SlideShare a Scribd company logo
11-13-2007
Largest Known Credit Card Theft TJX Companies Marshall’s T.J. Maxx Home Goods A.J. Goods
What Happened? July 2005 Attackers gained access to the wireless network in a Marshall’s discount clothing store in Miami, FL. Over the next year, the internal network was systematically searched for valuable information. May 2006 Sniffer was installed on the network and over 80 GB of unencrypted data was sent to a site in California. December 2006 The incident was discovered by TJX and reported to law enforcement.
How was it done? The store was protected with WEP (Wired Equivalent Privacy) Weakness of WEP has been known since 2002 and replacements available in 2003. The ‘cracking’ of WEP is trivial.  The key can be gained in a matter of minutes. Once inside, the attackers created backdoor accounts and could work from anywhere in the world.
What was stolen? Recent Estimates find more than 94 million credit cards exposed. 451,000 customers had a breach of personal records. Drivers license numbers Military ID numbers Social Security Numbers Much of the information contained Track 2 data.  Track 2 data includes personal identification numbers and card verification codes and can be used to counterfeit payment cards.
Related Damages May 19, 2007 Six suspects were arrested for credit card fraud in Florida. The six were accused of purchasing gift cards with credit card numbers from the TJX incident. In total, over $8 million in credit card charges were made.
Related Damages August 21, 2007 Maksym Yastremskiy, 24, was arrested in the Turkish resort town of Kemer. He was tracked by U.S. Postal Inspection Service’s global investigations unit. He was trafficking more than 1 million credit card numbers. Numbers sold for $20 to $100.
Latest News Friday September 9, 2007 TJX announces settlement of numerous class-action lawsuits Settlement Terms: Each impacted customer would receive 2 $30 vouchers for TJX stores. Customers who returned merchandise (leaving behind their drivers license number) would have credit monitoring for 3 years with $20,000 in ID theft coverage Settlement pending ruling by judge
Latest News September 14, 2007 Irving Escobar sentenced to five years in prison and ordered to pay $600,000 restitution for his role in the gift card fraud in Florida. The Co-defendants all pled guilty and were sentenced to probation.
Latest News October 22, 2007 New lawsuit against TJX Filed on behalf of 300 banks in Massachusetts, Maine and Connecticut to reclaim damages due to credit card replacement Pending decision from judge to bring to class-action status.
Total Damages $68 million in Visa cards alone TJX lost $118 million in profits the 1 st  quarter after the incident. Current estimates for TJX dealing with the incident are $256 million. It is estimated the total damages could exceed $1 Billion due to: Fraudulent credit card purchases Banks reissuing credit card Damage to personal credit.
What went wrong? No Defense in Depth WEP was used Attackers were able to get to the corporate databases through remote stores network. Customer data was stored for too long (Some credit cards were from transactions in 2003) Customer data was stored that should not have been PCI DSS standards not followed
What can be learned? Security must be incorporated in all aspects of business and risks must understood. Security is not a product you can buy. Security is a process that must constantly evolve. Do not store unnecessary information Don’t use WEP (thanks Josh)
Joe Vest, (CISSP, CISA, CEH)   [email_address]
References http://www.privcom.gc.ca/cf-dc/2007/TJX_rep_070925_e.asp http://www.securityfocus.com/brief/465 http://www.securityfocus.com/brief/594 http://online.wsj.com/article/SB117824446226991797.html http://www.securityfocus.com/news/11493/2 http://blog.washingtonpost.com/securityfix/2007/10/tjx_breach_was_twice_as_bad_as_1.html

More Related Content

PPTX
E commerce case study
ODP
Airbnb - Presentation
PPTX
Cyber security and Cyber Crime
PPTX
[Exposicion] Computer and Internet Crime
PPTX
Redakt CMS Pitch Deck
PDF
AI Restart 2024: Petra Stupková - A(I)utorské právo pro všechny
PPTX
OLX.in - case study presentation
PPTX
Multi National Corporations by Neeraj Bhandari ( Surkhet.Nepal )
E commerce case study
Airbnb - Presentation
Cyber security and Cyber Crime
[Exposicion] Computer and Internet Crime
Redakt CMS Pitch Deck
AI Restart 2024: Petra Stupková - A(I)utorské právo pro všechny
OLX.in - case study presentation
Multi National Corporations by Neeraj Bhandari ( Surkhet.Nepal )

What's hot (20)

PPTX
Cyber fraud a threat to E commerce
PPTX
Crypto currency - a digital asset
PPTX
Sahara scam power point
PPTX
Zomato OOH Campaign
PPTX
Cyber Crime
PPTX
CyberSecurity.pptx
PPTX
Restaurant data
PPTX
AIR BNB
PPT
Amazon case study
PDF
Fintechs in india
PDF
Airbnb presentation - Paul Hayat (team3)
PPTX
Cyber crime ✔
PPTX
Shopify Presentation
PPTX
Airbnb ppt - Strategic Management
PDF
Airbnb presentation
PPTX
Airbnb : An Entreprenuerial Growth Journey
PPTX
Airbnb presentation
PPTX
Presentation amazon, daraz, aliexpress
PPTX
Financial Crimes
Cyber fraud a threat to E commerce
Crypto currency - a digital asset
Sahara scam power point
Zomato OOH Campaign
Cyber Crime
CyberSecurity.pptx
Restaurant data
AIR BNB
Amazon case study
Fintechs in india
Airbnb presentation - Paul Hayat (team3)
Cyber crime ✔
Shopify Presentation
Airbnb ppt - Strategic Management
Airbnb presentation
Airbnb : An Entreprenuerial Growth Journey
Airbnb presentation
Presentation amazon, daraz, aliexpress
Financial Crimes
Ad

Viewers also liked (9)

PPTX
Tjx Conpanies Incorporated .ppt
PPTX
SWOT analysis of TJX LTD
PDF
The literature and write report on information system security part 1 of 5 p...
PPTX
Digital Signatures solution by ComsignTrust
PDF
Proyecto integrador de seguridad informatica
PPTX
Organizing for Effective Management: TJX
PPTX
Cold in the Earth
PPTX
Elegy for-my-father s-father
PPTX
The Trees are Down
Tjx Conpanies Incorporated .ppt
SWOT analysis of TJX LTD
The literature and write report on information system security part 1 of 5 p...
Digital Signatures solution by ComsignTrust
Proyecto integrador de seguridad informatica
Organizing for Effective Management: TJX
Cold in the Earth
Elegy for-my-father s-father
The Trees are Down
Ad

Similar to TJX Attack (20)

DOCX
Case in PointInaction Caused Costly Hacking At Large Retailer.docx
DOCX
TEACHING CASETargeting Target with a 100 million dollar da.docx
DOCX
TEACHING CASETargeting Target with a 100 million dollar da.docx
DOCX
TEACHING CASETargeting Target with a 100 million dollar da.docx
DOCX
NT2580 Week 1 Understanding IT Infrastructure Security An.docx
PPT
Idt Jc 02 09
PDF
IDT Red Flags White Paper By Wrf
DOCX
Target@ Data Breach2edit
DOCX
Cybersecurity Research Paper instructionsSelect a research topic.docx
PDF
Digital footprints (preview)
PDF
EMV in the U.S.: Putting It into Perspective for Merchants and Financial Inst...
PPT
Risk Managers Presentation
PDF
A Contextual Framework For Combating Identity Theft
PPT
Identity Theft Red Flags Rule for Business
PPTX
ID Theft and Computer Security 2008
DOCX
Interested in learning moreabout cyber security training.docx
PPT
Hr Idt Presentation Employee Version
PPTX
Privacy Presentation for SOCAP-3
PDF
New Kmart Data Breach lawsuit spotlights PCI DSS
Case in PointInaction Caused Costly Hacking At Large Retailer.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
NT2580 Week 1 Understanding IT Infrastructure Security An.docx
Idt Jc 02 09
IDT Red Flags White Paper By Wrf
Target@ Data Breach2edit
Cybersecurity Research Paper instructionsSelect a research topic.docx
Digital footprints (preview)
EMV in the U.S.: Putting It into Perspective for Merchants and Financial Inst...
Risk Managers Presentation
A Contextual Framework For Combating Identity Theft
Identity Theft Red Flags Rule for Business
ID Theft and Computer Security 2008
Interested in learning moreabout cyber security training.docx
Hr Idt Presentation Employee Version
Privacy Presentation for SOCAP-3
New Kmart Data Breach lawsuit spotlights PCI DSS

Recently uploaded (20)

PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Approach and Philosophy of On baking technology
PDF
Mushroom cultivation and it's methods.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
A Presentation on Touch Screen Technology
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Getting Started with Data Integration: FME Form 101
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
project resource management chapter-09.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Hybrid model detection and classification of lung cancer
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Encapsulation theory and applications.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Hindi spoken digit analysis for native and non-native speakers
Approach and Philosophy of On baking technology
Mushroom cultivation and it's methods.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
A Presentation on Touch Screen Technology
Assigned Numbers - 2025 - Bluetooth® Document
Getting Started with Data Integration: FME Form 101
Zenith AI: Advanced Artificial Intelligence
1 - Historical Antecedents, Social Consideration.pdf
project resource management chapter-09.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Hybrid model detection and classification of lung cancer
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
Encapsulation theory and applications.pdf

TJX Attack

  • 2. Largest Known Credit Card Theft TJX Companies Marshall’s T.J. Maxx Home Goods A.J. Goods
  • 3. What Happened? July 2005 Attackers gained access to the wireless network in a Marshall’s discount clothing store in Miami, FL. Over the next year, the internal network was systematically searched for valuable information. May 2006 Sniffer was installed on the network and over 80 GB of unencrypted data was sent to a site in California. December 2006 The incident was discovered by TJX and reported to law enforcement.
  • 4. How was it done? The store was protected with WEP (Wired Equivalent Privacy) Weakness of WEP has been known since 2002 and replacements available in 2003. The ‘cracking’ of WEP is trivial. The key can be gained in a matter of minutes. Once inside, the attackers created backdoor accounts and could work from anywhere in the world.
  • 5. What was stolen? Recent Estimates find more than 94 million credit cards exposed. 451,000 customers had a breach of personal records. Drivers license numbers Military ID numbers Social Security Numbers Much of the information contained Track 2 data. Track 2 data includes personal identification numbers and card verification codes and can be used to counterfeit payment cards.
  • 6. Related Damages May 19, 2007 Six suspects were arrested for credit card fraud in Florida. The six were accused of purchasing gift cards with credit card numbers from the TJX incident. In total, over $8 million in credit card charges were made.
  • 7. Related Damages August 21, 2007 Maksym Yastremskiy, 24, was arrested in the Turkish resort town of Kemer. He was tracked by U.S. Postal Inspection Service’s global investigations unit. He was trafficking more than 1 million credit card numbers. Numbers sold for $20 to $100.
  • 8. Latest News Friday September 9, 2007 TJX announces settlement of numerous class-action lawsuits Settlement Terms: Each impacted customer would receive 2 $30 vouchers for TJX stores. Customers who returned merchandise (leaving behind their drivers license number) would have credit monitoring for 3 years with $20,000 in ID theft coverage Settlement pending ruling by judge
  • 9. Latest News September 14, 2007 Irving Escobar sentenced to five years in prison and ordered to pay $600,000 restitution for his role in the gift card fraud in Florida. The Co-defendants all pled guilty and were sentenced to probation.
  • 10. Latest News October 22, 2007 New lawsuit against TJX Filed on behalf of 300 banks in Massachusetts, Maine and Connecticut to reclaim damages due to credit card replacement Pending decision from judge to bring to class-action status.
  • 11. Total Damages $68 million in Visa cards alone TJX lost $118 million in profits the 1 st quarter after the incident. Current estimates for TJX dealing with the incident are $256 million. It is estimated the total damages could exceed $1 Billion due to: Fraudulent credit card purchases Banks reissuing credit card Damage to personal credit.
  • 12. What went wrong? No Defense in Depth WEP was used Attackers were able to get to the corporate databases through remote stores network. Customer data was stored for too long (Some credit cards were from transactions in 2003) Customer data was stored that should not have been PCI DSS standards not followed
  • 13. What can be learned? Security must be incorporated in all aspects of business and risks must understood. Security is not a product you can buy. Security is a process that must constantly evolve. Do not store unnecessary information Don’t use WEP (thanks Josh)
  • 14. Joe Vest, (CISSP, CISA, CEH)   [email_address]
  • 15. References http://www.privcom.gc.ca/cf-dc/2007/TJX_rep_070925_e.asp http://www.securityfocus.com/brief/465 http://www.securityfocus.com/brief/594 http://online.wsj.com/article/SB117824446226991797.html http://www.securityfocus.com/news/11493/2 http://blog.washingtonpost.com/securityfix/2007/10/tjx_breach_was_twice_as_bad_as_1.html