Attacks/Breaches
8/5/2009
04:30 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Mozilla Store Security Breached

GatewayCDI, which operates the Mozilla Store, suffered a security breach affecting an undisclosed number of customers.

Mozilla on Wednesday disclosed that a security breach had occurred at a third-party vendor that operates the backend infrastructure of the Mozilla Store.

The breach occurred at GatewayCDI, a distributor of promotional products based in St. Louis, Missouri.

The Mozilla Store sells various items of clothing, software, and other merchandise related to Firefox and other Mozilla projects.

Mozilla declined to provide information about the number of customers whose personal data may have been accessed or to elaborate on the circumstances surrounding the breach.

Conrad Franey, chief marketing officer at GatewayCDI, said that some customer names and passwords were exposed, but that at this point, it appears that no credit card information was accessed.

He said the attack came from a hacker who appears to be based in India. He said he wasn't ready to provide an estimate about the number of people affected. He expects further information to be released shortly.

"We've been in this industry for 25 years," Franey said. "We take this very, very seriously."

In July, Senator Patrick Leahy (D-VT), introduced a data breach bill called the Personal Data Privacy and Security Act. Two previous data breach bills of his have failed. The Act is supposed to make it more difficult for retailers to conceal information about breaches. But critics of the bill argue that the proposed law is full of holes.

In a blog post, Mozilla said that it shut down the Mozilla Store as a preventative step, and that it also closed the International Mozilla Store, run by a different third-party vendor, as a precaution.

Mozilla said that GatewayCDI is in the process of investigating the cause and the extent of the breach. Affected customers are supposed to be contacted by GatewayCDI.

"Mozilla is committed to user privacy and the store will only be reinstated once we have a satisfactory assurance of ongoing login security and data privacy," the company said.

Mozilla has been mulling how to make the Mozilla Store more compelling to members of its community. In May, Mozilla developer David Boswell wrote a blog post that asked whether the social interaction at online T-shirt vendor Threadless offers a model that could be emulated to improve the Mozilla Store experience.

Update: Added GatewayCDI comment.

InformationWeek has published an in-depth report on managing risk. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-2977
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to create arbitrary files, and consequently execute arbitrary code, via unspecified vectors.

CVE-2015-2978
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to bypass authentication and complete a conference-room reservation via unspecified vectors, as demonstrated by an "unintentional reservation."

CVE-2015-2979
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to execute arbitrary OS commands via unspecified vectors.

CVE-2015-4286
Published: 2015-07-29
The web framework in Cisco UCS Central Software 1.3(0.99) allows remote attackers to read arbitrary files via a crafted HTTP request, aka Bug ID CSCuu41377.

CVE-2015-4290
Published: 2015-07-29
The kernel extension in Cisco AnyConnect Secure Mobility Client 4.0(2049) on OS X allows local users to cause a denial of service (panic) via vectors involving contiguous memory locations, aka Bug ID CSCut12255.

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!