DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Citi Cards Japan data theft hits 92,408 in Japan

Posted on August 5, 2011 by Dissent

Thieves stole private data for more than 90 000 customers of Citigroup’s Japanese credit-cards subsidiary and resold it to others, the company said on Friday.

“Citi Cards Japan, Inc. (CCJ) has come to know that certain personal information of 92, 408 customers has allegedly been obtained and sold to a third party illegally,” the company said in a statement.

The compromised data includes account numbers, names, addresses and dates of birth but does not include PIN numbers or security codes for the affected cards, the Citigroup subsidiary said.

“While the risk of fraud is minimal due to the absence of security information, CCJ has placed internal fraud alerts and enhanced monitoring on all accounts identified,” it said.

Read more from AFP on fin24.  MarketWatch adds:

According to the Japanese credit card business arm of Citigroup, a person involved in a company to which Citi Cards outsourced part of its business had illicitly obtained the information and sold it to a third party. It has already reported the case to the police, it added.

[…]

The incident came to light in July following a report to Citi Cards by one of its customers who had noticed that his information had been leaked.

Carousel image credit: © Flynt | Dreamstime.com

Category: Breach IncidentsFinancial SectorInsiderNon-U.S.Of NoteSubcontractor

Post navigation

← 6000 accounts leaked from Good Taste by @neatstuffs
We need more breach notifications, not fewer →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Major trial underway for data leak that left 72,000 victims in France
  • Anubis: A Closer Look at an Emerging Ransomware with Built-in Wiper
  • HealthEC Agrees to $5.48 Million Settlement to End Data Breach Lawsuit
  • US offering $10 million for info on Iranian hackers behind IOControl malware
  • Sompo Japan Insurance submits improvement plan after info leakage
  • Moreno Valley, Calif., Schools Report Data Breach
  • The Growing Cyber Risks from AI — and How Organizations Can Fight Back
  • Credit Control Corporation data allegedly from 9.1 million consumers listed for sale on forum
  • Copilot AI Bug Could Leak Sensitive Data via Email Prompts
  • FTC Provides Guidance on Updated Safeguards Rule

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Your household smart products must respect your privacy – including your air fryer
  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation
  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.