Home page logo

dataloss logo Data Loss mailing list archives

Hackers Infiltrate Opening Ceremony's Online Boutique, Compromise Security
From: security curmudgeon <jericho () attrition org>
Date: Thu, 10 May 2012 11:57:53 -0500 (CDT)

---------- Forwarded message ----------
From: InfoSec News <alerts () infosecnews org>


By Ann Binlot
May 9, 2012

We recently got hold of a piece of mail bearing bad news from the edgy 
boundary-pushing boutique Opening Ceremony stating that "a hacker placed 
malicious software on our website."

The letter -- dated May 4 and signed by Carol Lim, CEO and co-founder of 
the company -- says that the incident in question presumably took place on 
February 16. While the company took security precautions and removed the 
questionable software after the breach was discovered on March 21, it was 
more than enough time for the criminals to extract customers? private 

     "Unfortunately, the hacker may have accessed the names, addresses,
     and credit card information of customers who purchased an item on
     our website during this period," reads part of the letter.

Opening Ceremony is currently working with data breach prevention and 
response specialist ID Experts to field questions and concerns from 
customers who may have been affected. ID Experts can be contacted at 


Dataloss Mailing List (dataloss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://datalossdb.org/mailing_list


Risk Based Security (http://www.riskbasedsecurity.com/)
Risk Based Security equips organizations with security intelligence, risk
management services and on-demand security solutions to establish
customized risk-based programs to address information security and
compliance challenges. 

Tenable Network Security (http://www.tenable.com/)
Tenable Network Security provides a suite of solutions which unify real-time
vulnerability, event and compliance monitoring into a single, role-based, interface
for administrators, auditors and risk managers to evaluate, communicate and
report needed information for effective decision making and systems management.

  By Date           By Thread  

Current thread:
  • Hackers Infiltrate Opening Ceremony's Online Boutique, Compromise Security security curmudgeon (May 15)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]