Looks Like Macy’s And Bloomingdale’s Got Breached Now

macy's

macy’s

For nearly two months, an unauthorized party reportedly used stolen usernames and passwords to log into the online accounts of certain Macys.com and Bloomingdales.com customers.

The breach took place from April 26 through June 12, compromising data such as full names, addresses, phone numbers, email addresses, birthdays, and payment card numbers with expiration dates, according to a July 6 report in the Detroit Free Press.

The incident was detected by Macy’s cyber threat alert tools on June 11, and no CVV or Social Security numbers were affected, the retailer told customers in a letter last week, the Free Press further reports. Macy’s has blocked the compromised customer profiles, which can only be reactivated if their rightful owners change their passwords.

“We are aware of a data security incident involving a small number of our customers at Macys.com and Bloomingdales.com,” reads a brief corporate statement, sent to SC Media today. “We have investigated the matter thoroughly, addressed the cause and, as a precaution, have implemented additional security measures. Macy’s, Inc. will provide consumer protection services at no cost to those customers. We have contacted potentially impacted customers with more information about these services.”

John Gunn, CMO at OneSpan, wasn’t particularly impressed with Macy’s statement. “Macy’s declaration that they have added additional security measures as a precaution is like saying you have added fire extinguishers after the building has burnt to the ground,” said Gunn in an emailed statement. “Private citizens have no way of knowing if the firms that they have trusted are implementing proper security measures and the frequency with which breaches continue to occur would indicate that this is not the case. Most firms implement necessary security, such as multifactor authentication, but additional regulation is needed to ensure that all of them do.”

“Stolen retail accounts are a hot commodity on the dark markets and there are many shops selling them,” said Andy Norton, director of threat intelligence at Lastline, in another emailed statement. “Using stolen accounts to buy items from a retailer is one of the big money-making activities for cybercriminals.”

Norton noted that the retail industry faces multiple challenges while defending itself from cyber actors. “Firstly, they hold lots of personally identifiable information (PII) data which exposes them to potentially big GDPR fines. Secondly, their online business systems are often targeted with stolen accounts and credit cards in order to get ‘carded items,’ which means things purchased using identity theft,” he said.

As a countermeasure, “Retailers offering two factor authentication would be a good way to restore confidence in online shopping activity,” Norton continued.

READ MORE HERE