{"id":7120,"date":"2017-03-27T04:30:39","date_gmt":"2017-03-27T12:30:39","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/03\/27\/news-911\/"},"modified":"2017-03-27T04:30:39","modified_gmt":"2017-03-27T12:30:39","slug":"news-911","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/03\/27\/news-911\/","title":{"rendered":"IDG Contributor Network: Saks self-leaked customer data unencrypted, violating multiple rules"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt1.staticworld.net\/images\/article\/2016\/09\/encryption-100682289-primary.idge.jpg\"\/><\/p>\n<p><strong>Credit to Author: Evan Schuman| Date: Mon, 27 Mar 2017 04:00:00 -0700<\/strong><\/p>\n<p>With\u00a0<a href=\"http:\/\/www.computerworld.com\/article\/3157836\/retail-it\/what-is-behind-far-too-many-security-leaks-laziness.html\">so many retailers<\/a> being impacted <a href=\"http:\/\/www.computerworld.com\/article\/3151447\/retail-it\/making-gas-stations-safe-for-fraudsters-again.html\">by cyber attacks<\/a>, it\u2019s easy to conclude that thieves are necessary for data breaches. Not necessarily. Saks last week made clear that it can breach itself quite efficiently.<\/p>\n<p>That revelation comes <a href=\"https:\/\/www.buzzfeed.com\/leticiamiranda\/saks-fifth-avenue-exposed-personal-info\">courtesy of Buzzfeed News<\/a>, which visited the site and noticed private data about quite a few fellow site visitors and shoppers.<\/p>\n<p>&#8220;Until recently, unencrypted, publicly accessible web pages on the site contained tens of thousands of records for customers who signed up for wait lists to buy products,&#8221; the story said. &#8220;The records included email addresses and product codes for the items customers expressed interest in buying and some also contained phone numbers. Each record also included a date and time and one of a handful of recurring IP addresses.&#8221;<\/p>\n<p>Saks leapt into action, quickly removing the forbidden data \u2014 right after a reporter called the site seeking comment. *sigh*<\/p>\n<p>I wish I could say that this kind of self-leaking of sensitive data is surprising. Earlier this month, I was trying to update a license key with an Acronis backup product. During that process, I would log in and the system would repeatedly log me <em>and then log me back in under someone else&#8217;s account. <\/em>Yes, you read that right. It allowed me to access personal details \u2014 and, apparently, cloud backup \u2014 of other customers, although I opted to not touch that data. A cyberthief stumbling upon such data would have been unlikely to be so kind.<\/p>\n<p>By the way, when I flagged the problem to Acronis, the customer service person denied that it happened even though it happened again while sharing my screen.<\/p>\n<p>Although Saks quickly addressed this issue once it was flagged, the incident illustrates two very different security holes in Saks&#8217; operation.<\/p>\n<p><strong>Problem #1: Saks didn&#8217;t catch the issue itself.<\/strong> Site testing should never stop merely because a site is launched.<\/p>\n<p>One of the magic joys of HTML is that code, seemingly untouched, can develop its own hiccups. Many developers believe in the myth that once code is tested and it works properly, it will forever work just as properly, up until the point that someone changes the code. That certainly seems reasonable and logical, but how many incidents that disprove that theory have to happen before that myth is forever abandoned?<\/p>\n<p>Blame it on HTML gremlins if you like \u2014 I typically do \u2014 but sites need to be continually tested and probed. This way, there&#8217;s a good chance that your team will detect \u2014 and then fix \u2014 any problems before customers, the media or a lucky cyberthief stumble on them.<\/p>\n<p><strong>Problem #2: The leak happened in the first place<\/strong> and happened unencrypted.<\/p>\n<p>Due to the gremlin problem noted above, there is a finite amount of blame that can be assigned to Saks. Well, that&#8217;s true at this point. If it later gets disclosed that the Saks leak was due to human error \u2014 or especially a disgruntled employee or contractor \u2014 then blame may be appropriate.<\/p>\n<p>The problem isn&#8217;t entirely with the data leaking. It&#8217;s the apparent fact (see the screen captures in that Buzzfeed story) that this sensitive data was stored in clear text. Why? Had it been encrypted, it could have leaked out and delivered very little \u2014 and possibly no \u2014 damage.<\/p>\n<p>Some managers resist bothering with encryption, arguing that the data is only accessible from inside a LAN that has its own robust authentication protections. The problem is that is true only in theory. If anything goes wrong, as Saks is now discovering, keeping all sensitive data encrypted at all times is the best strategy.<\/p>\n<p><strong>This article is published as part of the IDG Contributor Network. <a href=\"\/contributor-network\/signup.html\">Want to Join?<\/a><\/strong><\/p>\n<p><a href=\"http:\/\/www.computerworld.com\/article\/3182878\/retail-it\/saks-self-leaked-customer-data-unencrypted-violating-multiple-rules.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt1.staticworld.net\/images\/article\/2016\/09\/encryption-100682289-primary.idge.jpg\"\/><\/p>\n<p><strong>Credit to Author: Evan Schuman| Date: Mon, 27 Mar 2017 04:00:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>With\u00a0<a href=\"http:\/\/www.computerworld.com\/article\/3157836\/retail-it\/what-is-behind-far-too-many-security-leaks-laziness.html\">so many retailers<\/a> being impacted <a href=\"http:\/\/www.computerworld.com\/article\/3151447\/retail-it\/making-gas-stations-safe-for-fraudsters-again.html\">by cyber attacks<\/a>, it\u2019s easy to conclude that thieves are necessary for data breaches. Not necessarily. Saks last week made clear that it can breach itself quite efficiently.<\/p>\n<p>That revelation comes <a href=\"https:\/\/www.buzzfeed.com\/leticiamiranda\/saks-fifth-avenue-exposed-personal-info\">courtesy of Buzzfeed News<\/a>, which visited the site and noticed private data about quite a few fellow site visitors and shoppers.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3182878\/retail-it\/saks-self-leaked-customer-data-unencrypted-violating-multiple-rules.html#jump\">To read this article in full or to leave a comment, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[11063,10439,11669,714],"class_list":["post-7120","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-data-privacy","tag-encryption","tag-retail-it","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7120"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7120\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7120"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}