WASHINGTON - When Internet retailer Amazon filed its most recent annual report with the U.S. Security and Exchange Commission, it received an unusual response from the agency.
The SEC wanted to know why the Seattle-based company's report said nothing about January's online theft of customer data held by Zappos, its Henderson-based subsidiary.
Amazon argued disclosing the Zappos attack was not required because it had no material impact on Amazon's business, but it eventually agreed to modify its report slightly, according to correspondence between the company and the SEC.
The low-key exchange between the regulators and the Internet giant speaks volumes about an ongoing evolution in the way governments monitor cybersecurity, and how companies increasingly reliant on Internet commerce deal with data theft.
Amid whispers of sensational online break-ins resulting in millions of dollars in losses, it remains remarkably difficult to identify corporate victims of cybercrimes. Companies are afraid that going public would damage their reputations, sink stock prices or spark lawsuits.
The Zappos incident was hard to overlook. The company immediately announced the January security breach that compromised 24 million customer accounts. Zappos said names, addresses, scrambled passwords and the last four digits of customers' credit cards fell vulnerable to the attack.
Since then, nine class action lawsuits have been filed, with five transferred last week to U.S. District Court in Reno. Plaintiffs in the lawsuits seek damages for loss of passwords and privacy.
In October, the SEC issued guidance intended to update for the digital age a requirement that companies report "material risks" that investors want to know. Such disclosure isn't mandatory, but the recent SEC exchange with Amazon shows increasing interest in an issue that is also being scrutinized by Congress.
The chairman of the Senate Commerce, Science and Transportation Committee, Sen. Jay Rockefeller, D-W.Va., is adding a provision to cybersecurity legislation that would strengthen the reporting requirement.
Rockefeller's measure would direct the SEC's five commissioners to make clear when companies must disclose cyber breaches and spell out steps they are taking to protect their computer networks from electronic intrusions.
Cybercrime is rampant and not confined to the United States. The head of Britain's domestic spy agency said this week that cybersecurity ranks alongside terrorism as one of the United Kingdom's most pressing security challenges. In one recent case, an unspecified London-listed company hit by a cyberattack incurred revenue losses of $1.2 billion, MI5 Director General Jonathan Evans said in rare public remarks in London.
Evans didn't identify the company or say which country was behind the attack. The U.S. has said China and Russia are the governments most frequently engaged in such hacking.
"What is at stake is not just our government secrets but also the safety and security of our infrastructure, the intellectual property that underpins our future prosperity, and the commercially sensitive information that is the lifeblood of our companies and corporations," Evans said.
Research by a cybersecurity expert shows dozens of Fortune 500 companies have lost a wide range of valuable information to cybercrimes, including intellectual property, bank account credentials, restricted data about patients of pharmaceutical companies and internal legal records.
Rodney Joffe of Neustar, an Internet infrastructure management company in Virginia, monitors networks used by online criminal groups and traces the origin of stolen information. He found evidence that 162 out 168 companies in the manufacturing, chemical and transportation sectors had been compromised. The names of the companies are being kept confidential for proprietary reasons, he said.
"No one is safe. Everyone is compromised," said Joffe, Neustar's senior technologist. "When people tell you, 'We are protected as a company,' they are really fooling themselves."
The SEC isn't tracking how many companies comply with its cybersecurity guidance. But publicly traded companies historically have resisted supplying information about cyber incidents because it highlights their weak spots, said Peter Toren, a former federal prosecutor with the Justice Department's computer crime division.
"It just doesn't look good," Toren said.
Hackers broke into computers at hotel giant Wyndham Worldwide Corp. three times in two years and stole credit card information belonging to hundreds of thousands of customers. Wyndham didn't report that in corporate filings.
The breach of Wyndham's computers was described in a Federal Trade Commission lawsuit filed this week against the company and three subsidiaries for alleged security failures that led to the three data breaches between April 2008 and January 2010. The failures caused "the export of hundreds of thousands of consumers' payment card account information to an Internet domain address registered in Russia" and millions of dollars in fraudulent charges on consumers' accounts, the FTC said.
Wyndham didn't mention the break-ins in its 2011 annual report or prior securities filings. It did report that the "hospitality industry is under increasing attack by cyber-criminals in the U.S. and other jurisdictions in which we operate" and noted that it was involved in "claims relating to information security and data privacy."
Wyndham spent $13 million more on security improvements and expects to spend as much as $100 million in 2012 to guard against "the increasingly aggressive global threat from cyber-criminals," according to the report.
Wyndham said in an emailed statement to The Associated Press that it "fully complied with SEC regulations in regards to the disclosure of material events." In the statement, Wyndham said the incidents were "previously reported," an apparent reference to notices to consumers that were published on the company's website. The company called the FTC's claims without merit.
Network infrastructure company Verisign reported in late October, just a few weeks after the SEC issued the guidance, that there had been several successful cyberattacks against its corporate networks in 2010. In the filing, Verisign said the company's management had not been informed of the attacks until September 2011.
LinkedIn, the online networking service, publicly announced on June 12 the online theft of 6.5 million user passwords. It said the announcement complies with its obligations to the SEC, but it has yet to file a report with the commission.
The new SEC guidance puts pressure on companies to decide whether to disclose a breach or keep it secret, said Jody Westby of Global Cyber Risk, a consulting firm. But she said the demand for information amounts to locking the door after the house has been robbed.
"The SEC would have done better to require all public companies to say whether they've taken actions to implement a security program," Westby said.
Las Vegas Review-Journal reporter Caitlin McGarry contributed to this report.