Details emerging on Hannaford data breach

Malware loaded onto Hannaford servers let attackers intercept credit card data

Hannaford Brothers Cos, which earlier this month disclosed a data breach involving credit cards at its supermarket stores, this week shared more information with Massachusetts regulators about the ongoing investigation into the incident.

Hannaford Brothers Cos, which earlier this month disclosed a data breach involving credit cards at its supermarket stores, this week shared more information with Massachusetts regulators about the ongoing investigation into the incident.

In a letter to Massachusetts Attorney General Martha Coakley and Gov. Deval Patrick’s Office of Consumer Affairs, Hannaford’s general counsel Emily Dickinson shared details that Hannaford is uncovering in its investigation.

The letter stated that malware loaded onto Hannaford servers allowed attackers to intercept card data stored on the magnetic stripe of payment cards as customer’s used them at the check-out counter, according to information Hannaford provided to the Massachusetts Attorney General. That information, taken in transit from the point of sale, included card number and expiration date but not the customer’s name. The attack resulted in card data being transferred overseas and has resulted in 2,000 known cases of fraud.

“It’s an evolving situation,” said Carol Eleazer, vice president of marketing at Hannaford, noting that the computer forensics reports have not yet been completed on the data-breach incident.

Hannaford’s security investigators, whom she wasn’t at liberty to name, are calling the attack “sophisticated.” She said the U.S. Secret Service is also involved in finding out how the data breach occurred.

The attack was successful in spite of the fact that Hannaford is compliant with the Payment Card Industry rules for proving adherence to the PCI data security standards by undergoing an elaborate — and usually expensive — examination and certification required by card associations, including Visa and MasterCard.

PCI also has requirements for periodic vulnerability scans. Hannaford says it received PCI certification last year and was recertified on February 27.

Not surprisingly, the Hannaford data-breach case has already elicited a few customer lawsuits

Some analysts regard the ongoing Hannaford case as raising important and unanswered questions about PCI and its purpose.

If the attackers in the Hannaford case initially captured data from the point-of-sale device to a server in the store, they may have known that data isn’t required under PCI to be encrypted at that point, notes Avivah Litan, vice president at Gartner and an expert in computer network security used in retailing.

“PCI only calls for the need to encrypt across an open network, usually the Internet or wireless,” says Litan. “In retailing, you almost never encrypt between the cash register point of sale and the store server.”

As more information about the Hannaford data breach becomes known, there may be some industry effort to broaden the encryption requirement. However, Litan’s opinion is that requiring additional encryption would not necessarily be a good move because it would entail huge costs to retailers processing card data. Besides, she points out, the vulnerability scanning called for in PCI should address server weaknesses that would allow malware to be loaded onto a server.

Litan says the second point about PCI raised by the Hannaford case is where the financial liability for the card-related fraud losses lies.

The industry’s PCI mandate generally implies businesses that are PCI-compliant do not have to bear the cost burden of fraud resulting from criminals using cards obtained through a known data breach.

Under PCI, that financial burden would fall on the business’ bank (known as the acquiring bank) seeking to get its money back from a card-issuing bank when a data breach resulted in card fraud. The card associations, such as Visa, are also part of the resolution process under PCI, which hasn’t yet been tested in any known case.

“This all becomes who’s responsible,” says Litan, who said the Hannaford case may end up being one that casts light on how these important legal and financial concepts related to PCI play out in a real-world situation.

If PCI doesn’t offer any cover for businesses that go through the PCI certification process, notes Litan, the question will be why exactly should they be doing it?

Litan adds that the customer lawsuits filed against Hannaford are a separate matter legally that are bound to have an impact on the entire matter, as will any influence exerted by state or federal regulators.

Eleazer at Hannaford said the company has no immediate response to these complex legal questions, though it’s aware of the PCI rules. She says Hannaford regards PCI as “the gold standard for the industry.” Eleazer also said the company expects to share more about what occurred in the data breach “for the good of the retailing industry.”

“Our first priority is to our customers and our relationship with them,” she concluded.

Hannaford earlier acknowledged about 4.2 million credit and debit card numbers used at its supermarket stores in six states were compromised between Dec. 7 and March 10. It told the Massachusetts Attorney General’s Office that it now believes  the attack involved the installation of malware on servers in 300 stores.

Learn more about this topic

Hannaford supermarket chain discloses breach


Hannaford breach: lawsuits filed on behalf of victims


New retailer breach may affect thousands


Copyright © 2008 IDG Communications, Inc.

The 10 most powerful companies in enterprise networking 2022