All 2,200 Home Depot stores in the U.S. could be affected, security blogger says Credit: Thinkstock In what could turn out to be another huge data breach, Home Depot on Tuesday confirmed that it is investigating a potential compromise of credit card and debit card data belonging to an unspecified number of customers.Security blogger Brian Krebs , who first reported the breach, today estimated that it could end up being potentially even larger than the one at Target, which compromised data on more than 40 million payment cards.Several banks have reported that the intrusion at Home Depot occurred in late April or early May and remained undetected until recently, Krebs noted. Indications are that all 2,200 Home Depot stores in the U.S. may be affected.“If that is accurate — and if even a majority of Home Depot stores were compromised — this breach could be many times larger than Target,” Krebs wrote. Paula Drake, a Home Depot spokeswoman, said the company is investigating reports of a potential breach of its networks but provided little details on what might have happened.“At this point, I can confirm that we’re looking into some unusual activity and we are working with our banking partners and law enforcement to investigate,” Drake said in an emailed statement. “Protecting our customers’ information is something we take extremely seriously, and we are aggressively gathering facts at this point while working to protect customers. If we confirm that a breach has occurred, we will make sure customers are notified immediately.” Without further information, it would be inappropriate for the company to speculate on what might have happened, Drake added. “We will provide further information as soon as possible.”The Home Depot incident is the latest in a string of data thefts disclosed by U.S. businesses in recent days.Others who have made similar announcements over the past few weeks include Supervalu Inc., one of the largest U.S. grocery wholesalers and retailers, UPS Store Inc. and Dairy Queen.The breach disclosures come amid escalating concerns within the U.S. payment industry of hackers using malware code dubbed Backoff to steal data from point-of-sale (PoS) system networks. The hackers behind the breaches at Target, P.F Changs and Neiman Marcus are believed to have used Backoff to steal data from each company’s PoS systems.The U.S. Department of Homeland Security and the U.S. Secret Service have issued two alerts warning retailers about Backoff and noting that the malware has infected at least 1,000 U.S. businesses. In most cases, hackers were able to deposit the malware on PoS networks after first gaining access to them via remote access applications, the two agencies warned.The Payment Card Industry Security Standards Council, which oversees the PCI security standard, issued an urgent bulletin in late August urging retailers to review security controls and take additional protective measures, such as end-to-end encryption, to protect against the malware. Last Friday, security firm Kaspersky Labs warned that Backoff might have infected a lot more systems than generally perceived.“It is clear that criminals who are targeting the retail industry have tactics, techniques and procedures that most retailers aren’t well prepared to stop,” said Rob Sadowski, director of technology solutions at RSA, the security division of EMC. “Cyber criminals targeting payment card data are going after the biggest, most lucrative targets because they feel that they can succeed. And this latest breach, if the reports are true, is proving them right once again.”The latest breach appears to have followed the same pattern as previous breaches at Target, Nieman Marcus and P.F. Changs, said Michael Sutton, vice president of security research at security vendor ZScaler.“These breaches could have largely been avoided had U.S. retailers adopted the ‘chip and PIN’ technology mandated in debit and credit cards in most industrialized countries,” Sutton said. “The technology has not been widely adopted in the U.S. primarily due to lobbying by retailers who were concerned about the cost of implementing the technology.” The fact that many of these breaches are discovered by third parties and not the retailers themselves is especially troubling, Sutton said.“It is concerning that gigabytes of credit card data can be syphoned from hundreds of retails stores each day for months and ultimately be sent to attackers in Eastern Europe without alarms being raised or reacted to,” Sutton said. Related content news Conti-linked ransomware takes in $107 million in ransoms: Report A ransomware campaign linked to the ostensibly defunct Conti malware group has targeted mostly US businesses, in a costly series of attacks. By Jon Gold Nov 30, 2023 4 mins Ransomware Malware Cybercrime news Okta confirms recent hack affected all customers within the affected system Contrary to its earlier analysis, Okta has confirmed that all of its customer support system users are affected by the recent security incident. By Shweta Sharma Nov 30, 2023 3 mins Data Breach news Top cybersecurity product news of the week New product and service announcements from Wiz, Palo Alto Networks, Sophos, SecureAuth, Kasada, Lacework, Cycode, and more. By CSO staff Nov 30, 2023 17 mins Generative AI Security feature How to maintain a solid cybersecurity posture during a natural disaster Fire, flood, eathquake, hurricane, tornado: natural disasters are becoming more prevalent and they’re a threat to cybersecurity that isn’t always on a company’s radar. Here are some ways to prepare for the worst. By James Careless Nov 30, 2023 8 mins Security Operations Center Data and Information Security Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe