Bad news for the customers of the MyDeal online marketplace, the Australian retail giant Woolworths disclosed a data breach that impacted approximately 2.2 million of them.
As soon the company became aware of the security breach it blocked access to all affected systems.
In September 2020, 80% of MyDeal were acquired by Woolworths, anyway Woolworths was not impacted by the security breach.
The attackers gained access to the MyDeal customer relationship management (CRM) system by exploiting a user’s compromised credentials.
Compromised customer data include name, email address, phone number, delivery address and, for some individuals, the date of birth. Payment, drivers licence, or passport details were accessed because MyDeal does not store this information. Also, no customer account passwords were accessed.
The company has alrready contacted all the impacted customers.
“MyDeal does not store payment, drivers licence or passport details and no customer account passwords or payment details have been compromised in this breach. The customer data was accessed within the MyDeal CRM system and the Mydeal.com.au website and app have not been impacted,” reads the data breach notification published by the company.
The company also notified the local authorities.
Follow me on Twitter: @securityaffairs and Facebook
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, Woolworths)
[adrotate banner=”5″]
[adrotate banner=”13″]
Sophos warns that a DragonForce ransomware operator chained three vulnerabilities in SimpleHelp to target a…
A new Russia-linked APT group, tracked as Laundry Bear, has been linked to a Dutch…
Nova Scotia Power confirms it was hit by a ransomware attack but hasn't paid the…
Cetus Protocol reported a $223 million crypto theft and is offering to drop legal action…
SafePay ransomware hit Marlboro-Chesterfield Pathology, stealing personal data of 235,000 people in a major breach.…
China-linked APT exploit Ivanti EPMM flaws to target critical sectors across Europe, North America, and…
This website uses cookies.