Corporate Partners

Arts and crafts chain Michaels investigates possible data breach

The company has not confirmed a compromise but is notifying customers in advance

Michaels, a large U.S.-based arts and craft store chain, said Saturday it is investigating a possible data breach after suspicious activity was detected on payment cards used at its stores.

The company opted to come forward without confirming a compromise because of the "widely reported criminal efforts to penetrate the data systems of U.S. retailers," according to a company statement.

CEO Chuck Rubin[cq] said "it is in the best interest of our customers to alert them to this potential issue" so they can scan payment card statements for unauthorized charges, according to the statement.

The Irving, Texas, company, which had more than 1,105 stores in the U.S. and Canada as of May 2013, said it has contacted federal law enforcement and hired third-party data security consultants. It also owns Aaron Brothers, a 123-store chain in 11 U.S. states.

If Michaels confirms a breach, it would become the latest victim in a string of data attacks rattling merchants across the U.S. High-end retailer Neiman Marcus and department store Target announced data breaches earlier this month.

Both of those breaches occurred after attackers installed malicious software on their network that collected payment card details.

Target said as many as 40 million payment cards and up to 70 million other personal records were compromised between Nov. 27 and Dec. 15, 2013. CEO Gregg Steinhafel[cq] said malware was installed on point-of-sale terminals used to swipe cards.

Neiman Marcus said between July and October 2013, malware "scraped" payment card information from its system before the company learned of the fraud in December.

Security experts have seen point-of-sale malware for sale on underground forums since at least March 2013. The Target malware is believed to be a derivative of malware called "Kaptoxa," which is Russian for "potato."

That malware, also called "BlackPOS," steals unencrypted card data just after it is swiped and sits in the POS terminal's memory. This type of malware has also been termed a "RAM scraper."

Last week, a 23-year-old living in Russia said he contributed code the Kaptoxa malware. Rinat Shabayev[cq], who lives in Saratov, Russia, told Lifenews.ru that the program could be used for illegal purposes but was intended as a defensive tool.

Computer security experts believe that Shabayev used an online nickname "ree4" and may have sold copies of the program for $2,000 or for a share of the profits. He hasn't been charged, although experts think his customers may be behind the attacks.

There are many indications on underground forums that point-of-sale hacking campaigns are continuing, said Dan Clements[cq], president of the cyberintelligence company IntelCrawler.

One hacker, believed to be based in the U.K., has posted a video on YouTube showing access to the system of an events company in the U.S. midwest. The company has not responded to a request for comment.

Another one of the hacker's videos shows how he performs the attacks using a Microsoft connection protocol, RDP, or Remote Desktop Protocol.

RDP was developed by Microsoft to let administrators access other remote computers. Since many POS terminals are Windows-based, Visa warned merchants in last August that RDP log-ons should be disabled.

Postings on the underground forums seen by IDG News Service show that cybercriminals buy and sell access to point-of-sale terminals and other systems that have RDP enabled.

Intruders often try the default login and password for terminals, and if that doesn't work, attempt brute-force attacks, which try many combinations of credentials. Vulnerable IP addresses can be probed from anywhere in the world for weaknesses.

The hacker who posted on YouTube showed he had access to sales orders of the events company between 2009 through 2012. Various video frames show customer names, addresses, email addresses, credit card numbers and expiration dates.

An analysis by IntelCrawler shows a thriving interest in RDP hacking. Its analysts gather data from password-protected forums used by cybercriminals, which gives insight into the latest trends.

On Nov. 27, the day that Target believes hackers began collecting payment card details, a posting on a Russian-language forum showed a buyer offering $100 for access to a hacked RDP POS terminal.

The buyer was interested in Track 1 and Track 2 data, which is information coded on the back of a payment card's magnetic stripe. Track 1 data contains a card number, the holder's name expiration date, while Track 2 data contains the card number and expiration date.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Join the CSO newsletter!

Error: Please check your email address.

Tags Targetintrusionsecuritydata breachNeiman MarcusfraudMichaelsmalware

More about IDGMicrosoftVisa

Comments

Comments are now closed

Market Place