T.J. Maxx Probe Reveals Data Breach Worse Than Originally Thought

The retailer's parent company believes portions of the credit and debit card transactions at its U.S., Puerto Rican, and Canadian stores from January 2003 through June 2004 were compromised.

Larry Greenemeier, Contributor

February 21, 2007

4 Min Read
InformationWeek logo in a gray background | InformationWeek

The theft of customer data from TJX Companies' retail stores is worse than originally thought, the parent company of T.J. Maxx, Marshalls, HomeGoods, and others acknowledged Wednesday in a statement.

An ongoing investigation into the security breach has revealed that, while the company previously believed that the intrusion took place from May 2006 to January 2007, TJX now believes its computer system was maliciously hacked in July 2005 and on various subsequent dates in 2005.

Even worse, the company now believes portions of the credit and debit card transactions at its U.S., Puerto Rican, and Canadian stores -- excluding debit card transactions with cards issued by Canadian banks -- from January 2003 through June 2004 were compromised. TJX, whose assets include 826 T.J. Maxx, 751 Marshalls, and 271 HomeGoods locations, had previously reported that the 2003 transaction data had potentially been accessed.

For most of the transactions from September 2003 through June 2004, some of the card information was masked at the time of the transaction, making that portion unavailable to the intruder, the company said in a statement. Further, names and addresses weren't included with the credit and debit card data believed to have been stolen. Debit card PINs, information from transactions at Bob's Stores, and transactions made with debit cards issued by Canadian banks aren't believed to have been compromised.

This bad news about the data breach comes amidst TJX's report Wednesday of strong financials for fiscal 2007, ended Jan. 27. Revenue for fiscal 2007 was $17. 4 billion, up 9% from the previous fiscal year. Profits for fiscal 2007 were $738 million, up from $690.4 million in fiscal 2006. The earnings, however, included a fourth-quarter charge of 1 cent per share, or about $4.5 million, related to the hack, including the costs to investigate and contain the intrusion, enhance computer security, and communicate with customers. TJX says it learned of the data breach in mid-December but, at the request of law enforcement, didn't make news of the attack public. The company has since hired General Dynamics and IBM to evaluate the intrusion and identify affected data.

"We are dedicating substantial resources to investigating and evaluating the intrusion, which, given the nature of the breach, the size and international scope of our operations, and the complexity of the way credit card transactions are processed, is, by necessity, taking time," TJX CEO and president Carol Meyrowitz said in a statement.

TJX also believes that additional drivers' license numbers, along with the related names and addresses, were compromised for the last four months of 2003 and May and June 2004. TJX collected this information when T.J. Maxx, Marshalls, and HomeGoods customers in the United States and Puerto Rico attempted to make merchandise returns without a receipt. TJX has also likely run afoul of the Payment Card Industry Data Security Standard created by Visa and MasterCard, as a number of documents sent by Visa to financial institutions that issue cards and manage Visa transactions indicate TJX was storing credit and debit card data in violation of the standard. Overseas, TJX's investigation found evidence of an intrusion to the portion of its computer system that processes T.J. Maxx customer transactions in the United Kingdom and Ireland. While TJX is concerned that customer data was stolen as a result of this cyberattack, the company can't confirm any unauthorized access to customer data or any theft of customer data from T.J. Maxx.

Customer data in the retail sector has proven to be much in demand among cyberattackers. The Stop & Shop supermarket chain late last week revealed that it had discovered some tampering of checkout lane Electronic Funds Transfer units -- the PIN pad that customers often use to make purchases -- at two Rhode Island stores that may have led to the theft of credit and debit card account as well as PIN information. Stop & Shop says it has performed an inventory and inspection of EFT units in all of its stores in response to the discovery of the EFT unit tampering. The company subsequently discovered evidence of payment device tampering at three other Rhode Island locations and one store in Massachusetts, but it hasn't received reports of any fraudulent transactions at those locations.

In her comments Wednesday regarding TJX's financial performance, Meyrowitz noted that the company lowered costs and reinvested some of these savings in increased marketing and more effective advertising campaigns. Looks like a large portion of that money should've gone to improvements in the company's IT security.

Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like


More Insights