Attacks/Breaches
8/5/2009
04:30 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Mozilla Store Security Breached

GatewayCDI, which operates the Mozilla Store, suffered a security breach affecting an undisclosed number of customers.

Mozilla on Wednesday disclosed that a security breach had occurred at a third-party vendor that operates the backend infrastructure of the Mozilla Store.

The breach occurred at GatewayCDI, a distributor of promotional products based in St. Louis, Missouri.

The Mozilla Store sells various items of clothing, software, and other merchandise related to Firefox and other Mozilla projects.

Mozilla declined to provide information about the number of customers whose personal data may have been accessed or to elaborate on the circumstances surrounding the breach.

Conrad Franey, chief marketing officer at GatewayCDI, said that some customer names and passwords were exposed, but that at this point, it appears that no credit card information was accessed.

He said the attack came from a hacker who appears to be based in India. He said he wasn't ready to provide an estimate about the number of people affected. He expects further information to be released shortly.

"We've been in this industry for 25 years," Franey said. "We take this very, very seriously."

In July, Senator Patrick Leahy (D-VT), introduced a data breach bill called the Personal Data Privacy and Security Act. Two previous data breach bills of his have failed. The Act is supposed to make it more difficult for retailers to conceal information about breaches. But critics of the bill argue that the proposed law is full of holes.

In a blog post, Mozilla said that it shut down the Mozilla Store as a preventative step, and that it also closed the International Mozilla Store, run by a different third-party vendor, as a precaution.

Mozilla said that GatewayCDI is in the process of investigating the cause and the extent of the breach. Affected customers are supposed to be contacted by GatewayCDI.

"Mozilla is committed to user privacy and the store will only be reinstated once we have a satisfactory assurance of ongoing login security and data privacy," the company said.

Mozilla has been mulling how to make the Mozilla Store more compelling to members of its community. In May, Mozilla developer David Boswell wrote a blog post that asked whether the social interaction at online T-shirt vendor Threadless offers a model that could be emulated to improve the Mozilla Store experience.

Update: Added GatewayCDI comment.

InformationWeek has published an in-depth report on managing risk. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8142
Published: 2014-12-20
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.