DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

CVS confirms customer data stolen in PNI Digital Media attack (updated)

Posted on September 11, 2015 by Dissent

There’s an update to the PNI Digital Media breach that affected the online photo centers for major retailers such as CVS, Costco, Walmart, RiteAid, Sam’s Club. The breach was first disclosed over the summer, but now AP reports that investigators for CVS have not only confirmed the hack, but some customers’ information may have been stolen:

 

Staples Inc., the parent company of Canada-based PNI Digital Media, which manages all of the sites, says it appears that the hackers used malware to capture user information on PNI servers.

But it says that there’s no sign that hackers accessed user photos or pin numbers.

Boston Globe correspondent Taryn Luna reports that the breach of CVSPhoto.com:

 included credit-card information for some customers, as well as names, phone numbers, e-mail addresses, usernames, and passwords.

CVS is offering affected customers credit-monitoring and identity theft restoration services with Experian.

Curiously, perhaps, Sam’s Club reports that their customers’ credit card information was not compromised – but they seem to be relying on statements by PNI Digital Media, and it’s not clear whether they brought in their own investigators. Walmart Canada’s photo center remains offline with their original statement that they have no indication that credit card information is compromised.  For its part, RiteAid’s photo center remains offline with its statement of July 17:

We recently were advised by PNI Digital Media, the third party that manages and hosts mywayphotos.riteaid.com, that it is investigating a possible compromise of certain online and mobile photo account customer data. The data that may have been affected is name, address, phone number, email address, photo account password and credit card information.

Costco’s photo center, which is back online, has this statement in their FAQ on the incident:

Q: Was my credit card information taken?
A: The investigation is not complete. At this point, we believe that the credit card information of a small percentage of Costco members was captured. We recommend checking with your bank card company.

So it seems that only CVS (so far) has issued a strong statement confirming the compromise of customer data, and they appear to be the only one offering their customers credit monitoring services.

Update: CVS’s report to the New Hampshire Attorney General’s Office can be found here. From their investigation, it appears that about 2,500 New Hampshire residents had paid online and either had photos mailed to them or paid online and then picked up the photos at a CVS retail store. The total number of customers nationwide was not disclosed in this report.

No related posts.

Category: Business SectorMalwareSubcontractorU.S.

Post navigation

← BD: University of Dhaka website still down, authorities claim ‘hacker’ marked
US-CERT’s do’s-and-don’ts for after the cyber hack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The data appear fake. (1)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases
  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Here’s What a Reproductive Police State Looks Like
  • Meta investors, Zuckerberg to square off at $8 billion trial over alleged privacy violations
  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’
  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.