DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Va: Gas station linked to credit card fraud

Posted on June 7, 2011 by Dissent

Lori Crouch reports:

A hot spot for gas could be a hot bed of criminal activity. Suffolk police say 16 victims who used a debit card at Murphy USA gas station in the 1200 block of Main Street have come forward since May 27th. All of the victims report that money was stolen from their bank accounts, with some transactions made from as far away as California.

Okay, you’re probably thinking “skimmer,” right? Not so fast…

10 On Your Side first reported the thefts Friday . On Monday, Murphy USA executives flew to Suffolk to see the station for themselves. After a thorough investigation of the pumps and a meeting with police, Director of Communications Jay Staggs said the problem lies elsewhere.

“We didn’t start taking security of our customers’ card security information seriously today. This is something our company is taking seriously all along. So when we were told of these allegations, we wanted to get a team out here to check the dispensers, to check all the equipment at the store to make sure we didn’t believe we had a problem and we’ve done that. We do not believe we have a breach at this time. We found no evidence of a skimmer of any kind. We will continue to work with the police department and any other investigative authority to work with them in anyway possible but we want our customers to know that there information is safe at Murphy USA. We take a lot of pride in bringing the communities we serve the best prices we can on gasoline and we want them to know we take their security very seriously,” said Staggs.

Suffolk police do not know how the bank information is being compromised.

Read more on WAVY.


Related:

  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • NY: Gloversville hit by ransomware attack, paid ransom
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • KT Chief to Resign After Cybersecurity Breach Resolution
Category: Breach IncidentsID TheftU.S.

Post navigation

← Former Central Valley restaurateurs accused of credit card fraud
12 Steps for Surviving an HHS/OCR Privacy Breach Investigation →

1 thought on “Va: Gas station linked to credit card fraud”

  1. golde says:
    June 10, 2011 at 10:59 am

    It is not fair to point to one gas station yet. The point of breach is as yet unknown. This is almost yellow journalism and could hurt Murphy gas stations.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.