Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home Network Security Viruses & Malware Hackers Security Solutions More Topics...
Vblock™ Systems:
Advanced converged infrastructure
increases productivity & lowers costs.

www.vce.com
Hardware
Tame your scariest paperwork. Find Out How
Average Rating:
Rate this article:  
Barnes & Noble Says Card Readers at 63 Stores Breached
Barnes & Noble Says Card Readers at 63 Stores Breached

By Jennifer LeClaire
October 24, 2012 2:05PM

Bookmark and Share
Tampered PIN pads were discovered in Barnes & Noble stores in California, Connecticut, Florida, Illinois, Maine, New Jersey, New York, Pennsylvania and Rhode Island. Barnes & Noble said customers who swiped cards at stores in any of those states should change their PINs and review accounts for unauthorized transactions.
 


Barnes & Noble is sounding the alarm on Wednesday about a security breach. The book seller said it had detected tampering with PIN pad devices used in 63 of its stores.

After Barnes & Noble detected that one PIN pad was compromised in each of the 63 stores, it stopped using all PIN pads at nearly 700 stories across the country. The bricks-and-mortar chain also contacted federal law enforcement authorities and is working with authorities to investigate the breach.

"The tampering, which affected fewer than 1 percent of PIN pads in Barnes & Noble stores, was a sophisticated criminal effort to steal credit card information, debit card information, and debit card PIN numbers from customers who swiped their cards through PIN pads when they made purchases," the company said in a statement. "This situation involved only purchases in which a customer swiped a credit or debit card in a store using one of the compromised PIN pads."

Bugs Planted in PIN Pads

Barnes & Noble made clear that its customer database is secure. Purchases on Barnes & Noble.com, NOOK and NOOK mobile apps were not affected by the breach. The member database was also not affected, and none of the affected PIN pads was discovered at Barnes & Noble College Bookstores.

"The criminals planted bugs in the tampered PIN pad devices, allowing for the capture of credit card and PIN numbers," the company said after its internal investigation. "Barnes & Noble disconnected all PIN pads from its stores nationwide by close of business Sept. 14, and customers can securely shop with credit cards through the company's cash registers."

Tampered PIN pads were discovered in California, Connecticut, Florida, Illinois, Maine, New Jersey, New York, Pennsylvania and Rhode Island. Barnes & Noble said customers who swiped cards at stores in any of those states should change their PIN numbers, review accounts for unauthorized transactions and notify their banks immediately if they discover any unauthorized purchases or withdrawals.

Evidence of Inside Job

Gunter Ollmann, vice president of research at Damballa, said his initial investigation leads him to believe an insider was responsible. Specifically, he told us the breach appears to be a physical manipulation of the card readers in order to steal both debit card details and their accompanying personal identification numbers.

"This kind of fraud and their related tamper-resistance bypassing techniques would likely have been combated through the use of the chip and PIN technology commonly used in Europe and the Asia-Pacific," Ollman told us. "However, even these more advanced technologies have a number of flaws, but they make it considerably more difficult for criminals where it comes to cloning the victims cards and making fraudulent charges."

Based upon what Barnes & Noble has disclosed, Ollman believes the breach is an insider threat perpetrated by criminals who had physical access to the card readers. The evidence does not suggest that a batch of card readers were compromised at the manufacturer or distribution center.

"The criminals would have most likely had repeated access to the card readers -- and/or supporting computer systems -- in order to obtain the collected credentials," Ollman said. "It has been stated that only one reader per store was affected, which doesn't smell of a supply chain problem."
 

Tell Us What You Think
Comment:

Name:



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Hardware
1.   Profit and Revenue Slip for IBM
2.   Online Access for the Deaf and Blind
3.   Vaio Fit Battery Danger Forces Recall
4.   Drop in Global PC Shipments Slows
5.   Fast Seagate 6 TB Drive for Data Center


advertisement
Online Access for the Deaf and Blind
Pilot program provides technology tools.
Average Rating:
Fast Seagate 6 TB Drive for Data Center
Can use 12 Gb/s SAS interface.
Average Rating:
Sony Digital Paper Cuts Paper Waste
High price justifiable for business.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Tech Giants Fund Initiative To Prevent Future Heartbleeds
Can more funding prevent Heartbleed vulnerabilities in future open-source software? A new Core Infrastructure Initiative at the Linux Foundation is attempting to find out.
 
What Verizon's Data Breach Report Can Teach Enterprises
It’s probably not a jaw-dropper, but cyberespionage is officially on the rise. And the use of stolen or misused credentials is still the leading way the bad guys gain access to corporate information.
 
Top Cyberthreats Exposed by Verizon Report
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Hackers | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.