Menu
Retailer Fred's found payment card malware on two servers

Retailer Fred's found payment card malware on two servers

It doesn't appear card details were removed from its systems, Fred's said

Fred's said Monday it found malware designed to steal payment card numbers on two servers but data doesn't appear to have been removed from its systems.

Fred's said Monday it found malware designed to steal payment card numbers on two servers but data doesn't appear to have been removed from its systems.

Retailer Fred's said Monday it found malware that collected payment card details on two of its servers, but it doesn't appear the data was removed from its systems.

The malware was on the servers since March 23, operating through April 8 on one and through April 24 on the other, the company said in a statement. It has since been removed.

The malware was designed to collect so-called track 2 data contained on the magnetic stripe of payment cards, which Fred's said contained the card number, expiration date and verification code. No other customer information is at risk.

"During this time period, track 2 data was at risk of disclosure; however, the third-party cyber-security firm did not find evidence that track 2 data was removed from the company's system," the retailer said. Law enforcement is also investigating.

Fred's runs 650 discount stores, mostly in the southeastern part of the U.S. It is just one of many retailers that have recently battled with cybercriminals who have infiltrated payment systems with malware that steals payment card details.

Victims have included Target, Neiman Marcus, White Lodging, Michaels and The UPS Store. In many instances, attackers targeted point-of-sale systems with RAM-scraping malware, which collects unencrypted payment card details while they're briefly held in a computer's memory.

Fred's said it "has implemented and is continuing to implement enhanced security measures to prevent similar events from occurring in the future."

The company said it could not estimate how much the suspected breach would cost, although it did say it has cybersecurity risk insurance, which may cover some breach-related expenses.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags malwareFred's

More about FredFred'sTwitter

Show Comments
[]