Garmin SA Shopping Portal Breach Leads To Payment Data Theft

By   ISBuzz Team
Writer , Information Security Buzz | Sep 16, 2019 06:37 am PST

Garmin Southern Africa (Garmin SA) has disclosed in a series of notifications sent to its customers that payment and sensitive personal information were stolen from orders placed on the shop.garmin.co.za shopping portal.

“We recently discovered theft of customer data from orders placed through shop.garmin.co.za (operated by Garmin South Africa) that compromised your personal data related to an order that you placed through the website,” said Jennifer Van Niekerk, South Africa Managing Director. The compromised data was limited to only Garmin’s South Africa site, and contained payment information, including the number, expiration date and CVV code for your payment card, along with your first and last name, physical address, phone number and email address.”

While the cause of the breach is not mentioned in the notification email to the impacted Garmin SA customers, there are signs that the shop.garmin.co.za portal was the victim of a Magecart group.

Subscribe
Notify of
guest
1 Expert Comment
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Peter Draper
Peter Draper , Technical Director, EMEA
September 16, 2019 2:39 pm

A number of companies have been caught by Magecart recently, British Airways and Ticketmaster to name but two. Companies taking payments through their website need to limit access for scripts in their websites to offer the best protection for user data being entered. One of the key elements of this attack is that the bad actors need to send the data to their own servers to actually collect the information. UEBA and Network Analytics can be used to identify abnormal traffic, such as the sudden outbound traffic from the website servers to unknown external devices and in combination with automated security controls can stop the exfiltration of data as soon as it is identified. This reduces the impact and the number of users affected whilst alerting security teams to the issue and allowing them to focus their attention on finding and removing the malicious code.

Last edited 4 years ago by Peter Draper

Recent Posts

1
0
Would love your thoughts, please comment.x
()
x