Menu
Retailer Fred's found payment card malware on two servers

Retailer Fred's found payment card malware on two servers

It doesn't appear card details were removed from its systems, Fred's said

Fred's said Monday it found malware designed to steal payment card numbers on two servers but data doesn't appear to have been removed from its systems.

Fred's said Monday it found malware designed to steal payment card numbers on two servers but data doesn't appear to have been removed from its systems.

Retailer Fred's said Monday it found malware that collected payment card details on two of its servers, but it doesn't appear the data was removed from its systems.

The malware was on the servers since March 23, operating through April 8 on one and through April 24 on the other, the company said in a statement. It has since been removed.

The malware was designed to collect so-called track 2 data contained on the magnetic stripe of payment cards, which Fred's said contained the card number, expiration date and verification code. No other customer information is at risk.

"During this time period, track 2 data was at risk of disclosure; however, the third-party cyber-security firm did not find evidence that track 2 data was removed from the company's system," the retailer said. Law enforcement is also investigating.

Fred's runs 650 discount stores, mostly in the southeastern part of the U.S. It is just one of many retailers that have recently battled with cybercriminals who have infiltrated payment systems with malware that steals payment card details.

Victims have included Target, Neiman Marcus, White Lodging, Michaels and The UPS Store. In many instances, attackers targeted point-of-sale systems with RAM-scraping malware, which collects unencrypted payment card details while they're briefly held in a computer's memory.

Fred's said it "has implemented and is continuing to implement enhanced security measures to prevent similar events from occurring in the future."

The company said it could not estimate how much the suspected breach would cost, although it did say it has cybersecurity risk insurance, which may cover some breach-related expenses.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags malwareFred's

Featured

Slideshows

How MSPs can capitalise on integrating AI into existing services

How MSPs can capitalise on integrating AI into existing services

​Given the pace of change, scale of digitalisation and evolution of generative AI, partners must get ahead of the trends to capture the best use of innovative AI solutions to develop new service opportunities. For MSPs, integrating AI capabilities into existing service portfolios can unlock enhancements in key areas including managed hosting, cloud computing and data centre management. This exclusive Reseller News roundtable in association with rhipe, a Crayon company and VMware, focused on how partners can integrate generative AI solutions into existing service offerings and unlocking new revenue streams.

How MSPs can capitalise on integrating AI into existing services
Access4 holds inaugural A/NZ Annual Conference

Access4 holds inaugural A/NZ Annual Conference

​Access4 held its inaugural Annual Conference in Port Douglass, Queensland, for Australia and New Zealand from 9-11 October, hosting partners from across the region with presentations on Access4 product updates, its 2023 Partner of the Year awards and more.

Access4 holds inaugural A/NZ Annual Conference
Show Comments