{"id":13982,"date":"2018-12-03T10:17:04","date_gmt":"2018-12-03T18:17:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/12\/03\/news-7749\/"},"modified":"2018-12-03T10:17:04","modified_gmt":"2018-12-03T18:17:04","slug":"news-7749","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/12\/03\/news-7749\/","title":{"rendered":"Jared, Kay Jewelers Parent Fixes Data Leak"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Mon, 03 Dec 2018 17:25:58 +0000<\/strong><\/p>\n<p>The parent firm of bling retailers <strong>Jared<\/strong>\u00a0and <strong>Kay Jewelers<\/strong> has fixed a bug in the Web sites of both companies that exposed the order information for all of their online customers.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-45854\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2018\/12\/signet.jpg\" alt=\"\" width=\"592\" height=\"395\" \/><\/p>\n<p>In mid-November 2018, KrebsOnSecurity heard from a Jared customer who found something curious after receiving a receipt via email for a pair of earrings he&#8217;d just purchased as a surprise gift for his girlfriend.<\/p>\n<p>Dallas-based Web designer <strong>Brandon Sheehy<\/strong> discovered that slightly modifying the link in the confirmation email he received and pasting that into a Web browser revealed another customer&#8217;s order, including their name, billing address, shipping address, phone number, email address, items and total amount purchased, delivery date, tracking link, and the last four digits of the customer&#8217;s credit card number.<\/p>\n<p>Sheehy said after discovering the weakness, his mind quickly turned to the various ways that crooks might exploit it.<\/p>\n<p>&#8220;My first thought was they could track a package of jewelry to someone&#8217;s door and swipe it off their doorstep,&#8221; he said. &#8220;My second thought was that someone could call Jared&#8217;s customers and pretend to be Jared, reading the last four digits of the customer&#8217;s card and saying there&#8217;d been a problem with the order, and if they could get a different card for the customer they could run it right away and get the order out quickly. That would be a pretty convincing scam. Or just targeted phishing attacks.&#8221;<\/p>\n<p>Concerned that his own information was similarly exposed, Sheehy contacted Jared parent company <strong>Signet Jewelers<\/strong> and asked them to fix the data exposure. When several weeks passed and Sheehy could still view his information and that of other Jared customers, he reached out to KrebsOnSecurity.<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/scott-lancaster-cism-6788461\/\" target=\"_blank\" rel=\"noopener\"><strong>Scott Lancaster<\/strong><\/a>, chief information security officer at Signet, said the company did fix the problem for all future orders shortly after receiving a customer&#8217;s complaint. But Lancaster said Signet neglected to remedy the data exposure <em>for all past orders<\/em> until contacted by KrebsOnSecurity.<\/p>\n<p>&#8220;When a customer first brought this matter to our attention in early November, we fixed it for all new orders going forward,&#8221; Lancaster said. &#8220;But we didn&#8217;t notice at the time that this applied to all past orders as well as future orders.&#8221;<span id=\"more-45499\"><\/span><\/p>\n<p>Lancaster said the problem affected only orders made online through jared.com and kay.com, and that the weakness was not present on the sites of the company&#8217;s other jewelry brands, such as <strong>Zales<\/strong> and <strong>Piercing Pagoda<\/strong>.<\/p>\n<p>Data exposures like these are some of the most common yet preventable for online retailers.\u00a0In July, identity theft protection service\u00a0<strong>LifeLock<\/strong>\u00a0corrected an information disclosure flaw that\u00a0<a href=\"https:\/\/krebsonsecurity.com\/2018\/07\/lifelock-bug-exposed-millions-of-customer-email-addresses\/\" target=\"_blank\" rel=\"noopener\">exposed the email address of millions of subscribers<\/a>. And in April 2018, PaneraBread.com\u00a0<a href=\"https:\/\/krebsonsecurity.com\/2018\/04\/panerabread-com-leaks-millions-of-customer-records\/\" target=\"_blank\" rel=\"noopener\">remedied a weakness<\/a>\u00a0exposing millions of customer names, email and physical addresses, birthdays and partial credit card numbers.<\/p>\n<p>Sheehy said he&#8217;s glad Signet has fully fixed the bug, but said he was annoyed that it seems like many companies fail to address or even acknowledge such failures unless and until they&#8217;re confronted by the news media.<\/p>\n<p>&#8220;Being a Web developer, the only thing I can chalk this up to is complete incompetence, and being very lazy and indifferent to your customers&#8217; data,&#8221; he said. &#8220;This isn&#8217;t novel stuff, it&#8217;s basic Web site security.&#8221;<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2018\/12\/jared-kay-jewelers-parent-fixes-data-leak\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2018\/12\/signet.jpg\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Mon, 03 Dec 2018 17:25:58 +0000<\/strong><\/p>\n<p>The parent firm of bling retailers Jared\u00a0and Kay Jewelers has fixed a bug in the Web sites of both companies that exposed the order information for all of their online customers.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[20332,11740,20333,20334,20335,20336],"class_list":["post-13982","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-brandon-sheehy","tag-data-breaches","tag-jared","tag-kay-jewelers","tag-scott-lancaster","tag-signet-jewelers"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13982","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13982"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13982\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13982"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13982"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13982"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}