Scam Artists Steal Credit Card Information From Nordstrom Registers.

by

October 17, 2013

Credit Card PCI Compliance

Is your retail operation PCI compliant?

Often, scam artists who use debit and credit card skimmers target ATMs. However, they are now using inexpensive skimming devices to compromise the security of modern-day cash registers.

In early October, a group of three men installed keyloggers in registers at a Nordstrom department store in Aventura, Florida. According to Nordstrom, the staff found six skimmers attached to registers at the store.

The three males were captured on camera at Nordstrom on Saturday, October 5th. They appeared to be tampering with registers: with two men distracting the sales staff, while the third man took pictures of the register, and removed the rear access panel to take more photographs.

A few hours later, three different men returned to the store and went through the same exact process. However, instead of taking pictures, one man installed the keyloggers in the registers.  A few days later, the same men returned to remove them with the intent to use stolen information to create counterfeit credit cards.

The keyloggers used resemble PS/2 keyboard connectors, which are sold by many stores for $30-$40 each. These keyloggers are connected with a keyboard cord between the keyboard and the computer, and have the ability to intercept data from credit cards and transfer it between the two devices.

According to a Nordstrom spokeswoman, the company believes the incident only took place at this particular store, and no other. It’s uncertain whether or not the men caught on camera have been arrested.

Have questions about your Baltimore, Washington, DC And Across Maryland retail store and your PCI compliance?  Contact Integris today and sit down with our team of Baltimore, Washington, DC And Across Maryland IT security specialists.  We can help you ensure all your payment systems meet PCI compliance.

We're Integris. We're always working to empower people through technology.

Keep reading

Strong Cybersecurity Postures: How to Unleash their Power

Strong Cybersecurity Postures: How to Unleash their Power

In the vast digital landscape where virtual dragons and sneaky trolls roam a strong cybersecurity posture has never been more important. Imagine a band of modern-day knights led by our protagonist, Alex. Armed with a trusty laptop and a cup of coffee, Alex navigates...

How to Spot a Phishing Attack in 2023

How to Spot a Phishing Attack in 2023

In 2023 cyber threats lurk behind every tree trunk in today's digital jungle, and cybersecurity awareness is more critical than ever. Among the craftiest of these threats are phishing attacks. Phishing attacks are cunningly engineered with social manipulation at their...

How to Choose an IT Consultant in Boulder, CO

Regardless of industry size or type, Boulder IT consultants play a massive role in the way companies in the Boulder area do business. While most companies may have their own in-house IT department, many of these departments are small and cannot handle all the...