Attacks/Breaches
8/5/2009
04:30 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Mozilla Store Security Breached

GatewayCDI, which operates the Mozilla Store, suffered a security breach affecting an undisclosed number of customers.

Mozilla on Wednesday disclosed that a security breach had occurred at a third-party vendor that operates the backend infrastructure of the Mozilla Store.

The breach occurred at GatewayCDI, a distributor of promotional products based in St. Louis, Missouri.

The Mozilla Store sells various items of clothing, software, and other merchandise related to Firefox and other Mozilla projects.

Mozilla declined to provide information about the number of customers whose personal data may have been accessed or to elaborate on the circumstances surrounding the breach.

Conrad Franey, chief marketing officer at GatewayCDI, said that some customer names and passwords were exposed, but that at this point, it appears that no credit card information was accessed.

He said the attack came from a hacker who appears to be based in India. He said he wasn't ready to provide an estimate about the number of people affected. He expects further information to be released shortly.

"We've been in this industry for 25 years," Franey said. "We take this very, very seriously."

In July, Senator Patrick Leahy (D-VT), introduced a data breach bill called the Personal Data Privacy and Security Act. Two previous data breach bills of his have failed. The Act is supposed to make it more difficult for retailers to conceal information about breaches. But critics of the bill argue that the proposed law is full of holes.

In a blog post, Mozilla said that it shut down the Mozilla Store as a preventative step, and that it also closed the International Mozilla Store, run by a different third-party vendor, as a precaution.

Mozilla said that GatewayCDI is in the process of investigating the cause and the extent of the breach. Affected customers are supposed to be contacted by GatewayCDI.

"Mozilla is committed to user privacy and the store will only be reinstated once we have a satisfactory assurance of ongoing login security and data privacy," the company said.

Mozilla has been mulling how to make the Mozilla Store more compelling to members of its community. In May, Mozilla developer David Boswell wrote a blog post that asked whether the social interaction at online T-shirt vendor Threadless offers a model that could be emulated to improve the Mozilla Store experience.

Update: Added GatewayCDI comment.

InformationWeek has published an in-depth report on managing risk. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1978
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Simple PHP Agenda 2.2.8 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add an administrator via a request to auth/process.php, (2) delete an administrator via a request to auth/admi...

CVE-2015-0741
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Cisco Prime Central for Hosted Collaboration Solution (PC4HCS) 10.6(1) and earlier allow remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCut04596.

CVE-2015-0742
Published: 2015-05-21
The Protocol Independent Multicast (PIM) application in Cisco Adaptive Security Appliance (ASA) Software 9.2(0.0), 9.2(0.104), 9.2(3.1), 9.2(3.4), 9.3(1.105), 9.3(2.100), 9.4(0.115), 100.13(0.21), 100.13(20.3), 100.13(21.9), and 100.14(1.1) does not properly implement multicast-forwarding registrati...

CVE-2015-0746
Published: 2015-05-21
The REST API in Cisco Access Control Server (ACS) 5.5(0.46.2) allows remote attackers to cause a denial of service (API outage) by sending many requests, aka Bug ID CSCut62022.

CVE-2015-0915
Published: 2015-05-21
Cross-site scripting (XSS) vulnerability in RAKUS MailDealer 11.2.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted attachment filename.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.