Attacks/Breaches
8/5/2009
04:30 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Mozilla Store Security Breached

GatewayCDI, which operates the Mozilla Store, suffered a security breach affecting an undisclosed number of customers.

Mozilla on Wednesday disclosed that a security breach had occurred at a third-party vendor that operates the backend infrastructure of the Mozilla Store.

The breach occurred at GatewayCDI, a distributor of promotional products based in St. Louis, Missouri.

The Mozilla Store sells various items of clothing, software, and other merchandise related to Firefox and other Mozilla projects.

Mozilla declined to provide information about the number of customers whose personal data may have been accessed or to elaborate on the circumstances surrounding the breach.

Conrad Franey, chief marketing officer at GatewayCDI, said that some customer names and passwords were exposed, but that at this point, it appears that no credit card information was accessed.

He said the attack came from a hacker who appears to be based in India. He said he wasn't ready to provide an estimate about the number of people affected. He expects further information to be released shortly.

"We've been in this industry for 25 years," Franey said. "We take this very, very seriously."

In July, Senator Patrick Leahy (D-VT), introduced a data breach bill called the Personal Data Privacy and Security Act. Two previous data breach bills of his have failed. The Act is supposed to make it more difficult for retailers to conceal information about breaches. But critics of the bill argue that the proposed law is full of holes.

In a blog post, Mozilla said that it shut down the Mozilla Store as a preventative step, and that it also closed the International Mozilla Store, run by a different third-party vendor, as a precaution.

Mozilla said that GatewayCDI is in the process of investigating the cause and the extent of the breach. Affected customers are supposed to be contacted by GatewayCDI.

"Mozilla is committed to user privacy and the store will only be reinstated once we have a satisfactory assurance of ongoing login security and data privacy," the company said.

Mozilla has been mulling how to make the Mozilla Store more compelling to members of its community. In May, Mozilla developer David Boswell wrote a blog post that asked whether the social interaction at online T-shirt vendor Threadless offers a model that could be emulated to improve the Mozilla Store experience.

Update: Added GatewayCDI comment.

InformationWeek has published an in-depth report on managing risk. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0972
Published: 2014-08-01
The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write ...

CVE-2014-2627
Published: 2014-08-01
Unspecified vulnerability in HP NonStop NetBatch G06.14 through G06.32.01, H06 through H06.28, and J06 through J06.17.01 allows remote authenticated users to gain privileges for NetBatch job execution via unknown vectors.

CVE-2014-3009
Published: 2014-08-01
The GDS component in IBM InfoSphere Master Data Management - Collaborative Edition 10.0 through 11.0 and InfoSphere Master Data Management Server for Product Information Management 9.0 and 9.1 does not properly handle FRAME elements, which makes it easier for remote authenticated users to conduct ph...

CVE-2014-3302
Published: 2014-08-01
user.php in Cisco WebEx Meetings Server 1.5(.1.131) and earlier does not properly implement the token timer for authenticated encryption, which allows remote attackers to obtain sensitive information via a crafted URL, aka Bug ID CSCuj81708.

CVE-2014-3534
Published: 2014-08-01
arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a c...

Best of the Web
Dark Reading Radio