Garmin SA Shopping Portal Breach Leads To Payment Data Theft

According to this link, https://www.bleepingcomputer.com/news/security/garmin-sa-shopping-portal-breach-leads-to-theft-of-payment-data/, Garmin Southern Africa (Garmin SA) has disclosed in a series of notifications sent to its customers that payment and sensitive personal information were stolen from orders placed on the shop.garmin.co.za shopping portal.

“We recently discovered theft of customer data from orders placed through shop.garmin.co.za (operated by Garmin South Africa) that compromised your personal data related to an order that you placed through the website,” said Jennifer Van Niekerk, South Africa Managing Director. The compromised data was limited to only Garmin’s South Africa site, and contained payment information, including the number, expiration date and CVV code for your payment card, along with your first and last name, physical address, phone number and email address.”

While the cause of the breach is not mentioned in the notification email to the impacted Garmin SA customers, there are signs that the shop.garmin.co.za portal was the victim of a Magecart group.


EXPERTS COMMENTS
Peter Draper, Technical Director, EMEA,  Gurucul
September 16, 2019
One of the key elements of this attack is that the bad actors need to send the data to their own servers to actually collect the information.
A number of companies have been caught by Magecart recently, British Airways and Ticketmaster to name but two. Companies taking payments through their website need to limit access for scripts in their websites to offer the best protection for user data being entered. One of the key elements of this attack is that the bad actors need to send the data to their own servers to actually collect the information. UEBA and Network Analytics can be used to identify abnormal traffic, such as the sudden outbound traffic from the website servers to unknown external devices and in combination with automated security controls can stop the exfiltration of data as soon as it is identified. This reduces the impact and the number of users affected whilst alerting security teams to the issue and allowing them to focus their attention on finding and removing the malicious code.

Join the Conversation

Join the Conversation


In this article