UK sports fashion chain JD Sports disclosed a data breach that exposed customer data from orders placed between November 2018 and October 2020. The company discovered unauthorized access to a server that contained data related to order placed by 10 million customers.
“JD Sports Fashion Plc (“JD Sports”) has been the target of a cyber incident which resulted in the unauthorised access to a system that contained customer data relating to some online orders placed between November 2018 and October 2020. The affected JD Sports group brands are JD, Size?, Millets, Blacks, Scotts and MilletSport.” reads the notice published by the company. “The affected data is limited. JD Sports does not hold full payment card data and, further, has no reason to believe that account passwords were accessed.”
According to the company, the data breach impacted the JD, Size, Millets, Blacks, Scotts and MilletSport brands.
According to the notice published by the company, the security breach may have exposed online limited information, including full names, delivery and billing addresses, email addresses, phone numbers, order details, and the last four digits of the customers’ payment cards.
According to the company, account passwords were compromised.
The company notified UK authorities and hired external cybersecurity experts to investigate the security incident.
Customers are recommended to be vigilant because they can be targeted in frauds and phishing attacks.
“We want to apologise to those customers who may have been affected by this incident. We are advising them to be vigilant about potential scam e-mails, calls and texts and providing details on how to report these. We are continuing with a full review of our cyber security in partnership with external specialists following this incident. Protecting the data of our customers is an absolute priority for JD.” Neil Greenhalgh, Chief Financial Officer of the company, said.
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, data breach)
A former U.S. NSA employee has been sentenced to nearly 22 years in prison for…
A new malware named Cuttlefish targets enterprise-grade and small office/home office (SOHO) routers to harvest…
A flaw in the R programming language enables the execution of arbitrary code when parsing…
The China-linked threat actors Muddling Meerkat are manipulating DNS to probe networks globally since 2019.…
Finnish hacker was sentenced to more than six years in prison for hacking into an…
The US government’s cybersecurity agency CISA published a series of guidelines to protect critical infrastructure…
This website uses cookies.