Attacks/Breaches
8/5/2009
04:30 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Mozilla Store Security Breached

GatewayCDI, which operates the Mozilla Store, suffered a security breach affecting an undisclosed number of customers.

Mozilla on Wednesday disclosed that a security breach had occurred at a third-party vendor that operates the backend infrastructure of the Mozilla Store.

The breach occurred at GatewayCDI, a distributor of promotional products based in St. Louis, Missouri.

The Mozilla Store sells various items of clothing, software, and other merchandise related to Firefox and other Mozilla projects.

Mozilla declined to provide information about the number of customers whose personal data may have been accessed or to elaborate on the circumstances surrounding the breach.

Conrad Franey, chief marketing officer at GatewayCDI, said that some customer names and passwords were exposed, but that at this point, it appears that no credit card information was accessed.

He said the attack came from a hacker who appears to be based in India. He said he wasn't ready to provide an estimate about the number of people affected. He expects further information to be released shortly.

"We've been in this industry for 25 years," Franey said. "We take this very, very seriously."

In July, Senator Patrick Leahy (D-VT), introduced a data breach bill called the Personal Data Privacy and Security Act. Two previous data breach bills of his have failed. The Act is supposed to make it more difficult for retailers to conceal information about breaches. But critics of the bill argue that the proposed law is full of holes.

In a blog post, Mozilla said that it shut down the Mozilla Store as a preventative step, and that it also closed the International Mozilla Store, run by a different third-party vendor, as a precaution.

Mozilla said that GatewayCDI is in the process of investigating the cause and the extent of the breach. Affected customers are supposed to be contacted by GatewayCDI.

"Mozilla is committed to user privacy and the store will only be reinstated once we have a satisfactory assurance of ongoing login security and data privacy," the company said.

Mozilla has been mulling how to make the Mozilla Store more compelling to members of its community. In May, Mozilla developer David Boswell wrote a blog post that asked whether the social interaction at online T-shirt vendor Threadless offers a model that could be emulated to improve the Mozilla Store experience.

Update: Added GatewayCDI comment.

InformationWeek has published an in-depth report on managing risk. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6335
Published: 2014-08-26
The Backup-Archive client in IBM Tivoli Storage Manager (TSM) for Space Management 5.x and 6.x before 6.2.5.3, 6.3.x before 6.3.2, 6.4.x before 6.4.2, and 7.1.x before 7.1.0.3 on Linux and AIX, and 5.x and 6.x before 6.1.5.6 on Solaris and HP-UX, does not preserve file permissions across backup and ...

CVE-2014-0480
Published: 2014-08-26
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL ...

CVE-2014-0481
Published: 2014-08-26
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a d...

CVE-2014-0482
Published: 2014-08-26
The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors relate...

CVE-2014-0483
Published: 2014-08-26
The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.