DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

CVS confirms customer data stolen in PNI Digital Media attack (updated)

Posted on September 11, 2015 by Dissent

There’s an update to the PNI Digital Media breach that affected the online photo centers for major retailers such as CVS, Costco, Walmart, RiteAid, Sam’s Club. The breach was first disclosed over the summer, but now AP reports that investigators for CVS have not only confirmed the hack, but some customers’ information may have been stolen:

 

Staples Inc., the parent company of Canada-based PNI Digital Media, which manages all of the sites, says it appears that the hackers used malware to capture user information on PNI servers.

But it says that there’s no sign that hackers accessed user photos or pin numbers.

Boston Globe correspondent Taryn Luna reports that the breach of CVSPhoto.com:

 included credit-card information for some customers, as well as names, phone numbers, e-mail addresses, usernames, and passwords.

CVS is offering affected customers credit-monitoring and identity theft restoration services with Experian.

Curiously, perhaps, Sam’s Club reports that their customers’ credit card information was not compromised – but they seem to be relying on statements by PNI Digital Media, and it’s not clear whether they brought in their own investigators. Walmart Canada’s photo center remains offline with their original statement that they have no indication that credit card information is compromised.  For its part, RiteAid’s photo center remains offline with its statement of July 17:

We recently were advised by PNI Digital Media, the third party that manages and hosts mywayphotos.riteaid.com, that it is investigating a possible compromise of certain online and mobile photo account customer data. The data that may have been affected is name, address, phone number, email address, photo account password and credit card information.

Costco’s photo center, which is back online, has this statement in their FAQ on the incident:

Q: Was my credit card information taken?
A: The investigation is not complete. At this point, we believe that the credit card information of a small percentage of Costco members was captured. We recommend checking with your bank card company.

So it seems that only CVS (so far) has issued a strong statement confirming the compromise of customer data, and they appear to be the only one offering their customers credit monitoring services.

Update: CVS’s report to the New Hampshire Attorney General’s Office can be found here. From their investigation, it appears that about 2,500 New Hampshire residents had paid online and either had photos mailed to them or paid online and then picked up the photos at a CVS retail store. The total number of customers nationwide was not disclosed in this report.


Related:

  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
  • Authorities released free decryptor for Phobos and 8base ransomware
  • Missouri Adopts New Data Breach Notice Law
Category: Business SectorMalwareSubcontractorU.S.

Post navigation

← BD: University of Dhaka website still down, authorities claim ‘hacker’ marked
US-CERT’s do’s-and-don’ts for after the cyber hack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Hungarian police arrest suspect in cyberattacks on independent media
  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
  • Inquiry launched after identities of SAS soldiers leaked in fresh data breach
  • UK sanctions Russian cyber spies accused of facilitating murders
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • British government reportedlu set to back down on secret iCloud backdoor after US pressure
  • Idaho agrees not to prosecute doctors for out-of-state abortion referrals
  • As companies race to add AI, terms of service changes are going to freak a lot of people out. Think twice before granting consent!
  • Uganda orders Google to register as a data-controller within 30 days after landmark privacy ruling
  • Meta investors, Zuckerberg reach settlement to end $8 billion trial over Facebook privacy violations
  • ICE is gaining access to trove of Medicaid records, adding new peril for immigrants
  • Microsoft can’t protect French data from US government access

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.