CafePress faces $500,000 fine for data breach cover up
Credit to Author: Pieter Arntz| Date: Wed, 16 Mar 2022 14:57:42 +0000
The US Federal Trade Commission (FTC) has announced that it took action against online customized merchandise platform CafePress over allegations that it failed to secure consumers’ sensitive personal data and covered up a major breach.
CafePress is a popular online custom T-shirt and merchandise retailer. According to Samuel Levine, Director of the FTC’s Bureau of Consumer Protection:
“CafePress employed careless security practices and concealed multiple breaches from consumers.”
CafePress waited seven months to publicly disclose a 2019 breach, and only did so after it had been reported in the news.
The FTC complaint also takes issue with the way CafePress handled customer information, saying that CafePress “misled users by using consumer email addresses for marketing despite its promises that such information would only be used to fulfill orders consumers had placed.” This is considered an unfair and deceptive practice under Section 5 of the FTC Act.
The breach
In February 2019, a threat actor was able to access millions of email addresses and passwords. According to the complaint by the FTC this was made possible because CafePress failed to implement reasonable security measures to protect the sensitive information of buyers and sellers stored on its network.
Leaked email addresses and passwords are a serious problem because many people re-use their passwords across multiple websites and services. Cybercriminals know this and will try stolen usernames and passwords in as many different places as they can—a practice known as credential stuffing.
The threat actor also captured millions of unencrypted names, physical addresses, and security questions and answers. As well as over 180,000 unencrypted Social Security Numbers (SSNs), along with tens of thousands of partial payment card numbers (last 4 digits) and expiration dates. A treasure trove for social engineers.
Informing customers
Despite warnings from several sides, including a foreign government, CafePress decided not to inform its customers, but instead only told customers to reset their passwords as part of an update to its password policy. CafePress apparently patched the vulnerability the cybercriminals made use of, but failed to properly investigate the breach for several months despite additional warnings.
It wasn’t until the breach had been reported in the press that CafePress informed its customers. It was HaveIBeenPwnd (HIBP) that got the ball rolling. Users first became aware of the breach a few weeks later, on August 5, through notifications from Troy Hunt’s HIBP service.
Lax security
In the complaint the FTC mentions several cases of bad security practices, before and after the breach. According to the FTC, CafePress…
- Failed to investigate the source of several malware infections that occurred on its network prior to the 2019 attack.
- Failed to implement reasonable security measures to protect the sensitive information of buyers and sellers.
- Stored SSNs and password reset answers in clear text, alongside millions of unencrypted names and physical addresses.
- Retained customers’ data longer than was necessary.
- Failed to apply readily available protections against well-known threats and to adequately respond to security incidents.
- Continued to allow people to reset their passwords by answering security questions known to the attackers.
As a result of its lax security practices, it should not come as a surprise that CafePress’ network was breached multiple times.
Proposed settlement
As part of the proposed settlement, Residual Pumpkin and PlanetArt (the previous and current owners of CafePress) will be required to implement comprehensive information security programs that will address the problems that led to the data breaches at CafePress. This includes replacing inadequate authentication measures—such as security questions—with multi-factor authentication methods, minimizing the amount of data it collects and retains, and encrypting SSNs.
PlanetArt will be required to notify consumers whose personal information was accessed as a result of CafePress’s data breaches and provide specific information about how consumers can protect themselves. Both companies will be required to have a third-party assess their information security programs and provide the Commission with a redacted copy of that assessment suitable for public disclosure.
In addition, Residual Pumpkin will have to make a $500,000 payment to data breach victims, the FTC said in the statement. CafePress has already settled with seven US states as a result of this data breach.
Reusing passwords
We have warned users often against reusing passwords across different services. This case is a prime example that shows why this is important. Users were left in the dark about their compromised passwords for several months. This gave the criminals behind the breach plenty of time to perform credential stuffing attacks on other services.
Since shopping services usually store credit card details and people’s home addresses alongside login credentials, there is no reason to treat these accounts as if they have a lower security priority. On the contrary, it could turn out to be a costly mistake. Use a password manager to make it easier to create and use strong, unique passwords for each service you use.
Lessons for web shops
What can web shops do to avoid becoming the next CafePress?
- In the long run, the chance you can keep a breach secret is slim to none.
- Deploy strong policies and controls and inform the public about them on your website.
- Disclose breaches to your customers early, with as much detail as you can. This will reduce the damage to them, and to your brand, and reduce the chance of being fined.
- Utilize best practices such as strong password hashing and rate limiting password attempts.
- Encourage customers to use Multi-factor Authentication (MFA).
Keep your customers safe and happy and they will come back.
Stay safe, everyone!
The post CafePress faces $500,000 fine for data breach cover up appeared first on Malwarebytes Labs.