TribLIVE

| News


 
Larger text Larger text Smaller text Smaller text | Order Photo Reprints

Target: Customers' encrypted PINs were obtained

By The Associated Press
Friday, Dec. 27, 2013, 1:27 p.m.
 

ATLANTA — Target said Friday that debit-card PINs were among the financial information stolen from millions of customers who shopped at the retailer earlier this month.

The company said the stolen personal identification numbers, which customers type in to keypads to make secure transactions, were encrypted and that this strongly reduces risk to customers. In addition to the encrypted PINs, customer names, credit and debit card numbers, card expiration dates and the embedded code on the magnetic strip on back of the cards were stolen from about 40 million credit and debit cards used at Target stores between Nov. 27 and Dec. 15.

Security experts say it's the second-largest theft of card accounts in U.S. history, surpassed only by a scam that began in 2005 involving retailer TJX Cos.

Target said it doesn't have access to nor does it store the encryption key within its system, and the PIN information can only be decrypted when it is received by the retailer's external, independent payment processor.

“We remain confident that PIN numbers are safe and secure,” spokeswoman Molly Snyder said in an emailed statement Friday. “The PIN information was fully encrypted at the keypad, remained encrypted within our system, and remained encrypted when it was removed from our systems.” The company maintains that the “key” necessary to decrypt that data never existed within Target's system and could not have been taken during the hack.

However, Gartner security analyst Avivah Litan said Friday that the PINs for the affected cards are not safe and people “should change them at this point.”

Litan said that while she has no information about the encrypted PIN information in Target's case, such data has been decrypted before, in particular the 2005 TJX Cos. hacking case that's believed the largest case of identity theft in U.S. history.

In 2009 computer hacker Albert Gonzalez plead guilty to conspiracy, wire fraud and other charges after masterminding debit and credit card breaches in 2005 that targeted companies such as T.J. Maxx, Barnes & Noble and OfficeMax. Gonzalez's group was able to decrypt encrypted data. Litan said changes have been made since then to make decrypting more difficult but “nothing is infallible.”

“It's not impossible, not unprecedented (and) has been done before,” she said.

Besides changing your PIN, Litan says shoppers should opt to use their signature to approve transactions instead because it is safer.

Still, she said Target did “as much as could be reasonably expected” in this case. “It's a leaky system to begin with,” she said.

Credit card companies in the U.S. plan to replace magnetic strips with digital chips by the fall of 2015, a system already common in Europe and other countries that makes data theft more difficult.

Minneapolis-based Target Corp. said it is still in the early stages of investigating the breach. It has been working with the Secret Service and the Department of Justice.

 

 
 


Show commenting policy

Most-Read Stories

  1. Pirates fall short in bid for Lester, who’s traded to Oakland
  2. EPA talks on pollution limits trigger protests, arrests Downtown
  3. After years of lobbying, Big Ben has Steelers running the no-huddle
  4. Pa. senator investigates Rocky Mountain high at taxpayers’ expense
  5. Spaling, Penguins agree to $4.4 million deal
  6. It’s lights out for Bayer sign on Mt. Washington
  7. Steelers hold high hopes for pass defense
  8. Steelers notebook: Brown calls Sanders’ comments about Roethlisberger ‘terrible’
  9. 2 more charged in PennDOT corruption investigation
  10. Oakland eatery Fuel & Fuddle to reopen under new owners
  11. Beloved teacher at 3 Western Pa. schools hears from students across nation
Subscribe today! Click here for our subscription offers.