{"id":17016,"date":"2014-12-15T14:04:05","date_gmt":"2014-12-15T21:04:05","guid":{"rendered":"https://www.webroot.com/blog/?p=17016"},"modified":"2018-01-30T10:33:09","modified_gmt":"2018-01-30T17:33:09","slug":"breach-therapy-10-companies-cant-wait-2014","status":"publish","type":"post","link":"https://www.webroot.com/blog/2014\/12\/15\/breach-therapy-10-companies-cant-wait-2014\/","title":{"rendered":"Breach Therapy: 10 Companies Who Can&#8217;t Wait For 2014 To Be Over"},"content":{"rendered":"<p>Whether it be iPhones with bigger screens, major video game releases to make next-gen systems finally worth it, or wearables that are actually appealing to consumers, it&#8217;s safe to say any technological &#8216;advancement&#8217; of this year was overshadowed by the seemingly endless wave of breaches that plagued companies and consumers alike.<\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/12\/Massive-Data-Breaches.png\"><img decoding=\"async\" loading=\"lazy\" width=\"300\" height=\"121\" class=\"alignnone size-medium wp-image-17025\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/12\/Massive-Data-Breaches-300x121.png\" alt=\"Massive Data Breaches\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/12\/Massive-Data-Breaches-300x121.png 300w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/12\/Massive-Data-Breaches-1024x416.png 1024w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/12\/Massive-Data-Breaches.png 1178w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>With the New Year only a couple weeks and change away, let&#8217;s look back at 2014, aka the &#8216;Year of the Breach&#8217;, and revisit\u00a010 companies who\u00a0want nothing more than to forget their breach nightmares and start fresh in 2015:<\/p>\n<p><strong>Michaels<\/strong><\/p>\n<p>Going back almost a full year to January, and you have what was one of the first post-Target breach breaches to come to light. According to numerous sources (and\u00a0<a href=\"http:\/\/krebsonsecurity.com\/2014\/01\/sources-card-breach-at-michaels-stores\/\">reported<\/a>\u00a0by the ever-informed Brian Krebs), all signs were pointing to a potential Michaels breach. That same day (January 14), the US Secret Service said it was investigating further.<\/p>\n<p>Fast-forward to April and we get\u00a0the confirmation, with Michaels Stores Inc. announcing that 3 million customer credit and debit cards were stolen in Michaels and Aaron Brothers stores as a result of two eight-month long security breaches.<\/p>\n<p><strong>Goodwill<\/strong><\/p>\n<p>On July 21st, news of another breach started coming in. This time, the victim was Goodwill Industries. Or more specifically, the systems of a third-party vendor that processes payments for some Goodwill members (20 to be exact,\u00a0which represents ~10% of all stores).<\/p>\n<p>This breach, which was determined to be caused by a piece of malware called &#8216;Rawpos&#8217;, resulted in\u00a0exposed information of 868,000 customer credit cards. Goodwill released details of the breach in September on their\u00a0<a href=\"http:\/\/www.goodwill.org\/press-releases\/goodwill-provides-update-on-data-security-issue\/\">site<\/a>.<\/p>\n<p><strong>The Home Depot<\/strong><\/p>\n<p>Speaking of September, that was a rough month for The Home Depot, which began when the company said it was &#8220;investigating some unusual activity with regards to its customer data.&#8221;<\/p>\n<p>That &#8216;unusual activity&#8217; ended up being a massive breach that involved pretty much every Home Depot location in the country.<\/p>\n<p>Sure enough, six days after the initial reports started filing in, the company admitted that its payment systems were in fact breached, and that the attack was going on for months. \u00a0What was not yet known was the scope of the attacks.<\/p>\n<p>That\u00a0<a href=\"https:\/\/community.webroot.com\/t5\/Security-Industry-News\/Home-Depot-Investigating-Potential-Breach\/m-p\/150759#M8730\">announcement<\/a>\u00a0came 10 days later, with The Home Depot saying that the malware was contained, 56 impacted debit and credit cards later. The disclosure made the incident\u00a0the largest retail card breach&#8230;ever recorded.<\/p>\n<p><strong>Japan Airlines<\/strong><\/p>\n<p>On October 1st, with The Home Depot breach still fresh on peoples&#8217; minds, Japan Airlines said that it was the latest\u00a0<a href=\"https:\/\/community.webroot.com\/t5\/Security-Industry-News\/Japan-Airlines-Breach-Exposes-750-000-People-s-Personal-Data\/m-p\/154629#M9052\">breach victim<\/a>\u00a0and that 750,000 frequent flyer club members&#8217; information may have been stolen after hackers breached JAL&#8217;s Customer Information Management System and installed malware on computers that had access to the system.<\/p>\n<p>The potentially stolen data included everything from customer names to membership numbers and home addresses.<\/p>\n<p><strong>JP Morgan<\/strong><\/p>\n<p>And then, just one day later, JP Morgan confirmed an absolutely giant breach that affected 76 million households and 7 millions small businesses. Affected were customers who used Chase.com and JPMorganOnline websites, and the Chase and JP Morgan online apps.<\/p>\n<p>Stolen information included names, email addresses, phone numbers, and home addresses, but more potentially-devastating information such as account numbers, passwords, and Social Security numbers were not believed to be impacted.<\/p>\n<p>Fox Business also came out with a report saying that the nation&#8217;s largest bank was also bracing for a mass-scale spear-phishing campaign right after the breach was exposed, and that the stolen info was the &#8216;first wave&#8217; that would help the cybercriminals steal the aforementioned &#8216;good stuff&#8217;, which they could do with legitimate-looking emails targeting those customers who&#8217;s data they already nabbed.<\/p>\n<p>While no such campaign has yet happened, it has not yet been determined for sure who was responsible for the breach and the investigation is still ongoing.<\/p>\n<p>You can find more detailed descriptions of The Home Depot, Japan Airlines, and JP Morgan breaches in a\u00a0<a href=\"https://www.webroot.com/blog/2014\/10\/06\/son-breach-can-companies-just-safeguard-customers\/\">previous blog\u00a0<\/a>I wrote.<\/p>\n<p><strong>Kmart<\/strong><\/p>\n<p>Later\u00a0in October, Sears Holdings Corporation announced that it\u00a0<a href=\"https:\/\/community.webroot.com\/t5\/Security-Industry-News\/Malware-Based-Credit-Card-Breach-at-Kmart\/m-p\/157915\/highlight\/true#M9359\">discovered a breach\u00a0<\/a>at its Kmart stores that was due to malware on their POS \u00a0(Point-of-Sale) machines. At that time, Sears also announced that the malware was removed and that there was an ongoing investigation.<\/p>\n<p>The investigation went on to reveal that the attack started in early September, which means that the breach was going on for a full month. Despite that, Kmart said that no personal customer information was stolen as a result of the breach.<\/p>\n<p><strong>Staples<\/strong><\/p>\n<p>Just over a week after the Kmart breach, Brian Krebs reported that he got information from multiple banks who said they were seeing a patter of credit card fraud linking back to a series of Staples stores in the Northeastern part of the country. At that time, Staples said it was investigating the issue.<\/p>\n<p>According to a\u00a0<a href=\"http:\/\/www.bloomberg.com\/news\/2014-11-19\/staples-says-it-can-t-yet-estimate-breach-losses.html\">Bloomberg update<\/a>\u00a0from last month, Staples said that it believed the malware that caused was identified and eliminated, but that the investigation was still in its early stages and that they could not yet estimate the scope of the breach or how much data was stolen.<\/p>\n<p>Last month, it was also reported that a\u00a0<a href=\"https:\/\/community.webroot.com\/t5\/Security-Industry-News\/Link-Found-in-Staples-Michaels-Breaches\/m-p\/172053\/highlight\/true#M10317\">link was found<\/a>\u00a0connecting the Staples and Michaels breaches.<\/p>\n<p><strong>USPS<\/strong><\/p>\n<p>On November 10th, numerous reports came out saying that the United States Postal Service was breached back in September, and that Chinese hackers were responsible.<\/p>\n<p>This\u00a0<a href=\"https:\/\/community.webroot.com\/t5\/Security-Industry-News\/Massive-Postal-Service-breach-hits-employees-and-customers\/m-p\/169749\/highlight\/true#M10156\">breach<\/a>\u00a0impacted both employees and customers, compromising\u00a0data of 800,000 workers and 2.9 million customers.<\/p>\n<p><strong>Bebe<\/strong><\/p>\n<p>Earlier this month, security researcher Brian Krebs got word from banks about fraudulent charges on credit cards that were recently used at Bebe women&#8217;s clothing stores across the nation.<\/p>\n<p>Sure enough, just a day later, Bebe Stores Inc.\u00a0<a href=\"https:\/\/community.webroot.com\/t5\/Security-Industry-News\/Banks-Credit-Card-Breach-at-Bebe-Stores\/m-p\/175310\/highlight\/true#M10756\">confirmed<\/a>\u00a0the breach, saying that the hackers got hold of customer information that may include customer names, account numbers, card expiration dates, and verification codes.<\/p>\n<p><strong>Sony<\/strong><\/p>\n<p><a href=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/12\/Sony-Breach.png\"><img decoding=\"async\" loading=\"lazy\" width=\"300\" height=\"181\" class=\"alignnone size-medium wp-image-17024\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/12\/Sony-Breach-300x181.png\" alt=\"Sony Breach\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/12\/Sony-Breach-300x181.png 300w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2014\/12\/Sony-Breach.png 944w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>(Source: IB Times UK)<\/p>\n<p>The latest, and perhaps most devastating (for the company affected, at least) of all 2014 breaches, the attack on Sony continues to make headlines daily as new details emerge and new information is leaked.<\/p>\n<p>This breach has all the ingredients for a Hollywood flick (a mysterious enemy, global threats, massive exposure, a potential inside job, etc), which is ironic, considering that <em>The Interview<\/em>,\u00a0a Hollywood comedy about two accidental &#8216;agents&#8217; assigned to assassinate North Korea&#8217;s leader Kim Jong-un, may be what started the breach to begin with.<\/p>\n<p>So far, the attack has crippled Sony&#8217;s corporate network, exposed personal employee information such as executives&#8217; salaries, social security numbers and medical records, and leaked email conversations that have landed some top execs in hot water. And <a href=\"https:\/\/community.webroot.com\/t5\/Security-Industry-News\/Sony-Breach-New-Details-Emerge\/td-p\/176727\">new details<\/a> are continuing to emerge.<\/p>\n<p>This list highlights only 10 of some of the most prominent companies that experienced a breach this year. As you can see, no industry is safe and no two breaches are exactly the same. The one constant? All 10 of these companies will have &#8216;Don&#8217;t get breached!&#8217; as one of their New Year&#8217;s Resolutions.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whether it be iPhones with bigger screens, major video game releases to make next-gen systems finally worth it, or wearables that are actually appealing to consumers, it&#8217;s safe to say any technological &#8216;advancement&#8217; of this year was overshadowed by the seemingly endless wave of breaches that plagued companies and consumers alike. With the New Year [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[3485,18521,18257,4965,18515,5855,18525,18517,18527,18529,18283,3557,18291,18251,18519,18513,18297,6305,18285,18523],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/17016"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=17016"}],"version-history":[{"count":8,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/17016\/revisions"}],"predecessor-version":[{"id":17026,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/17016\/revisions\/17026"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17048"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=17016"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=17016"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=17016"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=17016"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}