Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

UNZIPPED DATA – LEVI STRAUSS COMPROMISED ACCOUNTS

RHC Dark Lab : 26 June 2024 15:13

The legendary Jeans retailer Levi Strauss & Co. identified a significant data breach that affected over 72,000 customers. The incident was discovered on June 13th, 2024 and it was the result of a credential stuffing attack, where attackers used combination of e-mails and passwords found from third parties sources to gain unauthorized access to victim accounts. The compromised data included names, order history, emails and addresses, exposing potential additional security risks. The breach involved exactly 72.231 unique costumers. Currently, there’s no evidence of the attackers’ presence on the Dark Web. The company’s statement is the only confirmation of the credential stuffing attack.

BREACH DETAILS

In addition to personal data, the breach may have exposed (partial) payment information for costumer who saved their payment methods. This includes the last four digits of the card number, card type and expiration date. Levi Strauss stated that “fraudulent orders do not appear to have been made with the exposed data. Our systems do not authorize the use of saved payment methods without a secondary authentication mechanism”. The investigations have been made by the Office of the Maine Attorney General (OAG) : “13th June we have identified a unusual traffic peak on our website. Our investigation showed characteristic related to credential stuffing attack where bad actors obtained credentials from external sources, using bots to test these credentials on another website, in this case www.levi.com

CREDENTIAL STUFFING

Credential stuffing is a type of brute-force attack where attackers use previously breached credentials from one service to attempt unauthorized access to accounts on a different, unrelated service

Vuoi diventare un Ethical Hacker?
Non perdere i nostri corsi e scrivi subito su WhatsApp al numero
375 593 1011 per richiedere informazioni dicendo che hai trovato il numero sulle pagine di Red Hot Cyber

Supporta RHC attraverso:


Ti piacciono gli articoli di Red Hot Cyber? Non aspettare oltre, iscriviti alla newsletter settimanale per non perdere nessun articolo

Such attacks are not uncommon, many users tends to re-use same credentials on different services. This is why attackers commonly purchase compromised credentials and try them on different websites. The results is tipically a new wave of compromised accounts that can be exploited by bad actors for extortion accounts or reselling into dark web marketplaces. To mitigate this breach, Levi Strauss disabled all credential potentially affected by unauthorized access and subsequently forced the password reset for costumers. Levi Strauss also recommends that costumers choose unique passwords to prevent future credential stuffing attacks.

SECURITY CONSIDERATIONS

Levi Strauss & Co. highlighted the importance of unique complex passwords for each online service account to stop unauthorized access and brute force attacks. Customers were also advised to do the same for their accounts on services unrelated to Levi Strauss. The company also recommended that costumers monitor their bank accounts for unusual activities and consult the Federal Trade Commission’s Guide on passwords policies.

CONCLUSION

Levi Strauss & Co. outlined its commitment to data and privacy protection for its customers. The management team receives regular updates about privacy and data protection, all employees are required to complete mandatory security training on an annual basis. Despite all the measures in play, this breach underscores the ongoing challenges companies face in protecting data from increasingly sophisticated security threats. This recent data breach serves as a stark reminder of the digital vulnerabilities and the critical needs for robust security solutions to safeguard systems from unauthorized access.

RHC Dark Lab
RHC Dark Lab is a group of experts from the Red Hot Cyber community dedicated to Cyber Threat Intelligence led by Pietro Melillo. Participating in the collective, Sandro Sana, Alessio Stefan, Raffaela Crisci, Vincenzo Di Lello, Edoardo Faccioli. Their mission is to spread knowledge about cyber threats to improve the country's awareness and digital defences, involving not only specialists in the field but also ordinary people. The aim is to disseminate Cyber Threat Intelligence concepts to anticipate threats.