{"id":3452,"date":"2014-12-19T17:33:19","date_gmt":"2014-12-19T17:33:19","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=3452"},"modified":"2020-02-26T10:58:38","modified_gmt":"2020-02-26T15:58:38","slug":"2014-the-year-of-retailers-getting-hacked-over-and-over-again","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/2014-the-year-of-retailers-getting-hacked-over-and-over-again\/3452\/","title":{"rendered":"2014: the year of retailers getting hacked over and over again"},"content":{"rendered":"<p>2014 is almost over, and it\u2019s definitely a historic year in regards to cybersecurity. This is due, in part, to a streak of cyberattacks against major retailers in the US. Most of these ended with massive breaches and leaks of personal and payment data.<\/p>\n<p style=\"text-align: center;\">\n<\/p><p>Retailers became targets for complex cyberattacks some time ago (see last years\u2019 <a href=\"https:\/\/business.kaspersky.com\/hackers-against-retailers\/875\" target=\"_blank\" rel=\"noopener nofollow\">post on it<\/a>), yet it was last year\u2019s Target Corporation breach that drew special attention. With <a href=\"https:\/\/threatpost.com\/target-attackers-took-11-gb-of-data-researchers-say\/103691\" target=\"_blank\" rel=\"noopener nofollow\">over 11 GB of data stolen and about 110 million customers affected<\/a>, it quickly made its way onto the short list of the largest data breaches in history.<\/p>\n<p>The attackers used the BlackPOS <a href=\"https:\/\/business.kaspersky.com\/what-is-pos-malware-and-why-does-it-cost-millions\/2457\" target=\"_blank\" rel=\"noopener nofollow\">Point-of-Sale malware<\/a> to attack vulnerable payment terminals without point-to-point encryption.<\/p>\n<p>The incident cost Target dearly. Its CIO and CEO stepped down, it had to appease angry customers and authorities, and their profits were heavily affected.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>2014: the year of retailers getting hacked over and over again<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FHfP4&amp;text=2014%3A+the+year+of+retailers+getting+hacked+over+and+over+again\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Target wasn\u2019t alone, though that barely brings any solace. Throughout 2014 several other gross retail chains reported they were under attack.<\/p>\n<p>These included:<\/p>\n<p><strong>\u2013 <\/strong><a href=\"https:\/\/threatpost.com\/neiman-marcus-says-1-1m-cards-compromised-in-data-breach\/103835\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Neiman Marcus<\/strong><\/a>. The actual breach took place between July and October 2013, but it was only disclosed in January 2014. Initially it was reported that at least 2,400 Visa, MasterCard and Discover cards were affected. Later it was revealed that data belonging to 1.1 million people was compromised.<\/p>\n<p><strong>\u2013 <\/strong><a href=\"https:\/\/threatpost.com\/michaels-data-breach-under-investigation\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Michaels Stores<\/strong><\/a>, Inc., the large craft and home goods retailer, said in late January that it had been investigating a potential data breach that affected an unknown number of cards used in the chain\u2019s stores in the last few weeks.<\/p>\n<p>It wasn\u2019t the first incident of this kind for Michaels: In early 2011 its debit card terminals were attacked in 20 states. This led to a class action suit from the affected customers.<\/p>\n<p>Eventually it was reported that the payment cards of 2.6-3 million Michaels customers <a href=\"https:\/\/threatpost.com\/3-million-cards-impacted-in-michaels-breach\/105556\" target=\"_blank\" rel=\"noopener nofollow\">were affected between May 2013 and January 2014<\/a>. Also affected was its subsidiary \u2013 Aaron Brothers, with data on roughly 400,000 customers changing hands.<\/p>\n<p><strong> \u2013 <\/strong><a href=\"https:\/\/threatpost.com\/sally-beauty-supply-acknowledges-breach-of-25000\/104851\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Sally Beauty Supply<\/strong><\/a> said in March that it had been the victim of a successful cyberattack with the criminals making off with \u201cfewer than 25,000 records containing card-present (track 2) payment card data\u201d<\/p>\n<p><strong> \u2013 <\/strong><a href=\"https:\/\/threatpost.com\/supermarkets-nationwide-affected-by-albertsons-supervalu-data-breach\/107791\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Albertsons and SUPERVALU<\/strong><\/a> grocery chains announced in mid-August that a data breach may have exposed the credit and debit card information of an unknown number of its customers at various grocery store locations in more than 18 states. The attack was active roughly between June 22 and July 17.<\/p>\n<p><a href=\"https:\/\/threatpost.com\/ups-admits-51-stores-hit-with-malware-for-five-months\/107865\" target=\"_blank\" rel=\"noopener nofollow\"><strong>\u2013 UPS<\/strong><\/a> announced a few days after that 51 of its stores suffered a \u201cbroad-based malware intrusion\u201d earlier this spring. The company said unnamed malware avoided detection from \u201ccurrent antivirus software,\u201d and it was discovered only after a third-party security firm was brought in for an inspection.<\/p>\n<p>\u2013 <a href=\"https:\/\/threatpost.com\/pos-service-confirms-goodwill-breach-lasted-18-months\/108346\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Goodwill Industries<\/strong><\/a>. C&amp;K Systems reported in September that Goodwill and two other unnamed retailers were subjects of attacks that lasted for 18 months (Feb.1, 2013 through Aug. 14, 2014). The Infostealer.rawpos Trojan was used to extract credit card data.<\/p>\n<p>\u2013 <a href=\"https:\/\/threatpost.com\/home-depot-breached-via-vendor-credentials-53-million-email-addresses-also-stolen\/109233\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Home Depot<\/strong><\/a> was compromised, with the credit card information for roughly 56 million shoppers in Home Depot\u2019s 2,000 U.S. and Canadian outlets stolen. 53 million email addresses were stolen as well. The notorious Backoff PoS malware is the main culprit. In November, Home Depot revealed that the incident <a href=\"https:\/\/threatpost.com\/home-depot-breach-cost-company-43-million-in-third-quarter\/109629\" target=\"_blank\" rel=\"noopener nofollow\">cost them $43 million<\/a>.<\/p>\n<p><a href=\"https:\/\/threatpost.com\/backoff-malware-identified-as-culprit-in-dairy-queen-breach\/108811\" target=\"_blank\" rel=\"noopener nofollow\"><strong>\u2013 Dairy Queen<\/strong><\/a> said in October that it was also hit with Backoff, with 395 of its 4,500 locations affected. Customer\u2019s names and credit card numbers with their expiration dates were acquired, although the exact scope of the leak isn\u2019t known.<\/p>\n<p>\u201cThe company has no evidence that other customer personal information, such as Social Security numbers, PINs or email addresses, was compromised as a result of this malware infection,\u201d the company said in a <a href=\"http:\/\/www.dairyqueen.com\/us-en\/datasecurityincident\/Press-Release\/?localechange=1&amp;\" target=\"_blank\" rel=\"noopener nofollow\">statement<\/a>.<\/p>\n<p><a href=\"https:\/\/threatpost.com\/kmart-latest-retail-chain-to-disclose-payment-card-breach\/108829\" target=\"_blank\" rel=\"noopener nofollow\"><strong>\u2013 Kmart<\/strong><\/a> acknowledged in mid-October that it fell victim to a \u201cpayment security incident\u201d for most of September and some of October\u201d. The company said payment data systems were infected with an unspecified \u201cnew form of malware\u201d that avoided detection from antivirus software. The company didn\u2019t disclose how many customers were affected.<\/p>\n<p>A few days after Kmart reported their breach, First NBC Bank <a href=\"http:\/\/www.courthousenews.com\/2014\/12\/17\/banks-sue-kmart-over-credit-card-data-breach.htm\" target=\"_blank\" rel=\"noopener nofollow\">filed a federal class action suit<\/a> against the company, saying that Kmart\u2019s failure to protect customer information with \u201celementary\u201d security measures left banks liable for the resulting fraud.<\/p>\n<p><a href=\"https:\/\/threatpost.com\/staples-looking-into-potential-payment-card-breach\/108946\" target=\"_blank\" rel=\"noopener nofollow\"><strong>\u2013 Staples<\/strong><\/a> office supply chain reported investigating a potential issue involving credit card data. In November, Staples confirmed a PoS malware was at play. Otherwise, it remained tight-lipped on the number of possibly affected customers.<\/p>\n<p><a href=\"http:\/\/techcrunch.com\/2014\/12\/05\/retailer-bebe-confirms-payment-card-data-breach\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>\u2013 Bebe<\/strong><\/a> said in early December that it was under attack between November 8, 2014 and November 26, 2014. Only the stores located in the U.S., Puerto Rico, and the U.S. Virgin Islands were affected. The scope of the attack and the tools used are unknown.<\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/05\/06020319\/wide-2.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-3453\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/05\/06020319\/wide-2.jpg\" alt=\"wide-2\" width=\"1000\" height=\"664\"><\/a><\/p>\n<p>In most cases it was PoS malware that led to the data breaches. It\u2019s not a new type of a threat, but this year\u2019s \u201cstars\u201d \u2013 BlackPOS\/Kaptoxa and Backoff \u2013 showed the level of vulnerability and the <a href=\"https:\/\/threatpost.com\/backoff-sinkhole-reveals-sorry-point-of-sale-security\/107981\" target=\"_blank\" rel=\"noopener nofollow\">sorry state of payment terminals security<\/a> in the companies who process payment data from thousands of people daily. Apparently some of the victims did indeed fail to implement even basic security measures, such as antimalware software for the payment terminals, most of which are Microsoft Windows-based machines.<\/p>\n<p>With the total number of victims towering beyond hundreds of millions, this issue is a hot topic.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>PoS malware exploits \u201cinnate\u201d tech flaws in PoS terminals and their Windows flaws<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FHfP4&amp;text=PoS+malware+exploits+%26%238220%3Binnate%26%238221%3B+tech+flaws+in+PoS+terminals+and+their+Windows+flaws\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>In their analysis (<a href=\"https:\/\/securelist.com\/blog\/research\/66305\/sinkholing-the-backoff-pos-trojan\/\" target=\"_blank\" rel=\"noopener\">available on Securelist<\/a>) Kaspersky Lab\u2019s Costin Raiu, Ryan Naraine and Roel Schouwenberg show that the problem is rather technical. \u201cIt\u2019s very clear that PoS networks are prime targets for malware attacks\u201d, they wrote. \u201cThis is especially true in the US, which still doesn\u2019t support EMV chip-enabled cards. Unlike magnetic strips, EMV chips on credit cards can\u2019t be easily cloned, making them more resilient. Unfortunately, the US is adopting chip and signature, rather than chip and PIN. This effectively negates some of the added security EMV can bring\u201d.<\/p>\n<p>However, at least some of the victims have learned their lesson. Back in April, Target revealed <a href=\"https:\/\/threatpost.com\/target-accelerates-chip-and-pin-roll-out-hires-new-cio\/105797\" target=\"_blank\" rel=\"noopener nofollow\">it was accelerating plans to set up<\/a> a full chip-and-pin system for its branded credit and debit cards. The company also plans to have terminals capable of accepting chip-and-pin cards in all of its stores by September.<\/p>\n<p>In November, Target <a href=\"http:\/\/www.ozarksfirst.com\/story\/d\/story\/targets-solution-to-data-breach-chip-and-pin-cards\/11878\/0u7CAw_N9kmGMYgNF9xfSQ\" target=\"_blank\" rel=\"noopener nofollow\">said<\/a> they would roll out their own new chip-and-pin cards \u201cstarting early next year\u201d. The company\u2019s REDcard replacement came at a cost of more than 100 million dollars, which might be a good explanation why retailers didn\u2019t adopt chip-and-pin cards earlier.<\/p>\n<p>At the end of November <a href=\"http:\/\/www.eweek.com\/security\/chip-and-pin-cards-finally-winning-acceptance-in-retail-sector.html\" target=\"_blank\" rel=\"noopener nofollow\">eWeek reported<\/a> that Chip-and-Pin cards were \u201cfinally winning acceptance in the retail sector\u201d in the US, which is definitely encouraging news. Too bad it took so long and so many people were already affected.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>2014 was marked by a streak of major cyberattacks on large retailers in the US. In most cases, PoS malware was at play. Now retailers are scrambling to improve their Point-of-Sale terminal security. It&#8217;s encouraging, but a pity that it took so long.<\/p>\n","protected":false},"author":209,"featured_media":15780,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[282,36,2265,2780,2266],"class_list":{"0":"post-3452","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-cybersecurity","10":"tag-malware-2","11":"tag-pos-attacks","12":"tag-retail","13":"tag-retail-hacks"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/2014-the-year-of-retailers-getting-hacked-over-and-over-again\/3452\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/2014-the-year-of-retailers-getting-hacked-over-and-over-again\/3452\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/2014-the-year-of-retailers-getting-hacked-over-and-over-again\/3452\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/retail\/","name":"retail"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3452"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3452\/revisions"}],"predecessor-version":[{"id":33421,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3452\/revisions\/33421"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15780"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}