Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

Target confirms customer PINs were taken in breach, but says data is safe

But the PINs were encrypted and therefore should be inaccessible to hackers, according to the retailer

Target has confirmed that hackers obtained customer debit card PINs (personal identification numbers) in the massive data breach suffered by the retailer during the busy holiday shopping season, but says customers should be safe, as the numbers were encrypted.

Some 40 million customer debit and credit cards were affected by the breach, but until now it wasn't clear that PINs were part of the hackers' massive haul.

"While we previously shared that encrypted data was obtained, this morning through additional forensics work we were able to confirm that strongly encrypted PIN data was removed," Target said in a statement on its website Friday. "We remain confident that PIN numbers are safe and secure. The PIN information was fully encrypted at the keypad, remained encrypted within our system, and remained encrypted when it was removed from our systems."

When Target customers use their debit cards, the PIN is secured with Triple DES encryption at the checkout keypads, according to the statement. "Target does not have access to nor does it store the encryption key within our system," it adds. "The PIN information is encrypted within Targets systems and can only be decrypted when it is received by our external, independent payment processor. What this means is that the 'key' necessary to decrypt that data has never existed within Targets system and could not have been taken during this incident."

The company didn't reveal how many PINs were taken, or whether it even knows the total at this point in its probe.

Target is still in the early stages of its investigation into the breach, according to Friday's statement. The company previously said it was working alongside the U.S. Secret Service and Department of Justice on the investigation.

U.S. lawmakers have called for an immediate investigation into Target's security practices. The retailer has said customers will not be forced to pay for any fraudulent charges on their card, and are also eligible to receive credit monitoring at no charge.

Chris Kanaracus covers enterprise software and general technology breaking news for The IDG News Service. Chris' email address is Chris_Kanaracus@idg.com

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

More about: Department of Justice, IDG
Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: Target, security, data breach, software, Identity fraud / theft
Latest Blog Posts
Whitepapers
  • Software Defined Protection - The Enterprise Security Blueprint
    In a world with high-demanding IT infrastructures and networks, where perimeters are no longer well defined and where threats grow more intelligent every day, we need to define the right way to protect enterprises in the ever-changing threat landscape. Download today to define your security blueprint.
    Learn more »
  • The Three Essential Steps to Successful Cloud Migration
    Businesses and enterprises have quickly realised the power and efficiency of cloud computing, but migrating to the cloud can be a challenging process. This guide leads you through the three key steps you should take to assess your workload, select the most appropriate cloud model and ensure your cloud provider’s migration methodology stacks up.
    Learn more »
  • Is Your IT Infrastructure Keeping Up?
    This helpful infographic demonstrates how, when IT is the backbone of modern business, a converged infrastructure system can solve the challenge of cost, complexity, availability, rapid provisioning and flexibility.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments