Tel: (312) 929-0912
29 E. Madison St., Ste. 1108, Chicago, IL 60602

EDDIE BAUER BREACH COULD AFFECT SIX MONTHS OF CARD DATA

Bellevue, Wash.-based Eddie Bauer said POS malware found at about 350 U.S. and Canadian store registers might have captured payment information used during store transactions between Jan. 2 and July 17.

“While not all transactions during this period were affected, out of an abundance of caution, Eddie Bauer is offering identity protection services to all customers who made purchases or returns during this period,” the company said in a statement.

Customers are encouraged to go to the Eddie Bauer website for more information. The company declined to provide the possible number of customers affected. The company emphasized that this breach did not affect purchases made on the company’s online store eddiebauer.com.

Brian Krebs in a post on his blog, KrebsonSecurity, said he was unimpressed with the clothing brand’s response to the malware attack. The cybersecurity expert said he reached out to Eddie Bauer on July 5, 2016, after hearing from several sources who work in fighting fraud at U.S. financial institutions. All of those sources said they had identified a pattern of fraud on customer cards that had just one thing in common: use at some of Eddie Bauer’s locations.

Krebs said in a post, a spokesperson for Eddie Bauer at the time said the company was grateful for the outreach but that it had not heard any fraud complaints from banks or from the credit card associations.

“Given the volume of point-of-sale malware attacks on retailers and hospitality firms in recent months, it would be nice if each one of these breach disclosures didn’t look and sound exactly the same,” Krebs’ post read.

John Christly, CISO at Fort Lauderdale, Fla.-based cybersecurity firm Netsurion, said, “It is very apparent that retailers of all sizes need to be armed with better tools and increased cyberintelligence to ward off and alert to these kind of attacks. And for those that may have some of these tools on their toolbelt already, they should consider finding companies to work with to enhance their monitoring of these tools.”

Gone are the days when a typical firewall could be set up once and run without constant monitoring, tweaking, and ensuring the data coming from it correlated with other systems. “Some of these breaches may look like normal web traffic coming out of the firewall, and other attacks can even seem like legitimate DNS traffic, which may pass right by the typical un-managed firewall,” Christly noted. “It takes a different approach to stop some of these advanced attacks, and many products and service providers simply do not have the ability to stop them before they do real damage.”

Source: Credit Union Times

  • 19 Aug, 2016
  • Posted by admin
  • 1 Tags
  • 0 Comments

CATEGORIES Front Page Recent News

COMMENTS