Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security

TJX Is Biggest Data Breach Ever 104

jcatcw writes "Jaikumar Vijayan reports for Computerworld that TJX is finally offering more details about the extent of the compromise which, at 45.6M cards, is the biggest ever. He has been following the story since it started. The systems that were broken into processed payment card, checks, and returns for customers of T.J. Maxx, Marshalls, HomeGoods, and A.J. Wright stores in the U.S. and Puerto Rico, and customers of Winners and HomeSense stores in Canada and T.K. Maxx in the U.K. Customer names and addresses were not included in the stolen data. So far the company has spent about $5 million in connection with the breach. Several lawsuits that have been filed against the company, including a suit by the Arkansas Carpenters Pension Fund, one of its shareholders, for failure to divulge more details about the breach."
This discussion has been archived. No new comments can be posted.

TJX Is Biggest Data Breach Ever

Comments Filter:
  • by Critical Facilities ( 850111 ) on Thursday March 29, 2007 @01:07PM (#18530283)
    From TFA:
    Customer names and addresses were not included with any of the payment card data believed stolen from the Framingham systems, TJX said. Also, the company "generally" did not store Track 2 data from the magnetic stripe on the back of payment cards for transactions

    Also from TFA:
    It is hard to know exactly what kind of data was stolen because a lot of the information accessed by intruders was deleted by the company in the normal course of business. "In addition, the technology used by the intruder has, to date, made it impossible for us to determine the contents of most of the files we believe were stolen in 2006," the company said.

    Sounds like they're just desparately trying to control the obviously egregious oversights that happened here. It also sounds like they're still trying to figure out what has happened. To say that heads are rolling is probably the biggest understatement ever.
  • Re:Suggested (Score:1, Informative)

    by Anonymous Coward on Thursday March 29, 2007 @01:22PM (#18530509)
    All I can say is that I worked there after the breach, and omg was it a joke.

    Not to mention there was only 1 guy that was running the portion that led to the infiltration ! That is plain and simple nuts ! What a shame though they are a really nice group of folks around that shop and this breach was not just them.

    Also I wonder exactly how many folks were affected and they didn't know until they got a new bank card or credit card.

    Also this is an example of retail , where making money is #1 and all else is #2.
  • Re:All encompassing (Score:5, Informative)

    by monkeydo ( 173558 ) on Thursday March 29, 2007 @02:50PM (#18532135) Homepage
    Wal-Mart giftcards over $500 require ID to redeem. So they were buying only $400 giftcards. Cashiers were suspicous of people using multiple $400 giftcards to make large purchases.
  • by Gary W. Longsine ( 124661 ) on Thursday March 29, 2007 @03:40PM (#18533123) Homepage Journal
    Of course, the attacker might have a team of experts, moles planted in the corporation, and their own Tom Cruise who slapped magnetic signs on a white van, posed as a janitor, rappelled into the hermetically sealed server room, looked under keyboards for the post-it with the root password, modified the corporation's custom software on the fly and installed the resulting trojaned version (all without touching the floor) and then cleaned the urinals on his way out so that nobody would suspect a thing for years in a mission-impossible-style coordinated assault requiring deep insight to the code, but given that most such incidents of data theft are quite a bit less sophisticated, I doubt deep insight was required.

    Deep insight is mainly useful to attackers who seek a very specific set of data from a particular target. People after credit card data typically just cast a wide net and exploit the low hanging fruit. Let a worm loose, it gets in somewhere. See what it finds. Exploit it. Much, much simpler. Of course since we lack the technical details you mentioned (and others) we have no idea what really happened, and the technical details would probably be interesting. I suspect that the weeks long delay in releasing the information that came out today was due to the fact that the investigators suspected, or merely feared, an inside job.

    This is a common and largely emotional response to an attack like this. "Somebody broke into our highly secure system and stole 45 million customer records complete with credit card numbers? Inconceivable!" ("You keep using that word. I do not think it means what you think it means.")

    It's certainly *not* a requirement to have "deep insight" into the code or even the specific computing infrastructure of the typical corporation in order to steal data. In fact, ordinary insight is sufficient once you have access, given the attacker has basic technical skills. Rather than deep insight, what is usually seen is a plodding industrial spam-like approach.
    • bots are built and released to the wild internet (network worms, email worms, web trojans, etc.)
    • a single system behind a company firewall is infected with the bot (e.g. through a web browser, or a laptop hit by a worm at a coffee shop)
    • the bot spreads behind the company firewall, infecting many machines, attracting much attention
    • company managers crack the whip over IT to clean up the mess without re-installing the infected systems, often against the advice of people who understand the problem who say things like, "we have no way to know what damage has been done, the only secure fix is to re-image the infected systems," which sounds are like one hand clapping to managers who have been told to contain IT costs
    • some of the infected systems are "noisy", probing around the network trying to spread itself
    • some of the infected systems are "stealthy", the bot does not attempt to spread further from them, it seeks data on the local system including what processes are running on the system
    • some of the infected systems appear to have data of interest to the attacker
    • the bot is instructed to install a root kit and possibly remove itself from the system
    • the attacker explores the systems of interest, looking for files, looking at database contents, stealing what they want, etc.

    From the article:
    "In addition, the technology used by the intruder has, to date, made it impossible for us to determine the contents of most of the files we believe were stolen in 2006," the company said. It did not elaborate on the technology it was referring to.

    This sounds like a smokescreen. The "technology" might be quite simple and common. Any of these could apply, for example:

    • the intruders used scp to upload files to a remote host so our IDS logged the connection, but we can't tell what was in the files
    • the intruders used ftp, but our IDS system was configured to log only meta-data
  • by mrhandstand ( 233183 ) on Thursday March 29, 2007 @03:53PM (#18533357) Journal
    I'm a QDSP (VISA PCI certified assessor - been through VISA requirements training). Yes, you have to notify those who have been effected - as for how - snail mail. After all, they HAVE your info...
  • Re:Meanwhile... (Score:3, Informative)

    by Kalriath ( 849904 ) on Thursday March 29, 2007 @05:54PM (#18535727)
    Actually, you're only violating regs if you keep the CVV2 number (three digit number on the back) - PCI DSS says you dump that as soon as you verify it, but you do not have to with the credit card number (otherwise how do you expect PayPal et. al. to work?)

I tell them to turn to the study of mathematics, for it is only there that they might escape the lusts of the flesh. -- Thomas Mann, "The Magic Mountain"

Working...