Menu
Hackers accessed Goodwill hosting provider for 18 months before card breach

Hackers accessed Goodwill hosting provider for 18 months before card breach

C&K Systems, which provided payment technology to Goodwill, said two other unnamed businesses were also affected

Hackers evaded security systems for a year-and-a-half at a hosting center that processed payment cards for Goodwill Industries, using the same type of malware that struck Target and other major retailers to steal card data, according to the charity's software vendor.

In its first public statement since being identified by Goodwill as its technology partner, C&K Systems of Murrells Inlet, South Carolina, said two other customers were also affected by the unauthorized access, though it didn't name them.

Goodwill, which sells donated clothing, said in July that federal authorities were investigating a possible payment card breach at its U.S. outlets. It's one of many retailers, including Target, Neiman Marcus, Michaels, P.F. Chang's China Bistro and Sally Beauty, that have disclosed data breaches since December.

In a rare move, Goodwill identified C&K as one of the contractors that provided payment processing for 20 of its stores, and said those stores had since stopped using the company's services.

C&K couldn't be immediately reached by phone Tuesday. According to its statement, the company's managed services environment was breached "intermittently" between Feb. 10, 2013, and Aug. 14 of this year. Of the "many" payment cards that may have been compromised, it said, it knows of "less than 25" so far that have been used fraudulently.

The hosted systems were running software from "a leading POS [point-of-sale] vendor" that C&K said met the Payment Card Industry's Data Security Standards (PCI-DSS). Retailers are required to meet those standards or face greater penalties from card companies if a breach occurs.

An independent auditor determined that the card data was stolen using a malicious software program, RawPOS, which scrapes data from a point-of-sale terminal's memory. A similar type of malware, known as a RAM scraper, was blamed for the Target breach and others.

C&K said its security software had been unable to detect the RawPOS variant until Sept. 5. C&K has since put in place new security controls that will detect unauthorized access, it said, "along with cutting-edge technologies to identify potential zero-day advanced persistent threats."

Its unidentified POS vendor is also shoring up its systems, by rolling out a point-to-point encryption system, C&K said. Security experts have said that technology can defeat RAM scrapers since only encrypted data is held in RAM.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags C&K Systemssecuritydata breachGoodwill Industriesmalware

Featured

Slideshows

Tech industry comes together as Lexel celebrates turning 30

Tech industry comes together as Lexel celebrates turning 30

Leading figures within the technology industry across New Zealand came together to celebrate 30 years of success for Lexel Systems, at a milestone birthday occasion at St Matthews in the City.​

Tech industry comes together as Lexel celebrates turning 30
HP re-imagines education through Auckland event launch

HP re-imagines education through Auckland event launch

HP New Zealand held an inaugural Evolve Education event at Aotea Centre in Auckland, welcoming over 70 principals, teachers and education experts to explore ways of shaping and enhancing learning using technology.

HP re-imagines education through Auckland event launch
Reseller News ICT Industry Awards 2017 - Meet the winners...

Reseller News ICT Industry Awards 2017 - Meet the winners...

Reseller News honoured the industry’s finest on a standout evening for the New Zealand channel, recognising the achievements of established and emerging partners on a memorable night in Auckland.

Reseller News ICT Industry Awards 2017 - Meet the winners...
Show Comments