Attackers steal credit card details in Vision Direct data breach

Personal information and sensitive credit card details, including CVV codes, taken in five-day attack

Attackers have compromised Vision Direct customers' contact information and financial details, including complete card numbers, expiry dates and the CVV security code.

The UK retailer specialising in contact lenses told a number of its customers this weekend that their details had been stolen in a data breach that lasted five days, between 3 and 8 November.

The attackers made away with personal information, such as full name, address, phone number, email address, and password, as well as customers' financial details including the CVV security code required to complete online transactions.

"Unfortunately this information could be used to conduct fraudulent transactions," Vision Direct UK said in a letter to customers.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

"Vision Direct has taken steps to prevent any further data theft, the website is working normally and we are working with the authorities to investigate how this theft occurred."

Vision Direct did not say how many users may have been affected and did not offer an explanation at this early stage.

The company has asked users to review their bank statements as soon as possible and change their passwords on the website.

Questions also remain over whether the firm had been storing CVV codes against PCI standards, as it is not permitted to keep verification codes after payments are authorised.

But it is unclear whether the CVV codes stolen in this breach were previously stored, or intercepted as customers made transactions.

IT Pro asked the retailer how many users were affected, how exactly the attack occurred, and whether the CVV codes stolen were held or intercepted, but did not get a response at the time of writing.

Advertisement - Article continues below

Although there is no official explanation, security researcher Troy Mursch discovered that the attackers may have stolen the data by running a fake Google Analytics script on the UK website, as well as several domains across Europe.

Perhaps running against the consensus, CEO of web security firm High-Tech Bridge Ilia Kolochenko has branded this incident "much fuss about nothing".

"Allegedly, the breach lasted for five days and impacted only a very limited, statistically negligent, number of customers," he said. We have been seeing much worse data breaches occur on a daily basis.

"Similarly, the supposed method of data theft via a fake Google analytics script presumably inserted by developers' mistake is not novel or otherwise remarkable. Instead it is just one more colourful example of when a human is the weakest link."

Advertisement
Advertisement - Article continues below

"Strange that such a visible hack remained undetected by third parties for five consecutive days however."

The Information Commissioner's Office (ICO) told IT Pro it had not yet received any reports concerning the Vision Direct data breach.

Advertisement - Article continues below

"Organisations must notify the ICO within 72 hours of becoming aware of a personal data breach unless it does not pose a risk to people's rights and freedoms," an ICO spokesperson said.

"If an organisation decides that a breach doesn't need to be reported they should keep their own record of it, and be able to explain why it wasn't reported if necessary.

"All organisations processing personal data should do so safely and securely. If anyone has concerns about how their data has been handled, they can report these concerns to us."

Featured Resources

How inkjet can transform your business

Get more out of your business by investing in the right printing technology

Download now

Journey to a modern workplace with Office 365: which tools and when?

A guide to how Office 365 builds a modern workplace

Download now

Modernise and transform your sales organisation

Learn how a modernised sales process can drive your business

Download now

Your guide to managing cloud transformation risk

Realise the benefits. Mitigate the risks

Download now
Advertisement

Recommended

Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/operating-systems/microsoft-windows/354789/microsoft-pulls-disastrous-windows-10-security-update
Microsoft Windows

Microsoft pulls disastrous Windows 10 security update

17 Feb 2020
Visit/mobile/28299/how-to-use-chromecast-without-wi-fi
Mobile

How to use Chromecast without Wi-Fi

5 Feb 2020
Visit/business/business-operations/354790/hp-shareholders-invited-to-come-dine-with-xerox
Business operations

HP shareholders invited to come dine with Xerox

17 Feb 2020
Visit/operating-systems/27717/how-to-fix-a-stuck-windows-10-update
operating systems

How to fix a stuck Windows 10 update

12 Feb 2020