[The security box] ***SPAM*** Re: Zales.com Leaked Customer Data, Just Like Sister Firms Jared, Kay Jewelers Did in 2018
Jennifer Martinez
reignblessing at yahoo.com
Fri Oct 29 14:35:33 EDT 2021
Holy fuck! Thought you were looking into a ring for me? Until I started to read. My question? If these sites collect so much data (and they do) what prevents them from collecting a person SSN?Victims are owned anyway. The final nail is SSN! Get your shit together! Especially when you require so much info from clients! No excuse for such careless practices# once alerted of similar problems elsewhere, you need to start spending green to fix your software! This is completely unacceptable I'm not mad that it happened but I'm mad that they already knew about similar problems and did nothing!
Sent from Yahoo Mail on Android
On Fri, Oct 29, 2021 at 6:52 AM, Jared Rimer via Thesecuritybox<thesecuritybox at 986themix.com> wrote:
Zales.com Leaked Customer Data, Just Like Sister Firms Jared, Kay Jewelers Did in 2018
Krebs on Security / BrianKrebs
In December 2018, bling vendor Signet Jewelers fixed a weakness in their Kay Jewelers and Jared websites that exposed the order information for all of their online customers. This week, Signet subsidiary Zales.com updated its website to remediate a nearly identical customer data exposure.
Last week, KrebsOnSecurity heard from a reader who was browsing Zales.com and suddenly found they were looking at someone else’s order information on the website, including their name, billing address, shipping address, phone number, email address, items and total amount purchased, delivery date, tracking link, and the last four digits of the customer’s credit card number.
The reader noticed that the link for the order information she’d stumbled on included a lengthy numeric combination that — when altered — would produce yet another customer’s order information.
When the reader failed to get an immediate response from Signet, KrebsOnSecurity contacted the company. In a written response, Signet said, “A concern was brought to our attention by an IT professional. We addressed it swiftly, and upon review we found no misuse or negative impact to any systems or customer data.”
Their statement continues:
“As a business principle we make consumer information protection the highest priority, and proactively initiate independent and industry-leading security testing. As a result, we exceed industry benchmarks on data protection maturity. We always appreciate it when consumers reach out to us with feedback, and have committed to further our efforts on data protection maturity.”
When Signet fixed similar weaknesses with its Jared and Kay websites back in 2018, the reader who found and reported that data exposure said his mind quickly turned to the various ways crooks might exploit access to customer order information.
“My first thought was they could track a package of jewelry to someone’s door and swipe it off their doorstep,” said Brandon Sheehy, a Dallas-based Web developer. “My second thought was that someone could call Jared’s customers and pretend to be Jared, reading the last four digits of the customer’s card and saying there’d been a problem with the order, and if they could get a different card for the customer they could run it right away and get the order out quickly. That would be a pretty convincing scam. Or just targeted phishing attacks.”
In the grand scheme of many other, far more horrible things going on information security right now, this Zales customer data exposure is small potatoes. And this type of data exposure is unbelievably common today: KrebsOnSecurity could probably run one story each day for several months just based on examples I’ve seen at dozens of other places online.
But I do think one key reason we continue to see companies make these easily avoidable mistakes with their customer data is that there are hardly ever any real consequences for organizations that fail to take more care. Meanwhile, their customers’ data is free to be hoovered up by anyone or anything that cares to look for it or index it.
“Being a Web developer, the only thing I can chalk this up to is complete incompetence, and being very lazy and indifferent to your customers’ data,” Sheehy said. “This isn’t novel stuff, it’s basic Web site security.”
Original Article: https://krebsonsecurity.com/2021/10/zales-com-leaked-customer-data-just-like-sister-firms-jared-kay-jewelers-did-in-2018/
Jared RimerCheck out my shows on Saturdays and Sundays right here on the mix. Www.986themix.com for more details. Jared Rimer
Check out my show on www.986themix.com from 7 pm to 10 pm where we play Magnatune and other indipendant artists Thank you for subscribing to the Security Box email list. If you need list management options, please see the link for a section to log in, manage your subscription, and possibly other options that may be of interest.
Need help? write the owner, and the owner will get back to you as quickly as possible. Be clear on what you need.
Thanks for subscribing!
--
Thesecuritybox mailing list
Thesecuritybox at 986themix.com
http://mail.986themix.com/mailman/listinfo/thesecuritybox_986themix.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.986themix.com/pipermail/thesecuritybox_986themix.com/attachments/20211029/1374067d/attachment-0001.htm>
More information about the Thesecuritybox
mailing list