FabFitFun Customer Data Security Breach 2020 – WWD | #Databreach | Pentest | #Hacker

FabFitFun had a summer of security issues for its customers.

The popular subscription box, with a reported more than 1 million subscribers getting its monthly packages of apparel, beauty and home products, had two breaches of customer data between May and August of this year, WWD has learned. The breaches include personal customer information like e-mails, names and addresses, as well as credit card and payment information, like that used for PayPal and ApplePay.  

While the first breach, which occurred in May and was said to affect fewer than 1,000 customers, was disclosed to some shoppers and they were offered a $25 site credit, a more recent one seems to have taken longer for the company to disclose. Neither breach has been reported to the State of California, as is required for business breaches that affect more than 500 consumers, according to public data from the State Attorney General.

A company spokeswoman didn’t specify the number of customers affected, but did not refute source claims that it was likely in the thousands. She also did not address the apparent lack of disclosure to state authorities but offered: “We are confident that the issue has been resolved and will no longer affect transactions on our web site.”

In a Reddit forum on the initial data breach in May, dozens of FabFitFun users claimed they received no notification of the first breach, even though they claim to have linked fraudulent activity on personal credit cards to information stolen from FabFitFun.

On Tuesday, another user in a separate and larger FabFitFun forum said they were just this week notified by the company of the second breach, which seems to have gone unnoticed from late May to early August. In the note, the company attributed the breach to “malicious code” inserted in its member sign-up page, and said “we believe” that only a subset of new sign-ups were affected by the breach. The company also said that it had reported the breach to law enforcement, but again, there is no notification on file with the State Attorney General of California, where FabFitFun is based.

Data breaches are not uncommon in retail, and business from StockX to Target have had to deal with them, but they can lead to consumer lawsuits and involvement by state lawmakers charged with consumer concerns.

In comments regarding the second breach, dozens of customers again claimed to have gone unnotified for weeks, allowing their information to be stolen and used. Users on the forum claim to have had fraudulent credit card and bank transactions and noticed fraudulent attempts to use their e-mails and names to sign up for new shopping accounts at other retailers. While those who received direct notification received another $25 site credit, many noted that they were canceling subscriptions after seeing a second data breach over roughly three months. 

“As if I want to continue purchasing with them anymore,” one member of the forum wrote. “I understand that security breaches can happen with any company, but their general attitude is infuriating. Someone tried to order from my card four to five days ago, had FFF been more prompt with informing customers, this could’ve been totally avoided.”

In order to remove personal information from the site, users claim that they have to submit a separate request in addition to canceling a subscription, as FabFitFun is said to store all information, even for inactive accounts.

In a recent internal note said to be the first disclosure to staff of the breaches, cofounder and co-chief executive officer Michael Broukhim said that the company had required all customers and staff to reset their user passwords. He did not mention other remedies to the situation beyond “continuing to review and enhance security measures.”

Click here for the original Source.


Get your CompTIA A+, Network+ White Hat-Hacker, Certified Web Intelligence Analyst and more starting at $35 a month. Click here for more details.

.  .  .  .  .  .  . .  .  .  .  .  .  .  .  .  .   .   .   .    .    .   .   .   .   .   .  .   .   .   .  .  .   .  .

Leave a Reply