DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

New Hagens Berman Lawsuit: Target Was Informed of Data Vulnerability in 2007, but Ignored Danger

Posted on January 14, 2014 by Dissent

Press release:

SEATTLE– January 14, 2014– Today consumers represented by law firm Hagens Berman Sobol Shapiro LLP filed a proposed class-action lawsuit against Target (NYSE: TGT) claiming the retail giant ignored warnings from as early as 2007 that the company’s point-of-sale (POS) system was vulnerable to attack, a move that put millions of Americans’ credit-cards and personal information at risk after the system was penetrated by unknown attackers on or about Nov. 17, 2013.

The lawsuit, filed by consumer-rights law firm Hagens Berman in the U.S. District Court for the Northern District of California, claims that security expert Dr. Neal Krawetz alerted Target and other major national retail chains about its vulnerability to attack in a white paper outlining POS vulnerabilities at major retailers. The paper warned that security shortcomings in POS systems could put the financial information of consumers at risk. The white paper used Target as a specific example of the potential impact, estimating that as many as 58 million consumers could be at risk of account theft unless the retailer took steps to fix the issues.

The complaint alleges that a Target developer responsible for the retailer’s POS system was sent the white paper, acknowledged receiving it, and requested permission to send it to other Target employees. Attorneys claim that the developer also described Dr. Krawetz’s suggestions as “good ideas.” However, the lawsuit claims, Target ultimately failed to implement Dr. Krawetz’s proposed security fixes, and thus remained vulnerable to the attack that followed several years later.

“We believe that Target not only knew its systems were vulnerable to exactly this kind of attack all the way back in 2007, but was alerted to and acknowledged suggestions that would have made its customers safer,” said Tom Loeser, a Hagens Berman Partner and former federal prosecutor in the Cyber and Intellectual Property Crimes Section of the U.S. Attorneys’ Office in Los Angeles. “However, Target did not act on this knowledge, and as a result, tens of millions have had their personal information stolen and financial accounts compromised.”

The lawsuit also claims that Target was likely not compliant with industry standards for security, such as the PCI Data Security Standard (“PCI DSS”). For instance, the suit quotes an analyst who notes that three-digit CVV codes must have been stored in order for them to have been stolen, but storing CVV codes is a practice long banned by the PCI.

Attorneys allege that in addition to negligence prior to the security breach, Target repeatedly misled its customers about the nature and scale of the breach. For instance, the suit claims that Target initially stated that customers’ PIN numbers were not compromised, but later disclosed that the data had, in fact, been taken. Attorneys also claim that Target initially estimated only 40 million accounts were affected, but later appeared to state that in addition to account information for 40 million charge cards, the personal information of 70 million customers was also compromised. Customers whose charge account information was compromised, and whose personal information, such as name, address, phone number, and email were also stolen, are at a heightened risk of identity theft, according to attorneys.

The lawsuit is a proposed class action, and seeks to represent a class of all persons in the United States who used a credit or debit card at a Target store and whose financial or personal information was compromised. It claims that Target’s actions were negligent and additionally violated a number of state laws governing unfair business practices and the disclosure of security breaches.

“Following the data breach, Target acted consistently in its own self-interest and was not looking out for its affected customers,” said Hagens Berman Managing Partner Steve Berman. “It did not disclose the data breach until a day after a private security blogger had discovered it, and even then it sought to minimize the effect the data breach would have on its holiday sales by disclosing the breach only on its corporate website and not disclosing that customer PIN numbers had also been stolen.”

“The company should have immediately offered credit monitoring and/or identity theft protection for its customers and fully disclosed the potential risks,” Mr. Berman continued. “Instead, Target instructed its customers to ‘remain vigilant for incidents of fraud and identity theft by regularly reviewing your account statements and monitoring free credit reports.'”

“It is our hope,” said Mr. Berman, “that this lawsuit will cause Target and other major retail chains that handle the personal and financial information of millions of Americans to take data theft seriously and continuously improve their security to meet the increasing threat from data breach attacks. Target chose to save millions by not implementing adequate data protection protocols, and we believe those savings should be used to compensate Target customers for the costs, frustration, and countless hours of lost productivity that resulted.”

Concerned consumers who made purchases at Target stores between Nov. 27, 2013, and Dec. 15, 2013 are encouraged to contact a Hagens Berman attorney by emailing [email protected] or calling (206) 623-7292.

Additional information about the investigation is available at http://www.hbsslaw.com/cases-and-investigations/cases/Target-Data-Breach.

About Hagens Berman

Hagens Berman Sobol Shapiro, LLP, is a consumer-rights class-action law firm with offices nine cities. The firm has been named to the National Law Journal’s Plaintiffs’ Hot List seven times. More about the law firm and its successes can be found at www.hbsslaw.com. The firm’s class-action law blog is located at www.classactionlawtoday.com.


Related:

  • Uncovering Qilin attack methods exposed through multiple cases
  • Predatory Sparrow Strikes: Coordinated Cyberattacks Seek to Cripple Iran's Critical Infrastructure
  • Ex-CISA head thinks AI might fix code so fast we won't need security teams
  • NY: Gloversville hit by ransomware attack, paid ransom
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Toys “R” Us Canada customers notified of breach of personal information
Category: Business SectorCommentaries and AnalysesMalwareU.S.

Post navigation

← WA: Fire department medical response records and personnel information hacked
United Natural Foods warehouse with retired laptops and hard drives burglarized →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.