Security

Cyber-crime

1.7M potentially pwned after payment services provider takes a year to notice break-in

Criminals with plenty of time on their hands may now have credit card details


Around 1.7 million people will receive a letter from Florida-based Slim CD, if they haven't already, after the company detected an intrusion dating back nearly a year.

Slim CD provides payment processing solutions, thus credit card numbers along with their expiry dates are among the data types potentially compromised in the incident.

The cardholder's name and address may also be affected, meaning potential for financial fraud should that data be sold, although Slim CD says it hasn't detected any misuse of the data.

"Slim CD takes the confidentiality, privacy, and security of information in its possession very seriously," the company said in a letter to potentially affected individuals. "Upon discovery of this incident, Slim CD quickly commenced a thorough investigation and took steps to implement additional safeguards and review our policies and procedures relating to data privacy and security. 

"Slim CD also took steps to report this incident to federal law enforcement, and regulatory authorities, as required by law. Slim CD has been working diligently to provide affected individuals with accurate and complete notice, and on September 6, 2024, Slim CD began sending emails to potentially affected individuals."

The Register asked Slim CD for additional information, and we'll update the story if it responds.

Among the questions we put to the company was why it took so long for the break-in to be detected, and whether it believed there were any failures in its ability to detect such incidents.

A postmortem carried out by the company and third-party experts revealed that the intrusion began on August 17, 2023, but was only discovered "on or about" June 15 this year.

Slim CD didn't say what system or systems were compromised as a result of the attack but confirmed that credit card-related data may have been accessed between June 14 and June 15, suggesting this was what alerted the company to the initial intrusion.

What the attacker did with the access prior to June 14 remains a mystery. We have also asked Slim CD about this.

There was no apology in the letter [PDF] sent to the 1.693 million potentially affected customers, who were instead encouraged to order a free credit report and remain vigilant against any malicious account activity. ®

Send us news
17 Comments

Healthcare Services Group discloses 'cybersecurity incident' in SEC filing

Laundry and dining provider still investigating cause and scope

Senator accuses sloppy domain registrars of aiding Russian disinfo campaigns

Also, Change Healthcare sets a record, cybercrime cop suspect indicted, a new Mallox decryptor, and more

Microsoft says tougher punishments needed for state-sponsored cybercriminals

Although it also reaffirmed commitment to secure-by-design initiatives

US contractor pays $300K to settle accusation it didn't properly look after Medicare users' data

Resolves allegations it improperly stored screenshots containing PII that were later snaffled

Belgian cops cuff 2 suspected cybercrooks in Redline, Meta infostealer sting

US also charges an alleged Redline dev, no mention of an arrest

US healthcare org admits up to 400,000 people's personal info was snatched

It waited till just before Columbus Day weekend to make mandated filing, but don't worry, we saw it

LottieFiles supply chain attack exposes users to malicious crypto wallet drainer

A scary few Halloween hours for team behind hugely popular web plugin

UK councils bat away DDoS barrage from pro-Russia keyboard warriors

Local authority websites downed in response to renewed support for Ukraine

Russian spies use remote desktop protocol files in unusual mass phishing drive

The prolific Midnight Blizzard crew cast a much wider net in search of scrummy intel

Dutch cops pwn the Redline and Meta infostealers, leak 'VIP' aliases

Legal proceedings underway with more details to follow

Tech firms to pay millions in SEC penalties for misleading SolarWinds disclosures

Unisys, Avaya, Check Point, and Mimecast settled with the agency without admitting or denying wrongdoing

Samsung phone users under attack, Google warns

Don't ignore this nasty zero day exploit says TAG