Security

Cyber-crime

Dick's Sporting Goods discloses cyberattack

Authorities probing unwanted intrusion; hard questions ahead


Dick's Sporting Goods, America's largest retail chain for outdoorsy types, has admitted that it suffered a cyberattack last week.

In an SEC 8-K filing, the retailer told the regulator that on August 21, it found an unnamed third party was snooping around its servers, "including portions of its systems containing certain confidential information." However, the filing doesn't state exactly what information was targeted by the attackers.

"The company has no knowledge that this incident has disrupted business operations," it stated.

"The company's investigation of the incident remains ongoing. Based on the company's current knowledge of the facts and circumstances related to this incident, the company believes that this incident is not material. Should any of the relevant facts and circumstances substantively change, the company will reassess materiality considerations."

The lack of effect on operations suggests that ransomware wasn't deployed on the corporate servers, since no pause in operations was reported. Then again, many ransomware operators don't even bother to lock down servers these days. They simply steal information and threaten to expose it unless the victims pay up.

The retailer, which has more than 850 stores across the US, isn't saying exactly what kind of information has been stolen. The Register has asked Dick's and we'll update this story as soon as more information comes in. But affected customers should be receiving an alert on how they have been affected. Let us know if you receive such an alert.

Dick's reports that it has called in law enforcement to investigate the intrusion and has signed up an external security firm to assess the extent of the issue and fix any outstanding security problems.

The retail chain is due to release its second-quarter earnings report on September 4 and more details may be available then. ®

Send us news
11 Comments

Microsoft hosts a security summit but no press, public allowed

CrowdStrike, other vendors, friendly govt reps…but not anyone who would tell you what happened

Security boom is over, with over a third of CISOs reporting flat or falling budgets

Good news? Security is still getting a growing part of IT budget

Security biz Verkada to pay $3M penalty under deal that also enforces infosec upgrade

Allowed access to 150K cameras, some in sensitive spots, but has been done for spamming

Alleged Karakut ransomware scumbag charged in US

Plus: Microsoft issues workaround for dual-boot crashes; ARRL cops to ransom payment, and more

White House thinks it's time to fix the insecure glue of the internet: Yup, BGP

Better late than never

CrowdStrike's meltdown didn't dent its market dominance … yet

Total revenue for Q2 grew 32 percent

Volt Typhoon suspected of exploiting Versa SD-WAN bug since June

The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructure

Microsoft security tools questioned for treating employees as threats

Cracked Labs examines how workplace surveillance turns workers into suspects

Watchdog warns FBI is sloppy on secure data storage and destruction

National security data up for grabs, Office of the Inspector General finds

Iran's Pioneer Kitten hits US networks via buggy Check Point, Palo Alto gear

The government-backed crew also enjoys ransomware as a side hustle

Transport for London confirms cyberattack, assures us all is well

Government body claims there is no evidence of customer data being compromised

House to grill CrowdStrike exec on epic IT meltdown... no, not the CEO

VP Adam Meyers to testify about that faulty software update which ruined July and some of August