19 Mart 2017 Pazar

Saks Fifth Avenue Exposed Personal Info On Tens Of Thousands Of Customers

AP/Mark Lennihan

The personal information of tens of thousands of customers of Saks Fifth Avenue, Gilt, Lord & Taylor, and other retail brands have been publicly available in plain text online, BuzzFeed News has learned.

The online shopping sites for the brands are all maintained by the digital division of their owner, the Canada-based Hudson's Bay Company. The sites have exposed thousands of private customer emails, phone numbers and IP addresses — along with identification codes for products the customers expressed interest in buying — on unencrypted, plain text web pages that were accessible to anyone with a web browser.

The pages, which were reviewed by BuzzFeed News in recent days, were taken offline after HBC was contacted for comment on this story. Further site security issues may leave online shoppers' information vulnerable to hackers while they browse the site on an open Wifi network.

"This is bad," said Robert Graham, a cybersecurity expert and owner of Errata Security, to BuzzFeed News. "This is as bad as it gets."

"Everyone is vulnerable," he added.

Here's a redacted screenshot of the kind of information that was publicly available

Here's a redacted screenshot of the kind of information that was publicly available

"We take this matter seriously," a Hudson Bay Company spokesperson told BuzzFeed News. "There is no allegation or indication that credit, payment, or password information have been exposed. The security of our customers is of utmost priority and we are moving quickly and aggressively to resolve the situation, which is limited to some email addresses at this time."

It is unclear why the information was publicly available online. But a Hudson Bay Company spokesperson told BuzzFeed News it has "teams dedicated to the security of our customers' data and follow industry best practices for information security."

The Canadian retailer is the oldest continually operating business in North America, with roots dating back to a fur trader founded in 1670. The company is currently on the hunt for a major new U.S. department store acquisition, and has been in takeover talks with both Neiman Marcus and Macy's, the New York Times reported last week.

One publicly-accessible page viewed by BuzzFeed News shows information on customers who signed up for wait lists to buy products from its sites. The page includes a number of Gmail, AOL and Hotmail addresses, along with work email accounts from JPMorgan, Charter Communications and government addresses. These were often paired with phone numbers left by the customer.

Graham, the cybersecurity professional who reviewed some of the vulnerabilities after being contacted by BuzzFeed News, said they could expose people to further security headaches.

"Where there's smoke, there’s fire," he said. "There is probably a way to get password information, but you would have to search further."

The online shopping sites also use a mix of secure and non-secure pages, which can pose another vulnerability to shoppers.

On Saks Fifth Avenue’s homepage, a small notification appears in the website bar warning users that the connection is not secure. Even when a shopper is logged into their account, a number of the site's other pages do not require secure browsing, which a user can verify when “https” appears ahead of the URL.

SaksFifthAvenue.com / Via saksfifthavenue.com

Graham said that this mix of secure and non-secure pages can leave a shopper vulnerable when browsing on an open WiFi network, as are commonly found in coffee shops and other public places.

A hacker using the same wireless network as a Saks online shopper could eavesdrop on their connection in some circumstances, intercepting data that could allow them to login to the system as the customer in the future, making purchases and grabbing personal information.

"The solution is for every webpage to be encrypted, not just the login," said Graham. "They should all be https links."



from BuzzFeed - Tech http://ift.tt/2nGtpjW
via IFTTT

Hiç yorum yok: