Security News > 2020 > November > Texas Gold-Dealer Mined for Payment Details in Months-Long Data Breach
The company's response was less than solid gold - it took months to notify its users of the breach.
In a notice sent to its online customers, the company said that it became aware of suspicious activity on its website on July 6.
The company claims on its website that it uses 256-bit SSL encryption, certified by DigiCert/Norton.
"Magecart attacks are notoriously difficult to detect because they target the client-side of websites," Ameet Naik, security evangelist at PerimeterX, told Threatpost, noting that taking five months to notice the skimmer is not unusual.
"Hackers inject malicious shadow code into the website scripts which runs on the users' browsers. Traditional server-side monitoring and security solutions don't have visibility into this client-side activity and are unable to stop such digital skimming attacks that lead to the theft of personal data from website users. This not only hurts the online business, but also exposes them to compliance penalties and liability."
News URL
https://threatpost.com/texas-gold-dealer-payment-data-breach/160846/
Related news
- Texas Tech University System data breach impacts 1.4 million patients (source)
- Free, France’s second largest ISP, confirms data breach after leak (source)
- Interbank confirms data breach following failed extortion, data leak (source)
- How to Effectively Manage a Data Breach (source)
- Amazon confirms employee data breach after vendor hack (source)
- HIBP notifies 57 million people of Hot Topic data breach (source)
- US space tech giant Maxar discloses employee data breach (source)
- Fintech giant Finastra investigates data breach after SFTP hack (source)
- Bologna FC confirms data breach after RansomHub ransomware attack (source)
- Rhode Island confirms data breach after Brain Cipher ransomware attack (source)