DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Walmart: no, there’s been no breach of walmart.com

Posted on February 8, 2013 by Dissent

I was surprised to read a news report tonight that Walmart.com had been hacked. Part of my surprise was due to the fact that mainstream media did not have the story but a site called SandhillsExpress.com in Nebraska was reporting it:

Ericka and Mike Hunt of Broken Bow were reviewing their bank account online this week and discovered a charge to Walmart.com for nearly $500.00 that they had not made. The Hunt’s contacted their bank, Wal-Mart’s Corporate Office, the Police Department in the town in Alabama where the order was to be shipped, and the local Police Department in Broken Bow. What they discovered is that someone has hacked in to the Wal-Mart records and stolen card numbers and personal information from several accounts. The Alabama Police Department told the Hunt’s that they were approximately the 15th phone call about the same problem. The Hunts were lucky to catch this problem quickly and were able to cancel the shipment and hope to have their money back soon. They also deleted their Wal-Mart account, which they had not used since last fall and changed passwords on all of their online accounts for precautionary reasons. They asked us to tell their story in hopes that no one else will be affected by this problem. We are awaiting a response from Wal-Mart’s Media Relations Department to get a comment on this issue.

I contacted Walmart tonight, and they promptly sent me the following statement by their spokesperson for eCommerce:

Customer privacy is a top priority to us. We’re aware of this particular matter and are working with the customer to help them resolve the situation. To be clear, there is no indication of an internal security breach of the Walmart.com system or accounts. In these situations, there are unrelated ways that third parties obtain user names and passwords, such as a phishing attack or by planting malware on users’ computers. Even in these situations, the full credit card number is not visible in a customer’s account. When we become aware of these matters, we work immediately with our customers to help them protect their online security.

Reporting that a large e-commerce site has been hacked when it hasn’t been can do unfair reputation harm to the business and make customers leery of shopping online there. I’m not sure how the Hunt’s “discovered” that someone had hacked Walmart’s server, but sometimes 2 + 2= 5.

In the meantime, there’s nothing to see here, so move along.

Category: Commentaries and Analyses

Post navigation

← Maybe if we shout?
How not to explain a breach, Sunday edition →

2 thoughts on “Walmart: no, there’s been no breach of walmart.com”

  1. Lana says:
    February 24, 2013 at 4:55 pm

    Except for the fact that several months out of 2012, there were literally hundreds of customers with accounts at walmart.com getting unauthorized charges on their credit cards, mainly for walmart products/purchases as well as charges for gift cards they never ordered. You can’t blame 90% of walmart’s customers for insecure passwords, particularly when a thief can get thousands with one hack job, therefore stealing data from thousands of customers who otherwise had strong passwords. In other words, Walmart had lack security measures that allowed hacking into their servers and compromising data. The same has happened at numerous large and popular online retailer sites, so the blaming of customers is moot, it’s the retailers who are at fault.

    It also helps explain the unusual and multiple times that walmart.com online servers were down, down for maintenance, and down with no given reasons by walmart themselves. In two months, I have personally experienced downtime and database errors no less than 8 times. There’s something very very wrong and insecure about that. They have also had serious database errors during their checkout systems in the last few months, with absolutely no resolve, but the customer is at risk due to the insecure process.

    Additionally, Walmart wants to blame the consumer for having phishing or malware on their systems, but fail to recognize that those customers who actually investigated, found that these issues were not present, the issues are, simply, Walmart does not protect your data.

    Retailers have relationships with major credit card companies. Every single credit card company requires online retailers to DELETE confidential information (credit card data, like CVV) after each transaction is complete. But, retailers are not abiding by their associated credit card company’s rules. Still want to blame consumers for that too? Customers, banks, credit card companies, and police departments can’t all be wrong in this case!

  2. Anna says:
    February 25, 2013 at 9:57 pm

    SOmething was up on their site because on Jan 29, 2013 I got an email verifying an order I didn’t place. It was for an e-gift card and for legos (yep legos!) for pick up in Florida which is not the state I live in. I got the order cancelled since I caught it so quickly. Sadly, neither my credit card nor walmart seems to be pursuing this since no one was out any money.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)
  • Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines
  • Call for Public Input: Essential Cybersecurity Protections for K-12 Schools (2025-26 SY)
  • Cyberattack puts healthcare on hold for hundreds in St. Louis metro
  • Europol: DDoS-for-hire empire brought down: Poland arrests 4 administrators, US seizes 9 domains

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results
  • Missouri Clinic Must Give State AG Minor Trans Care Information
  • Georgia hospital defeats data-tracking lawsuit
  • No Postal Service Data Sharing to Deport Immigrants
  • DOGE aims to pool federal data, putting personal information at risk
  • Privacy concerns swirl around HHS plan to build Medicare, Medicaid database on autism

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.