Fake Google Analytics Script Exposes Vision Direct Customer Info

AlphaAtlas

[H]ard|Gawd
Staff member
Joined
Mar 3, 2018
Messages
1,713
The BBC reports that Vision Direct, a European contact lens store, suffered a data breach that exposed the financial info of over 6,600 customers, as well as other personal data of 9,700 more customers. Some of the leaked data includes credit card numbers, expiration dates and CVV codes. Interestingly, a security expert on Twitter claims that a fake Google Analytics script from "g-analytics[.]com" was responsible for the breach, mirroring other recent hacks where bad code was used to send credit card info to shady URLs. The company's parent firm says they "will compensate any customers who have suffered financial loss as a result of this breach."

"This particular breach is known as Shoplift and was already known to our technology team, who installed a patch provided by our web platform provider to prevent this form of malware," she added. "Unfortunately, this current incident appears to be a derivative against which the patch proved ineffective. We are continuing to investigate the breach and have made numerous steps to ensure this does not happen again."
 
Crap like this is why I run some type of script blocker on all sites. Even [H]. While [H] scripts are allowed, scripts from non-[H] domains are blocked.
 
I have sometimes wondered what third party scripts run on this forum, but I never got around to looking into it.
Crap like this is why I run some type of script blocker on all sites. Even [H]. While [H] scripts are allowed, scripts from non-[H] domains are blocked.
 
wait.. they are calling this a security breach? Their webteam downloaded a script from a bogus domain and ran that instead of a legit one..
 
What bothers me more was the fact that they were storing the CVV of the card. That's strictly against PCI-DSS compliance.
 
Google is one of the main domains I always block scripts from. Facebook is number 2.
 
Back
Top