securityaffairs.co Open in urlscan Pro
2001:8d8:100f:f000::289  Public Scan

URL: https://securityaffairs.co/wordpress/124534/data-breach/costco-data-breach.html
Submission: On November 22 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

Name: searchformGET https://securityaffairs.co/wordpress/

<form role="search" method="get" name="searchform" id="searchform" action="https://securityaffairs.co/wordpress/">
  <div>
    <input type="text" value="" name="s" id="s" autocomplete="off" title="Search..." class="blur">
    <button type="submit">
      <i class="fa fa-search"></i>
    </button>
  </div>
  <div id="autocomplete"></div>
</form>

Text Content

 * Home
 * Cyber Crime
 * Cyber warfare
 * APT
 * Data Breach
 * Deep Web
 * Digital ID
 * Hacking
 * Hacktivism
 * Intelligence
 * Internet of Things
 * Laws and regulations
 * Malware
 * Mobile
 * Reports
 * Security
 * Social Networks
 * Terrorism
 * ICS-SCADA
 * EXTENDED COOKIE POLICY
 * Contact me


MUST READ

Headlines
 * Utah Imaging Associates data breach impacts 583,643 patients
 * Iran's Mahan Air claims it has failed a cyber attack, hackers say the
   opposite
 * New Memento ransomware uses password-protected WinRAR archives to block
   access to the files
 * US SEC warns investors of ongoing fraudulent communications claiming from the
   SEC
 * Experts found 11 malicious Python packages in the PyPI repository
 * Researchers were able to access the payment portal of the Conti gang



 * Home
 * Cyber Crime
 * Cyber warfare
 * APT
 * Data Breach
 * Deep Web
 * Digital ID
 * Hacking
 * Hacktivism
 * Intelligence
 * Internet of Things
 * Laws and regulations
 * Malware
 * Mobile
 * Reports
 * Security
 * Social Networks
 * Terrorism
 * ICS-SCADA
 * EXTENDED COOKIE POLICY
 * Contact me


RETAIL GIANT COSTCO DISCLOSES DATA BREACH, PAYMENT CARD DATA EXPOSED

November 13, 2021  By Pierluigi Paganini


Powered by pixfutureⓘ


COSTCO WHOLESALE CORPORATION DISCLOSES A DATA BREACH, THREAT ACTORS HAD ACCESS
TO CUSTOMERS’ PAYMENT CARD INFORMATION.

Retail giant Costco Wholesale Corporation notified its customers of a data
breach that might have exposed their payment card information. Data was
allegedly exposed while customers were shopping at one of its stores.

Powered by pixfutureⓘ

Costco discovered the security breach after its staff spotted a card skimming
device in one of its warehouses as part of a routine check. The company is
investigating the incident with the help of law enforcement and notified the
authorities.

The retail giant has 737 membership-only retail stores across the U.S., it is
the fifth-largest retailer in the world and the 10th-largest corporation in the
country by total revenue. The company also operates eCommerce websites for
shoppers in North and South America, Europe and Asia.

“We recently discovered a payment card skimming device at a Costco warehouse you
recently visited,” reads the notification letter sent to potentially impacted
customers. “Our member records indicate that you swiped your payment card to
make a purchase at the affected terminal during the time the device may have
been operating.”

Costco revealed that threat actors might have obtained customers’ payment
information through the skimmer.

Bleeping Computer reported that some customers claim that the security breach
could have taken place in February.



“If unauthorized parties were able to remove information from the device before
it was discovered, they may have acquired the magnetic stripe of your payment
card, including your name, card number, card expiration date, and CVV,” Costco
added.

The company recommends customers monitor their bank accounts and credit card
statements for fraudulent activities.

At this time, it is not clear the extent of the security breach, the company did
not reveal the number of potentially affected individuals either the warehouse
where the skimmer device was discovered.

Follow me on Twitter: @securityaffairs and Facebook



Pierluigi Paganini

(SecurityAffairs – hacking, skimmer)





Powered by pixfutureⓘ





Share this...

Facebook
Twitter
Linkedin


SHARE THIS:

 * Twitter
 * Print
 * LinkedIn
 * Facebook
 * More
 * 

 * Tumblr
 * Pocket
 * 
 * 


CostcoCybercrimedata breachHackinghacking newsinformation security newsIT
Information SecurityPierluigi PaganiniSecurity AffairsSecurity Newsskimming


--------------------------------------------------------------------------------

SHARE ON

 * 
 * 
 * 
 * 
 * 
 * 
 * 


PIERLUIGI PAGANINI

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and
Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he
is also a Security Evangelist, Security Analyst and Freelance Writer.
Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security
expert with over 20 years experience in the field, he is Certified Ethical
Hacker at EC Council in London. The passion for writing and a strong belief that
security is founded on sharing and awareness led Pierluigi to find the security
blog "Security Affairs" recently named a Top National Security Resource for US.
Pierluigi is a member of the "The Hacker News" team and he is a writer for some
major publications in the field such as Cyber War Zone, ICTTF, Infosec Island,
Infosec Institute, The Hacker News Magazine and for many other Security
magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency
and Bitcoin”.




--------------------------------------------------------------------------------

PREVIOUS ARTICLE

HTML Smuggling technique used in phishing and malspam campaigns

NEXT ARTICLE

New evolving Abcbot DDoS botnet targets Linux systems

--------------------------------------------------------------------------------





YOU MIGHT ALSO LIKE


UTAH IMAGING ASSOCIATES DATA BREACH IMPACTS 583,643 PATIENTS

November 22, 2021  By Pierluigi Paganini

IRAN’S MAHAN AIR CLAIMS IT HAS FAILED A CYBER ATTACK, HACKERS SAY THE OPPOSITE

November 22, 2021  By Pierluigi Paganini






 * SPONSORED CONTENT
   
   
 * 


 * PIXFUTURE


 * DIGGING THE DEEP WEB: EXPLORING THE DARK SIDE OF THE WEB


 * SECURITYAFFAIRS AWARDED AS BEST EUROPEAN CYBERSECURITY TECH BLOG AT EUROPEAN
   CYBERSECURITY BLOGGER AWARDS


 * CENTER FOR CYBER SECURITY AND INTERNATIONAL RELATIONS STUDIES


 * SUBSCRIBE SECURITY AFFAIRS NEWSLETTER




More Story

HTML SMUGGLING TECHNIQUE USED IN PHISHING AND MALSPAM CAMPAIGNS

Threat actors are increasingly using the HTML smuggling technique in phishing
campaigns, Microsoft researchers warn. Microsoft...
Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
 * Home
 * Cyber Crime
 * Cyber warfare
 * APT
 * Data Breach
 * Deep Web
 * Digital ID
 * Hacking
 * Hacktivism
 * Intelligence
 * Internet of Things
 * Laws and regulations
 * Malware
 * Mobile
 * Reports
 * Security
 * Social Networks
 * Terrorism
 * ICS-SCADA
 * EXTENDED COOKIE POLICY
 * Contact me

This site uses cookies, including for analytics, personalization, and
advertising purposes. For more information or to change your cookie settings,
click here.

If you continue to browse this site without changing your cookie settings, you
agree to this use.
Accept Read More
Privacy and Cookies Policy
Close

PRIVACY OVERVIEW

This website uses cookies to improve your experience while you navigate through
the website. Out of these cookies, the cookies that are categorized as necessary
are stored on your browser as they are essential for the working of basic
functionalities...
Necessary
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly.
This category only includes cookies that ensures basic functionalities and
security features of the website. These cookies do not store any personal
information.
Non-necessary
Non-necessary
Any cookies that may not be particularly necessary for the website to function
and is used specifically to collect user personal data via analytics, ads, other
embedded contents are termed as non-necessary cookies. It is mandatory to
procure user consent prior to running these cookies on your website.
SAVE & ACCEPT