DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

CVS confirms customer data stolen in PNI Digital Media attack (updated)

Posted on September 11, 2015 by Dissent

There’s an update to the PNI Digital Media breach that affected the online photo centers for major retailers such as CVS, Costco, Walmart, RiteAid, Sam’s Club. The breach was first disclosed over the summer, but now AP reports that investigators for CVS have not only confirmed the hack, but some customers’ information may have been stolen:

 

Staples Inc., the parent company of Canada-based PNI Digital Media, which manages all of the sites, says it appears that the hackers used malware to capture user information on PNI servers.

But it says that there’s no sign that hackers accessed user photos or pin numbers.

Boston Globe correspondent Taryn Luna reports that the breach of CVSPhoto.com:

 included credit-card information for some customers, as well as names, phone numbers, e-mail addresses, usernames, and passwords.

CVS is offering affected customers credit-monitoring and identity theft restoration services with Experian.

Curiously, perhaps, Sam’s Club reports that their customers’ credit card information was not compromised – but they seem to be relying on statements by PNI Digital Media, and it’s not clear whether they brought in their own investigators. Walmart Canada’s photo center remains offline with their original statement that they have no indication that credit card information is compromised.  For its part, RiteAid’s photo center remains offline with its statement of July 17:

We recently were advised by PNI Digital Media, the third party that manages and hosts mywayphotos.riteaid.com, that it is investigating a possible compromise of certain online and mobile photo account customer data. The data that may have been affected is name, address, phone number, email address, photo account password and credit card information.

Costco’s photo center, which is back online, has this statement in their FAQ on the incident:

Q: Was my credit card information taken?
A: The investigation is not complete. At this point, we believe that the credit card information of a small percentage of Costco members was captured. We recommend checking with your bank card company.

So it seems that only CVS (so far) has issued a strong statement confirming the compromise of customer data, and they appear to be the only one offering their customers credit monitoring services.

Update: CVS’s report to the New Hampshire Attorney General’s Office can be found here. From their investigation, it appears that about 2,500 New Hampshire residents had paid online and either had photos mailed to them or paid online and then picked up the photos at a CVS retail store. The total number of customers nationwide was not disclosed in this report.


Related:

  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • NY: Gloversville hit by ransomware attack, paid ransom
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Toys “R” Us Canada customers notified of breach of personal information
  • Gatineau gymnastics centre warns members of possible data breach
  • Data breach in 42 Latvian municipalities: DVI imposes 300,000 euro fine on ZZ Dats
Category: Business SectorMalwareSubcontractorU.S.

Post navigation

← BD: University of Dhaka website still down, authorities claim ‘hacker’ marked
US-CERT’s do’s-and-don’ts for after the cyber hack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • From bad to worse: Doctor Alliance hacked again by same threat actor
  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Once a Patient’s in Custody, ICE Can Be at Hospital Bedsides — But Detainees Have Rights
  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.