BreachExchange mailing list archives

follow-up: Michaels Breach: 4 Suspects Sought


From: security curmudgeon <jericho () attrition org>
Date: Mon, 27 Jun 2011 02:57:56 -0500 (CDT)



---------- Forwarded message ----------
From: InfoSec News <alerts () infosecnews org>

http://www.bankinfosecurity.com/articles.php?art_id=3785

By Tracy Kitten
Managing Editor
Bank Info Security
June 24, 2011

In a new twist to the Michaels point-of-sale breach, a police department 
in Oregon is asking the public to help nab suspects believed to be 
involved in the card skimming scheme.

Police in Beaverton, Ore., are investigating 50 fraud reports related to 
the breach, which Michaels has confirmed likely compromised debit accounts 
in 20 states.

Now Beaverton police say they are enlisting the public's help to identify 
four suspects who were caught on camera using fake or white cards, created 
from card details skimmed at area Michaels stores, at Oregon ATMs. "The 
suspects involved in these fraudulent crimes are from a larger 
organization which allows multiple crews to work numerous areas and move 
around quickly," Beaverton officer Pam Yazzolino with the Beaverton Police 
Department told local news media.

The breach, which at first was suspected of only affecting a select group 
of Chicagoans, quickly grew to become one of the most widespread incidents 
of POS PIN pad swapping the U.S. payments industry has ever seen.

[...]
_______________________________________________
Dataloss Mailing List (dataloss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://datalossdb.org/mailing_list

Learn encryption strategies that manage risk and shore up compliance.
Download Article 1 of CREDANT Technologies' The Essentials Series:
Endpoint Data Encryption That Actually Works
http://credant.com/campaigns/realtime2/gap-LP1/


Current thread: