DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Data Theft Hits Mainers

Posted on January 22, 2009 by Dissent

Fraudulent charges from Heartland breach were appearing between May 16 and August 19th.

Tux Turkel reports:

Hundreds of Maine credit and debit card holders appear to have been victims of a nationwide data theft carried out against Heartland Payment Systems, which processes cards for 250,000 restaurants, retailers and other businesses.

Several Maine credit unions have been told by Visa and MasterCard that fraudulent charges were placed on members’ cards between May 16 and August 19, 2008, according to Jon Paradise, a spokesman for the Maine Credit Union League. Many of the charges were tallied at Wal-Mart stores in Texas, he said.

[…]

At PeoplesChoice Credit Union in Saco, the Heartland news settles a three-month mystery.

“We’ve been experiencing losses since October,” said Luke Labbe, president and chief executive officer. “We couldn’t figure out where they were coming from.”

The credit union noticed a pattern, in which small charges were being rung up at gas stations in the South, followed by a $500 or so charge at a nearby Wal-Mart. Labbe has since learned that 500 or so Visa credit and debit cards issued by the credit union may have been compromised by the Heartland data breach, and that 50 or 60 customers actually have fraudulent charges on their cards.

[…]

TD Banknorth said it had determined that some debit and credit card customers are affected, and is working with Visa and other agencies in the preliminary stages of an investigation. It declined to provide further details, except to say its fraud detection technology hadn’t detected any activity related to Heartland.

“At this time, we don’t have plans to do a mass-reissue of cards for impacted customers, because of the fraud detection tools we have in place,” the bank said in a written statement.

Bangor Savings Bank, which has 70,000 Visa cardholders, said its internal fraud-detection software had so far not detected any problems. For now, the bank isn’t planning to reissue new cards for all customers, relying instead on its monitoring technology to pick up fraudulent activity.

Read more in the Portland Press Herald


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Toys “R” Us Canada customers notified of breach of personal information
  • Confidence in ransomware recovery is high but actual success rates remain low
  • Kaufman County's data breach was their second one in three weeks
  • Hacking Formula 1: Accessing Max Verstappen's passport and PII through FIA bugs
Category: Breach IncidentsFinancial SectorHackID TheftMalwareU.S.

Post navigation

← Credit card cloning on the rise
PA: Woman used inside credit info for identity theft, police say →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.