All the latest UK technology news, reviews and analysis

Hackers hit more than 2,000 Tesco customers

14 Feb 2014

Cyber criminals used data from previous high-profile hacks to break into thousands of accounts.

In total, 2,239 customers are said to have been affected by the incident, which first came to light on Thursday night, as reported by the BBC when it was contacted by some of the affected customers.

Customers reported seeing store vouchers stolen from their accounts after crooks used details from other data breaches to guess the email and password combinations of their logins for the site.

Tesco said it was aware and was working with customers to try and negate the effects of the incident.

"We have contacted all customers who may have been affected and are committed to ensuring that none of them miss out as a result of this," it said in a statement sent to the BBC. "We will issue replacement vouchers to the very small number who are affected."

It has also disabled some accounts of those affected. V3 contacted Tesco for more information, but had received no reply at the time of publication.

It is not clear which previous hacks the criminals used to piece together information for the site, but this breach underlines the perils of using identical email addresses and passwords for numerous online accounts.

Recent hacks that could have helped the criminals, though, include those against retailers such as US giant Target and last year’s attack on home retailer Lakeland. Adobe admitted cyber criminals stole account information from a whopping 38 million users, which could well have been used to help access the Tesco accounts.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Dan Worth

Dan Worth is the news editor for V3 having first joined the site as a reporter in November 2009. He specialises in a raft of areas including fixed and mobile telecoms, data protection, social media and government IT. Before joining V3 Dan covered communications technology, data handling and resilience in the emergency services sector on the BAPCO Journal

View Dan's Google+ profile

More on Security
What do you think?
blog comments powered by Disqus

BYOD vs CYOD vs BYOC poll

Which approach is your firm taking to managing employees' mobile devices?

Popular Threads

Powered by Disqus
Galaxy S5 vs One M8 video review

Galaxy S5 vs HTC One M8 video review

We see which Android contender is best for business

Updating your subscription status Loading

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button

Data protection: the key challenges

Deduplication is a foundational technology for efficient backup and recovery


iPad makes its mark in the enterprise

The iPad can become a supercharged unified communications endpoint, allowing users to enhance their productivity

Embedded C Developer - Bracknell

Job Title;- Embedded C Developer - Bracknell Description...

Software Development Engineer

Develop: Customise: Configure. Maximise your technical...

Developer (SharePoint and .Net)

To be an outstanding regulator, we need outstanding systems...

Service Desk Analyst

Service Desk Analyst - Central London Fragomen is...
To send to more than one email address, simply separate each address with a comma.