score:3)
Systematic Credibility Gap (Score:3, Insightful)
1. Credit Agency mistake
2. Creditor error
3. Criminal activity
4. Poor security measures by xyz company
5. ???
With each of these is these problems, the onus for repair is on the customer / victim. There is no standard or easy resolution.
Re: (Score:1)
Meanwhile... (Score:5, Insightful)
In other news a story on Microsoft's Get The FUD [microsoft.com] campaign mysteriously disappears, the title was: 'TJX Chooses Windows Over Linux for Reliability and Security'.
I'm joking, but you never know. On a more serious note: what mystifies me is why these companies need to store customers credit card details at all?! Having had experience with POS (Point of Sale) I know that the system should keep these details long enough to complete a transaction, then it should delete it.
Security starts with only keeping the information you need. Courts should be questioning why these companies retained this data in the first place!
Re: (Score:1)
It's used to help prevent credit card fraud. I've worked in retail and I have had to deal with it myself to a small extent. It's one of the reasons that many places will only refund money onto the card you made the purchase on. (Also so that they have proof that the money was refunded and the customer can see it refunded on their statement) The other reason is traceability. Having things like the credit card
I never save credit card info after a sale (Score:2)
Yes, chargebacks can be a problem. But your other points are not unversial. For me, there is little need to keep the credit card information once the transaction has been completed. The only piece of info that I store is the Transaction ID. I never store the Authorization number. Once the transaction is auth'ed, there is no point.
Refunds don't have to be made the the same credit card. But if I wanted to enforce that as a policy, I could go back to my processor (VeriSign) and lookup the the credit ca
Re: (Score:1)
TJ Maxx is their own merchant processor. Therefore, they needed to keep all the information relevant for the transaction.
Now, did they keep information they didn't need to keep longer than they should? It certainly seems that way.
Re: (Score:1)
I'm joking, but you never know. On a more serious note: what mystifies me is why these companies need to store customers credit card details at all?! Having had experience with POS (Point of Sale) I know that the system should keep these details long enough to complete a transaction, then it should delete it.
Because they have to report it to the government in order to keep track of everything you do as part of a global information dragnet on every living man, woman, and child in the world?
Nah....
Re: (Score:1)
The solution to allow tracking, but keep hackers at bay is to cryptographically hash the card number with a one-way hash and store that after the transaction is completed. Then, if Joe's identity is stolen, they could hash Joe's card number and compare it in the database with purchases. But if the database is broken into, the hackers just have useless hashes instead of credit card n
Re: (Score:2)
That's what I was going to say. As I was writing a post to tell people to mod you up I realized why it might not do much good. The credit card number is only 16 digits and isn't completely random. This means it would probably be practical to make a rainbow table with the hash of every likely card number. A salt unique to the merchant might help especially if it could be kept from the hackers. A salt
Re: (Score:1)
Re: (Score:3, Informative)
"This is what happens, Larry!" (Score:1)
And Vista's so slow and has so many driver problems, it can't even do that very well.
Re: (Score:2)
Re: (Score:2)
A Credit Card Solution (Score:1)
What if our CC numbers weren't so persistant. I have cards in my wallet that don't expire for 3 or 4 years. Why not issue a new card every 12 months? That way, people who steal credit cards from these systems only have at most 12 months to use them.
One possible problem: recurring bills. Instead of the one time use cards that Amex used to have (I REALLY liked those) or that Discover
Re: (Score:1)
Re: (Score:1)
Finally, a Solution (Score:3, Funny)
I'm in UK, got hit (Score:1)
Simple Solution.... (Score:1)
Make the corporation,its board, and officers personally responsible for lost data....
As in Bank A looses 10K records of personal data which results in 100M in fraudulent charges. Bank A has to pay the merchants and CC companies 100M.....
You'll see data protections and security go up so fast you'll get whiplash....
(What? Hold people responsible?)