BreachExchange mailing list archives

Fwd: Important Information from the Kroger Family of Stores (breach letter)


From: security curmudgeon <jericho () attrition org>
Date: Mon, 4 Apr 2011 19:21:41 -0500 (CDT)


We previously posted a news article, courtesy of M.N. we have their 
notification letter as well:

---------- Forwarded message ----------

From: Kroger <kroger () krogermail com>
Date: April 1, 2011 5:16:53 PM CST

Subject: Important Information from the Kroger Family of Stores
Reply-To: "kroger" <17a1345f7layfovciawqmnmaaaaaabddgjybsiz4izeyaaaaa () krogermail com>


To ensure receipt of your Kroger emails, please add kroger () krogermail com to your address book.
If you are having trouble viewing this email, please click here.


Dear

Kroger wants you to know that the data base with our customers' names 
and email addresses has been breached by someone outside of the company. 
This data base contains the names and email addresses of customers who 
voluntarily provided their names and email addresses to Kroger. We want 
to assure you that the only information that was obtained was your name 
and email address. As a result, it is possible you may receive some spam 
email messages. We apologize for any inconvenience.

Kroger wants to remind you not to open emails from senders you do not 
know. Also, Kroger would never ask you to email personal information 
such as credit card numbers or social security numbers. If you receive 
such a request, it did not come from Kroger and should be deleted.

If you have concerns, you are welcome to call Kroger?s customer service 
center at 1-800-Krogers (1-800-576-4377).

Sincerely,

The Kroger Family of Stores


If you wish to create or edit your online Kroger profile, please click 
here.

The Kroger Co.
1014 Vine Street
Cincinnati, OH 45202
_______________________________________________
Dataloss Mailing List (dataloss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://datalossdb.org/mailing_list

Learn encryption strategies that manage risk and shore up compliance.
Download Article 1 of CREDANT Technologies' The Essentials Series:
Endpoint Data Encryption That Actually Works
http://credant.com/campaigns/realtime2/gap-LP1/


Current thread: