The Buckle, Inc., a fashion retailer with over 450 stores across the U.S., notified customers on Friday afternoon that malware had been found on the point-of-sale (PoS) systems at some of its stores.
The malware was found on the PoS systems between October 28, 2016, and April 14, 2017. The malware used was designed to steal the data from the card’s magnetic stripe, which includes cardholder name, account number, and card expiration date.
The Buckle was quick to point out that EMV technology is supported at all its stores, making it that much more difficult for attackers to clone cards using the stolen data. However, the card data could be particularly useful for card-not-present fraud.
The Buckle has hired an outside firm to investigate the security incident, but as of now, there is no evidence showing social security numbers, email addresses, or physical addresses were compromised in this breach.
In response to the breach, The Buckle explained:
“As part of Buckle’s response, connections between Buckle’s network and potentially malicious external IP addresses were blocked, potentially compromised systems were isolated, and malware-related files residing on Buckle’s systems were eradicated.”
Retailers looking to protect themselves from falling victim to a PoS breach need to implement sophisticated monitoring solutions like File Integrity Monitoring to defend against malware and insider threats to card and customer data. This also is the NNT solution to Requirement 11: 11.1, 11.4, and 11.5 of the PCI DSS V3.2 standard.
Read this article on SecurityWeek