Attackers steal credit card details in Vision Direct data breach
Personal information and sensitive credit card details, including CVV codes, taken in five-day attack
Attackers have compromised Vision Direct customers' contact information and financial details, including complete card numbers, expiry dates and the CVV security code.
The UK retailer specialising in contact lenses told a number of its customers this weekend that their details had been stolen in a data breach that lasted five days, between 3 and 8 November.
The attackers made away with personal information, such as full name, address, phone number, email address, and password, as well as customers' financial details including the CVV security code required to complete online transactions.
"Unfortunately this information could be used to conduct fraudulent transactions," Vision Direct UK said in a letter to customers.
"Vision Direct has taken steps to prevent any further data theft, the website is working normally and we are working with the authorities to investigate how this theft occurred."
Vision Direct did not say how many users may have been affected and did not offer an explanation at this early stage.
The company has asked users to review their bank statements as soon as possible and change their passwords on the website.
Questions also remain over whether the firm had been storing CVV codes against PCI standards, as it is not permitted to keep verification codes after payments are authorised.
But it is unclear whether the CVV codes stolen in this breach were previously stored, or intercepted as customers made transactions.
IT Pro asked the retailer how many users were affected, how exactly the attack occurred, and whether the CVV codes stolen were held or intercepted, but did not get a response at the time of writing.
Although there is no official explanation, security researcher Troy Mursch discovered that the attackers may have stolen the data by running a fake Google Analytics script on the UK website, as well as several domains across Europe.
Perhaps running against the consensus, CEO of web security firm High-Tech Bridge Ilia Kolochenko has branded this incident "much fuss about nothing".
"Allegedly, the breach lasted for five days and impacted only a very limited, statistically negligent, number of customers," he said. We have been seeing much worse data breaches occur on a daily basis.
"Similarly, the supposed method of data theft via a fake Google analytics script presumably inserted by developers' mistake is not novel or otherwise remarkable. Instead it is just one more colourful example of when a human is the weakest link."
"Strange that such a visible hack remained undetected by third parties for five consecutive days however."
The Information Commissioner's Office (ICO) told IT Pro it had not yet received any reports concerning the Vision Direct data breach.
"Organisations must notify the ICO within 72 hours of becoming aware of a personal data breach unless it does not pose a risk to people's rights and freedoms," an ICO spokesperson said.
"If an organisation decides that a breach doesn't need to be reported they should keep their own record of it, and be able to explain why it wasn't reported if necessary.
"All organisations processing personal data should do so safely and securely. If anyone has concerns about how their data has been handled, they can report these concerns to us."
Managing security risk and compliance in a challenging landscape
How key technology partners grow with your organisationDownload now
Evaluate your order-to-cash process
15 recommended metrics to benchmark your O2C operationsDownload now
AI 360: Hold, fold, or double down?
How AI can benefit your businessDownload now
Getting started with Azure Red Hat OpenShift
A developer’s guide to improving application building and deployment capabilitiesDownload now