Arts and crafts chain Michaels investigates possible data breach

The company has not confirmed a compromise but is notifying customers in advance

Michaels, a large U.S.-based arts and craft store chain, said Saturday it is investigating a possible data breach after suspicious activity was detected on payment cards used at its stores.

The company opted to come forward without confirming a compromise because of the "widely reported criminal efforts to penetrate the data systems of U.S. retailers," according to a company statement.

CEO Chuck Rubin[cq] said "it is in the best interest of our customers to alert them to this potential issue" so they can scan payment card statements for unauthorized charges, according to the statement.

The Irving, Texas, company, which had more than 1,105 stores in the U.S. and Canada as of May 2013, said it has contacted federal law enforcement and hired third-party data security consultants. It also owns Aaron Brothers, a 123-store chain in 11 U.S. states.

If Michaels confirms a breach, it would become the latest victim in a string of data attacks rattling merchants across the U.S. High-end retailer Neiman Marcus and department store Target announced data breaches earlier this month.

Both of those breaches occurred after attackers installed malicious software on their network that collected payment card details.

Target said as many as 40 million payment cards and up to 70 million other personal records were compromised between Nov. 27 and Dec. 15, 2013. CEO Gregg Steinhafel[cq] said malware was installed on point-of-sale terminals used to swipe cards.

Neiman Marcus said between July and October 2013, malware "scraped" payment card information from its system before the company learned of the fraud in December.

Security experts have seen point-of-sale malware for sale on underground forums since at least March 2013. The Target malware is believed to be a derivative of malware called "Kaptoxa," which is Russian for "potato."

That malware, also called "BlackPOS," steals unencrypted card data just after it is swiped and sits in the POS terminal's memory. This type of malware has also been termed a "RAM scraper."

Last week, a 23-year-old living in Russia said he contributed code the Kaptoxa malware. Rinat Shabayev[cq], who lives in Saratov, Russia, told Lifenews.ru that the program could be used for illegal purposes but was intended as a defensive tool.

Computer security experts believe that Shabayev used an online nickname "ree4" and may have sold copies of the program for $2,000 or for a share of the profits. He hasn't been charged, although experts think his customers may be behind the attacks.

There are many indications on underground forums that point-of-sale hacking campaigns are continuing, said Dan Clements[cq], president of the cyberintelligence company IntelCrawler.

One hacker, believed to be based in the U.K., has posted a video on YouTube showing access to the system of an events company in the U.S. midwest. The company has not responded to a request for comment.

Another one of the hacker's videos shows how he performs the attacks using a Microsoft connection protocol, RDP, or Remote Desktop Protocol.

RDP was developed by Microsoft to let administrators access other remote computers. Since many POS terminals are Windows-based, Visa warned merchants in last August that RDP log-ons should be disabled.

Postings on the underground forums seen by IDG News Service show that cybercriminals buy and sell access to point-of-sale terminals and other systems that have RDP enabled.

Intruders often try the default login and password for terminals, and if that doesn't work, attempt brute-force attacks, which try many combinations of credentials. Vulnerable IP addresses can be probed from anywhere in the world for weaknesses.

The hacker who posted on YouTube showed he had access to sales orders of the events company between 2009 through 2012. Various video frames show customer names, addresses, email addresses, credit card numbers and expiration dates.

An analysis by IntelCrawler shows a thriving interest in RDP hacking. Its analysts gather data from password-protected forums used by cybercriminals, which gives insight into the latest trends.

On Nov. 27, the day that Target believes hackers began collecting payment card details, a posting on a Russian-language forum showed a buyer offering $100 for access to a hacked RDP POS terminal.

The buyer was interested in Track 1 and Track 2 data, which is information coded on the back of a payment card's magnetic stripe. Track 1 data contains a card number, the holder's name expiration date, while Track 2 data contains the card number and expiration date.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Join the PC World newsletter!

Error: Please check your email address.

Tags Targetintrusionsecuritydata breachNeiman MarcusfraudMichaelsmalware

Struggling for Christmas presents this year? Check out our Christmas Gift Guide for some top tech suggestions and more.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Shopping.com

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?