Connect with us

Technology

Data breach exposes over 56 million clothing store customers

Published

on

Data breach exposes over 56 million clothing store customers

A cybersecurity vendor claimed last month that a hacker stole data from the fashion retailer Hot Topic, including the personal information of millions of customers. At that time, there was no confirmation from the retailer itself. However, a breach notification site has now confirmed that the personal data of 56,904,909 users was found online and leaked from customers of Hot Topic, Torrid and Box Lunch.

This data includes email addresses, physical addresses, phone numbers, purchase history, gender and dates of birth. Partial credit card data was also included in the breach.

I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS
Enter by signing up for my free newsletter.

Image of a person shopping (Kurt “CyberGuy” Knutsson)

What you need to know

The breach notification service Have I Been Pwned (HIBP) announced this week that it alerted 56 million Hot Topic customers about a data breach compromising their personal information. While Hot Topic, which operates more than 640 stores across the U.S., has yet to confirm the breach, HIBP reported that it occurred on Oct. 19. Just two days later, a threat actor using the alias “Satanic” claimed responsibility.

Advertisement

Satanic alleges that the database contains details of 350 million users, though that number seems inflated. The leaked data does, however, include names, email addresses, physical addresses and dates of birth; all information collected through Hot Topic’s loyalty program. The hacker is offering the database for $20,000 and demanding that Hot Topic pay $100,000 to prevent its sale.

Hudson Rock, an Israeli cybersecurity firm, initially reported the breach and considers it credible. The firm traced the issue back to a malware infection on an employee’s computer at Robling, a third-party retail analytics firm. Hudson Rock, which operates the cyber intelligence platform Cavalier to monitor compromised devices, discovered the infection and flagged it for clients. 

It’s likely that the threat actor used credentials stolen by info stealer malware to gain access to an analytics platform used by Hot Topic, potentially allowing them to infiltrate the retailer’s cloud environments.

Data breach exposes over 56 million clothing store customers

Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

WINDOWS FLAW LETS HACKERS SNEAK INTO YOUR PC OVER WI-FI

Hot Topic’s silence after the breach is suspicious

Evidence of a data breach at Hot Topic keeps piling up, but the company hasn’t said a word yet. Customers and state attorneys general haven’t been notified, either. Hot Topic’s silence could mean a few things, especially with such a big breach. They might still be investigating, working with cybersecurity experts to confirm what happened and figure out the extent of the damage. Sometimes, companies stay quiet, hoping to delay or dodge bad press. But this strategy can backfire, leading to more scrutiny and skepticism.

Advertisement

We reached out to Hot Topic to request a comment on our story but did not hear back before our deadline.

Data breach exposes over 56 million clothing store customers

Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

CYBER SCAMMERS USE AI TO MANIPULATE GOOGLE SEARCH RESULTS

5 ways you can stay safe in the event of a data breach

1) Keep a strong password: With the Hot Topic data breach exposing sensitive information, it’s essential to update your passwords. Use a strong, unique password for each account, especially for services where your personal details are stored. A mix of letters, numbers and symbols will make it harder for hackers to guess. Consider using a password manager to keep everything secure and easily accessible.

2) Beware of suspicious links: After a breach, phishing attempts increase, and hackers may use your leaked email to send fake links or emails. Never click on suspicious links, especially those that ask for personal information. Always double-check the sender’s email and look out for strange language or urgent requests. If in doubt, go directly to the website instead of following the links in the message.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Advertisement

3) Invest in a data removal service: Since your personal information could be floating around on the dark web or public databases, it’s a good idea to invest in a data removal service. Check out my top picks for data removal services here.

4) Watch out for the risk of identity theft: The leaked data includes sensitive details like addresses, birthdays and purchase histories, which could be used for identity theft. Be extra cautious when sharing personal information moving forward, and if you notice anything unusual, report it immediately. If you are a Hot Topic customer, you might also want to consider an identity theft monitoring service. See my tips and best picks on how to protect yourself from identity theft.

5) Monitor your accounts regularly: Keep an eye on your bank accounts, credit card statements and even loyalty programs where your information is stored. Set up alerts for transactions and logins so you can act fast if anything seems off. Regular monitoring can help you catch fraudulent activity early, minimizing the damage if your data is misused.

DON’T LET SNOOPS NEARBY LISTEN TO YOUR VOICEMAIL WITH THIS QUICK TIP

Kurt’s key takeaway

The Hot Topic data breach is alarming, especially since it affects over 56 million people. What makes the situation even more concerning is that Hot Topic has stayed silent about it. The company hasn’t notified those affected, leaving many unprepared for potential cybersecurity threats. Hackers could use this gap to target victims with scams, leading to financial losses. This situation is a strong reminder of the importance of maintaining good cybersecurity hygiene, whether you’re impacted by a breach or not.

Advertisement

Should companies be forced to compensate customers whose data has been exposed instead of just staying silent? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Advertisement

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Google to court: we’ll change our Apple deal, but please let us keep Chrome

Published

on

Google to court: we’ll change our Apple deal, but please let us keep Chrome

A court found Google liable for unlawfully monopolizing online search, and its remedies are supposed to reset the market, letting rivals fairly compete. Google (obviously) disagrees that it’s running a monopoly, but before it can appeal that underlying conclusion, it’s trying to limit the fallout if it loses.

Google’s justification is that search deals were at the heart of the case, so they’re what a court should target. Under the proposal, Google couldn’t enter deals with Android phone manufacturers that require adding mobile search in exchange for access to other Google apps. It couldn’t require phone makers to exclude rival search engines or third-party browsers. Browser companies like Mozilla would be given more flexibility in setting rival search engines as defaults.

Perhaps the biggest concession is that this agreement would specifically end Google’s long-running multibillion-dollar search deal with Apple. It would bar Google from entering agreements that make Google Search the default engine on any “proprietary Apple feature or functionality, including Siri and Spotlight” in the US — unless the deal lets Apple choose a different default search engine on its browser annually and “expressly permits” it to promote other search engines.

And in a nod to some DOJ concerns about Google locking out rival AI-powered search tools and chatbots, Google proposes it should be disallowed from requiring phone makers to add its Gemini Assistant mobile app in order to access other Google offerings.

The government has proposed ten years of restrictions, but Google’s counterproposal is only three — it argues nothing more is necessary because “the pace of innovation in search has been extraordinary” and regulating a “fast-changing industry” like search would slow innovation.

Advertisement

If the court accepts Google’s streamlined proposal over the DOJ’s, the company could lose out on some lucrative or strategically advantageous deals, but its business would remain intact. It wouldn’t have to spin out its Chrome browser or have the threat of an Android divestment order hanging over it. And it wouldn’t need to share many of the underlying signals that help it figure out how to serve useful search results, so that rivals could catch up and serve as a true competitive pressure, as the DOJ hopes.

Both Google and the DOJ’s proposals are essentially starting points from which the judge can work. But Google is betting it could have an easier time selling a simple proposal that addresses a major, specific problem raised in the trial. It’s positioning the government’s proposals as extreme and reaching beyond the scope of the judge’s earlier decision, perhaps — Google will likely tell the court — even in a way that could get overturned on appeal.

This hasn’t been received well by at least one of Google’s rivals, the search engine company DuckDuckGo. “Google’s proposal attempts to maintain the status quo and change as little as possible,” spokesperson Kamyl Bazbaz said in a statement. Both sides will argue their case in a federal court in Washington, DC beginning on April 22.

Continue Reading

Technology

More than 910,000 patients at risk after ConnectOnCall health data breach

Published

on

More than 910,000 patients at risk after ConnectOnCall health data breach

Data breaches are becoming an alarming trend, and health care incidents stand out for their potentially lifelong consequences. I just reported how a data breach at a physician-led vein center exposed almost half a million people’s data to hackers. And now, another health care data breach has come to light and this one affects even more people. The data breach exposes sensitive personal and medical information belonging to over 910,000 patients through ConnectOnCall, a telehealth platform and after-hours call service owned by Phreesia.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

A medical professional working on a laptop (Kurt “CyberGuy” Knutsson)

What you need to know

Health care software provider Phreesia has revealed that its ConnectOnCall service was hit by a data breach that lasted from Feb. 16 to May 12, 2024. During this time, an unknown hacker gained access to the platform and pulled data from provider-patient communications. ConnectOnCall helps health care providers handle after-hours communication and automate patient call tracking.

Phreesia, which bought ConnectOnCall in October 2023, discovered the breach on May 12 and says it jumped into action right away. The company brought in external cybersecurity pros to lock down the platform and reported the breach to federal law enforcement.

Advertisement

“On May 12, 2024, ConnectOnCall learned of an issue impacting ConnectOnCall and immediately began an investigation and took steps to secure the product and ensure the overall security of its environment,” the company revealed in a press release.

According to a report filed with the U.S. Department of Health and Human Services, the breach impacted 914,138 patients (via Bleeping Computer). The stolen data includes names, phone numbers, medical record numbers, dates of birth and details about health conditions, treatments or prescriptions. In a few cases, Social Security numbers were also compromised.

Phreesia claims its other services, like the patient intake platform, were not affected. The company has since taken ConnectOnCall offline and is working on bringing it back in a more secure setup.

We reached out to ConnectOnCall for a comment but did not hear back by our deadline.

More than 910,000 patients at risk after ConnectOnCall health data breach

Emergency room sign (Kurt “CyberGuy” Knutsson)

UNDERSTANDING BRUSHING SCAMS AND HOW TO PROTECT YOURSELF

Advertisement

The risks associated with the ConnectOnCall data breach

The impact of this breach is significant due to the sensitive nature of health care data. Unlike financial breaches, where compromised accounts can be frozen or replaced, health information is permanent and highly sought after on the dark web. Cybercriminals may exploit this data to commit identity theft, including obtaining prescription drugs fraudulently or filing false insurance claims.

Plus, the detailed health information exposed – such as diagnoses, treatments and medications – can be used for targeted phishing attacks. Scammers could exploit victims’ medical histories to create highly convincing schemes, increasing the likelihood of success.

Phreesia has mailed notification letters to all affected individuals for whom health care providers had valid mailing addresses as of Dec. 11, 2024. For those whose Social Security numbers were exposed, the company is offering identity and credit monitoring services.

More than 910,000 patients at risk after ConnectOnCall health data breach

A doctor writing notes (Kurt “CyberGuy” Knutsson)

CYBER SCAMMERS USE AI TO MANIPULATE GOOGLE SEARCH RESULTS

7 ways to keep yourself safe from such data breaches

1) Regularly monitor your financial and medical accounts: Periodically review your medical records and health insurance statements for any unusual or unauthorized activity. This can help you quickly identify and address any discrepancies or fraudulent activities.

Advertisement

Use patient portals provided by health care providers to access your medical records online. These portals often have features that allow you to track your medical history and appointments. 

2) Use strong passwords and two-factor authentication (2FA): Create strong, unique passwords for your online accounts, including health care portals. Avoid using easily guessable information like birthdays or common words. Consider using a password manager to generate and store complex passwords.

3) Enable two-factor authentication wherever possible: 2FA adds an extra layer of security by requiring a second form of verification, such as a text message code or authentication app, in addition to your password.

4) Don’t fall for phishing scams; use strong antivirus software: Be mindful of the information you share online and with whom you share it. Avoid providing sensitive personal information, such as Social Security numbers or medical details, unless absolutely necessary. Verify the legitimacy of any requests for personal information. Scammers often pose as health care providers or insurance companies to trick you into revealing sensitive data by asking you to click on links in emails or messages.  

The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Advertisement

5) Use identity theft protection services: Consider enrolling in identity theft protection services that monitor your personal information and alert you to potential threats. These services can help you detect and respond to identity theft more quickly. Some identity theft protection services also offer insurance and assistance with recovering from identity theft, providing additional peace of mind. See my tips and best picks on how to protect yourself from identity theft.

6) Freeze your credit: A credit freeze prevents anyone from opening new credit accounts in your name without your authorization, reducing the risk of identity theft. Contact the major credit bureaus (Experian, Equifax and TransUnion) to request a credit freeze. This is often free and can be temporarily lifted when you need to apply for credit.

 7) Remove your personal data from the internet: After being part of a data breach, it’s crucial to minimize your online presence to reduce the risk of future scams. Consider using a personal data removal service that can help you delete your information from various websites and data brokers. This can greatly diminish the chances of your data being used maliciously. Check out my top picks for data removal services here.

DON’T LET SNOOPS NEARBY LISTEN TO YOUR VOICEMAIL WITH THIS QUICK TIP

Kurt’s key takeaway

The ConnectOnCall health data breach highlights the critical need for robust cybersecurity measures within the health care sector, where the stakes are often much higher than in other industries. With over 910,000 patients affected, this incident shows the serious risks posed by cyberattacks on health care platforms. Sensitive data like medical records and Social Security numbers are permanent and can be misused for identity theft and fraud. If you were impacted, stay vigilant by monitoring your accounts, enabling fraud alerts and considering identity theft protection services. 

Advertisement

Do you think health care providers should face stricter regulations for protecting sensitive patient information? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

Advertisement

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

X raises Premium Plus subscription pricing by almost 40 percent

Published

on

X raises Premium Plus subscription pricing by almost 40 percent

X has substantially raised the price of its top-tier user subscription in multiple regions to help bolster the platform’s creator payouts. The increase for Premium Plus came into effect on December 21st according to X, raising prices in the US from $16 per month to $22, or from $168 to $229 for annual subscriptions.

Many European countries like France, Germany, and Spain are impacted by a similar increase, taking monthly prices from €16 to €21. Monthly subscribers in Canada (currently paying $20), Australia ($26) and the UK (£16) will also see pricing increased to $26, $35, and £17 respectively. The higher pricing is immediately applicable to new subscribers, with existing users grandfathered into their current rates until January 20th. X’s basic subscription tier remains unaffected.

The pricing changes for US subscribers are the highest increase introduced since Elon Musk purchased the social media platform in 2022. X gave several reasons to justify the price hike, citing that Premium Plus is now completely ad-free — which it described as a “significant enhancement” to the current user experience.

X also references changes made to the X revenue sharing program in October, saying that subscriptions “now more directly fuels” creator payouts to “reward content quality and engagement rather than ad views alone.” Premium Plus subscribers will additionally receive priority user support, access to additional features like X’s Radar trend monitoring tool, and higher limits on the platform’s Grok AI models.

Continue Reading
Advertisement

Trending