Tag: data breach

Data Breach Affects Major Fashion Brands

Brands including AX Paris, DLSB, Elle Belle Attire, Perfect Handbags and Traffic People are among those affected by a data breach at IT ecommerce supplier Fashion Nexus with White Room Solutions.

Fashion Nexus stated that that on or around 9 July a “white hat hacker” or “ethical hacker” breached one of company’s web servers. Fashion Nexus advised its clients using the software to file reports with the Information Commissioner’s Office and Fashion Nexus also filed a breach report.

Around 650,000 of its clients’ customers were believed to be affected.

The majority had their names and email addresses accessed, and one-fifth also had their home address details accessed. There was no payment card information stored in the databases. But the data did include hashed passwords, names, email addresses, phone numbers, and other data.

Rob Sherwood, director at Fashion Nexus, said: “Our experience with this as a small company has been extremely stressful and unsettling. Contrary to the way we’ve been portrayed in the IT security press, we care deeply about our clients and the rights of their customers.

“As a small business with limited resource and funding, we had put in place security measures but clearly, somehow, this wasn’t sufficient to prevent an attack, and we can’t apologise enough to our clients and their customers.”

The personally identifiable information accessed can lead to scammers carrying out identity fraud and identity theft.

If you are a customer of one of the affected brands, then change your password immediately and also the login and passwords of any other accounts using the same login details.

Do click on the Facebook or Twitter icons on top right to follow Fight Back Ninja.

Fightback Ninja Signature

Butlin’s Data Breach

Butlin’s – the holiday camps company has confirmed that the records of up to 34,000 guests have been accessed by hackers.

The stolen data does not include payment details, but does include customer names, holiday dates, postal and email addresses and telephone numbers.

The compromise is believed to have been caused by a phishing email.

Under the EU’s new General Data Protection Regulation (GDPR), British companies must notify the Information Commissioner’s Office of any data breaches within 72 hours or face a fine. Butlin’s say they have done so.

The company said its own investigations have not found any fraudulent activity related to this event, but anyone whose records have been accessed by hackers needs to beware of calls, emails etc. from people claiming to be from Butlin’s and seeking more information

Butlin’s says it is contacting all those affected by the data breach.

If you believe your data may have been included in the hacked data then contact Butlin’s directly and be careful over any contact from Butlin’s – ensure they are genuine not scammers looking to trick you.

Do Share this post on social media – click on the post title then scroll down to the social media share buttons.

Fightback Ninja Signature

Dixons Carphone Data Breach

Dixons Carphone admitted there had been a data breach in 2017 which included 5.8 million credit and debit cards.  105,000 of those cards are not the chip-and-pin type. The chip and pin cards are assumed to be safe from fraud but this may be a false assumption.

Apparently, the hackers had tried to gain access to one of the processing systems used by Currys PC World and Dixons Travel stores.

Dixons also announced that the personal details of 1.2 million people (name, address, email address) may have been exposed.

STOP PRESS: Dixons Carphone has just increased that estimate from 1.2 million to 10 million people whose information may have been compromised.

Dixons Carphone said it had no evidence that any of the cards had been used fraudulently following the breach.

The incident happened before the new GDPR regulation came into force or Dixons Carphone would be looking at potentially much higher fines than currently expected.

Dixons Carphone said that “unauthorised access” of data held by the company had prompted an investigation, the hiring of external security experts and efforts to shore up its security defences. It has informed police, regulators at the Information Commissioner’s Office and the Financial Conduct Authority.

The data about these cards that may have been compromised does not contain PIN numbers or the CVV number and does not contain authentication data that would enable cardholder identification or a purchase to be made.  At least that’s the theory, but hackers and scammers can use starting information to get access to more information and then perpetrate fraud.

“The National Cyber Security Centre is working with Dixons Carphone plc and other agencies to understand how this data breach has affected people in the UK and advise on mitigation measures.

Do enter your email address and click on the subscribe button on top right to keep up to date with new posts.

Fightback Ninja Signature

Ticketmaster Data Breach Failings

Ticketmaster is a well-known global ticket selling business and they suffered a data breach starting in February 2018 and continuing through to late June.

A piece of malware on a customer service system operated by a third party had been exporting customer data to a scammer and Ticketmaster claim to have known nothing about this until June 23rd.

However, Digital bank Monzo did spot in April that customers’ cards were being compromised and warned Ticketmaster but “couldn’t get any traction” out of the company.

Monzo contacted all of its customers who had ever dealt with Ticketmaster – about 5,000 – and replaced their cards.

It also told banks that are part of the UK Finance group in April that it was aware of what appeared to be a significant data breach at Ticketmaster.

Ticketmaster say they investigated at the time but found no problem. The fault was in third party software not Ticketmaster’s own software, but that doesn’t excuse their apparent lack of responsibility for their customers who were being compromised.

Ticketmaster eventually realised there was a serious problem and said customers who bought concert, theatre and sporting event tickets between February and 23 June 2018 may have been affected by the incident, which involved malicious software being used to steal people’s names, addresses, email addresses, phone numbers, payment details and Ticketmaster login details.

The breach also affects customers of two other UK websites owned by Ticketmaster: TicketWeb and the resale website Get Me In!

Ticketmaster claims that the data for less than 40,000 people was affected.

Ticketmaster could face questions over whether there was a delay in disclosing the breach after it emerged that some UK banks had known about the incident since early April.

Ticketmaster has subsequently warned customers: “We recommend that you monitor your account statements for evidence of fraud or identity theft.

Ticketmaster said it was offering affected customers a free 12-month identity monitoring service. There is a dedicated website at security.ticketmaster.co.uk, and customers can also email fan.help@ticketmaster.co.uk for further information or to register their concern.

Companies need to protect their customer’s data, but also how they deal with such problems when they occur,  can affect the outcome as much as the details of the actual problem. Ticketmaster have not come out of this very well.

Do leave a comment on this post – click on the post title then scroll down to leave your comment.

Fightback Ninja Signature

MyFitnessPal Data Stolen

Sportswear brand Under Armour announced that its subsidiary MyFitnessPal suffered a significant data beach, compromising up to 150 million accounts.

The account information involved includes user names, email addresses and hashed passwords, but no financial information such as credit card numbers or identifiers such as social security numbers.

The breach has not exposed particularly sensitive user data, but it does affect a huge number of users and this has caused Under Armour’s stock to drop 4 percent. The breach occurred in February but was only identified in March. The company has been working to notify affected users and is expected to work with the police and data security firms to trace the source of the breach.

“Four days after learning of the issue, the company began notifying the MyFitnessPal community via email and through in-app messaging. The notice contains recommendations for MyFitnessPal users regarding account security steps they can take to help protect their information,” Under Armour said in a statement. “The company will be requiring MyFitnessPal users to change their passwords and is urging users to do so immediately.”

In this case, the data storage was robust and the hackers have 150 million email addresses to sell but there’s little else they can do with the data.

If you are a registered user of MyFitnessPal – change your password immediately and if any of your other accounts have the same login and password then change them as well as hackers will try to find other accounts in your name.

Users of MyFitnessPal should be wary of emails in the coming weeks as there are likely to be scam messages and in particular may be messages that appear to be from MyFitnessPal but are from scammers.

Do enter your email address and click on the subscribe button on top right to keep up to date with new posts.

Fightback Ninja Signature

What If Your Business Has a Data Breach

If your business suffers a data breach i.e. hackers access your system and steal confidential information then you have a lot to do to deal with the breach, communicate with all affected parties and put in place better security to prevent another breach.

How well you deal with the breach often affects the total cost and the level of damage to your business reputation.

These four steps can help:-

1. Investigate the Breach

  1. How did it happen?
  2. What was stolen?
  3. Can the hackers regain entry to your systems?

You’ll need to know exactly what information was lost in the data breach.

Less sensitive information includes  name, address. phone number etc. This can be used by scammers and cold callers but that information is readily available for most people through the phone directory, social media and  the Electoral register.

More sensitive information includes date of birth, name, financial details, payment card details.  Combined with the less sensitive information this can be used for identity fraud.

If the stolen data includes names with login and passwords then you need to act fast to warn people to change their passwords.

2. Determine the Possible Damage

Once you know what data has been stolen, you need to understand how this can affect people i.e how this data can be used by criminals. Will they likely sell the information to a competitor or to other scammers or ransom it back to you?

3. Communicate with All Interested Parties

You need to inform all affected parties ASAP.  This may be customers, partners, staff, suppliers etc. If the breach is serious then you should inform the Information Commissioners Office.  If relevant inform the Police.

4. Increase Your Security

Unless you have security experts, you may need to hire experts to assess your systems and see how security can be improved. Start enacting those improvements straightaway and of course close off whatever method the hackers used to get into your systems.

A data breach can be very serious and must be dealt with quickly and efficiently to minimise damage to your reputation.

 Do click on the Facebook or Twitter icons on top right to follow Fight Back Ninja.

Fightback Ninja Signature

Equifax Data Breach

The personal data of up to 44 million British consumers was feared stolen by hackers in a massive cyber attack on Equifax.

The information commissioner said it was investigating how the hack on Equifax, a US credit rating firm, affected UK customers, many of whom will be unaware their data is held by the company.

Equifax and its UK subsidiary companies state on their websites that they represent British clients including BT, Capital One and British Gas.

The Information Commissioner’s Office has urged Equifax to alert affected UK customers as soon as possible, and said it will work with the relevant overseas authorities on behalf of British citizens.

Equifax admitted hackers had exposed the personal data of 143 million customers in the US, which was stolen between mid-May and July this year due to a vulnerability on its website. The hack was not made public until recently.

The stolen information includes names, social security numbers, dates of birth, addresses and, in some instances, driver’s license details. It is also thought that around 209,000 credit card numbers were stolen.

Equifax said: “limited personal information” from British and Canadian residents had been compromised.

A spokesman for BT said: “We are aware of the developing story and are monitoring the situation closely. Like many companies in the UK, BT uses Equifax services. We are working on establishing whether this breach has any impact on those services.”

Lenders rely on the information collected by credit bureaus such as Equifax to help them decide whether to approve financing for homes, cars and credit cards.

Equifax chief executive Richard Smith said in a statement “I apologise to consumers and our business customers for the concern and frustration this causes.”

How to check if you are affected – go online to https://trustedidpremier.com/eligibility/eligibility.html and type in your last name and last 6 digits of your social security number and it should tell you if you have been affected by the data breach.

Do enter your email address and click on the subscribe button on top right to keep up to date with new posts.

Update on Yahoo Breach

In November 2016, Yahoo realised it had suffered a data breach back in 2013. Yahoo released information on what had happened and informed everyone who may have been affected by this.

See blog post http://fightback.ninja/the-yahoo-data-breach-reported-december-2016/ for more information.

Yahoo has now released more information concerning how this happened.

 

Yahoo say they called in outside forensic experts to examine what happened and there has been the creation of forged cookies that could allow an intruder to access users’ accounts without a password. Based on the ongoing investigation, the outside forensic experts have identified user accounts for which they believe forged cookies were taken or used in 2015 or 2016.

The company is notifying the affected account holders, and has invalidated the forged cookies. They have connected some of this activity to the same state-sponsored actor believed to be responsible for the data theft we disclosed on September 22, 2016.

If you have not been contacted by Yahoo specifically about this, then your account will not have been affected.

However, if you have a Yahoo account then you should have changed your password and security questions and answers recently. If you haven’t done this then you should ASAP and also any other accounts that use the same login and password.

 

It is wise to review all of your accounts for suspicious activity and be cautious of any unsolicited communications that ask for your personal information or refer you to a web page asking for personal information.

Yahoo are doing everything they can to protect their customers data.

For further information go to https://help.yahoo.com/kb/account/SLN27925.html

 

Do enter your email address and click on the subscribe button on top right to keep up to date with new posts.

The Yahoo Data Breach Reported December 2016

If you are a registered user of Yahoo then you will have received an email from Yahoo explaining what happened in the data breach that has been reported on TV and in newspapers this month.  Someone collected a huge amount of information from Yahoo without their knowledge in August 2013 and it was only in December 2016 that Yahoo found out it’s security had been breached.

Yahoo believe the data copied contains name and email address, telephone numbers, date of birth and in some cases hashed passwords and security questions and answers. But does not include any financial information or credit card numbers etc.

Yahoo only found out about this when  asked by Law Enforcement to examine some data that turned out to be from Yahoo and their investigation proved what had happened three years previously.

  1. As a Yahoo User What Must I Do?

If you have not changed your Yahoo password recently then do so quickly and make sure to set a safe password [http://fightback.ninja/how-to-keep-your-passwords-safe/]. You should also change your security questions.

Check your accounts for any suspicious activities and remember that scammers sometimes only take small amounts for a period of months, hoping to be ignored.

  1. What About Other Online Logins and Passwords?

If you have other accounts that use the same login and password as Yahoo then you should change them quickly. Once scammers have your login and password they will check other websites to see if you’ve used the same information.

Ideally you should use different logins and passwords for each website you’re registered with. However, that may be impractical for people with lots of such logins but you should at least use a set of logins and passwords and not the same one for every web site.

Note: If you receive an email or call from someone claiming to work for Yahoo – be suspicious and do not divulge any confidential information even if they seem to have your information already.

Go to http://yahoo.com/security-update for further information from Yahoo.

Do Share this post on social media – click on the post title then scroll down to the social media share buttons.

Major Organisations Hacked in the UK in 2016

hacking

There have been a lot of company data breaches in 2016 in the UK but the three biggest known such breaches are

  • Three mobile phone company
  • Tesco bank
  • Sage business software company

Three Mobile

Three, one of Britain’s largest mobile operators revealed it’s had a major data breach that could put millions of its customers at risk. Hackers accessed Three’s customer upgrade database via using an employee login. They didn’t get access to any financial data but did access  names, phone numbers, addresses and dates of birth of its customers.

Tesco Bank

Tesco Bank which is part of Tesco supermarkets, had to freeze the online accounts of online customers as 20,000 people had money stolen from their accounts.

You can imagine what the customers thought of suddenly finding their bank cards were rejected. Everywhere and then for some that money had disappeared from their accounts.

Tesco Bank, which has over seven million customer accounts, has said it will cover any financial costs of the breach.

Sage

Sage is a business software company and is part of the FTSE-100 index.

Sage said their data breach could have compromised the personal data of 280 businesses that use Sage.

Attitudes to Data Breaches

A recent survey into attitudes towards organisations that have experienced data breaches shows that 84 percent of respondents would reduce or stop using an organisation’s products or services following breaches, and only 16 percent of respondents would continue to use an organisation’s products or services as usual.

Respondents were asked: “If you found out an organisation whose products or services you use had multiple data breaches, which of the following best describes how you would react?”

16 percent – I would continue to use their products or services as usual

27 percent – I would limit my usage of their products or services

37 percent – I would only use their products or services if I had no alternatives

20 percent – I would stop using their products or services completely

Businesses (especially those in the public eye such as FTSE-100 companies) need to understand that if their online security is not up to standard and they are hacked – that has a chilling effect on their customers and it will be hard to repair their reputation.

Do enter your email address and click on the subscribe button on top right to keep up to date with new posts.

ninja_signature