'Fraudster' posts confidential eBay member info on forum
Data dump leads to shutdown of (ironically) a security-issues discussion list
IDG News Service - Someone used an eBay Inc. discussion forum on Tuesday to post confidential information about eBay users along with what may be their credit card numbers.
The incident, which was first reported by AuctionBytes.com, a technology news site that focuses on e-commerce, led the e-commerce giant to shut down the forum, which ironically is devoted to the discussion of security issues.
Nichola Sharpe, an eBay spokeswoman, confirmed that on Tuesday morning someone the vendor describes as "a malicious fraudster" posted the names and contact information of 1,200 eBay members on the company's Trust & Safety discussion forum.
"This information could have been obtained as part of an account takeover. Since this time, our Trust and Safety team has been proactively addressing this situation," she said via e-mail.
Along with members' information, the "fraudster" also posted what appear to be credit card numbers. However, if that's what they are, they don't match the ones eBay has on file for the members whose contact information was disclosed, Sharpe said.
"We are in the process of proactively contacting members by phone, so that if the information is valid somehow -- regardless how this fraudster acquired the information -- these members can take the steps they need to take to protect themselves," Sharpe said.
The "fraudster" didn't obtain the information by breaching eBay's security systems, so eBay thinks the culprit stole the information via methods such as phishing, she said.
The company has given additional information in an official blog post.
The incident, which eBay continues to monitor, has been broadly reported and commented on by eBay users on this long thread.
In its article, AuctionBytes reported being able to access the forum and view several posts before they were removed.
The posts included fields labeled "Id verified" and "Store" along with a time-date stamp of the user registration, AuctionBytes reported, adding that it hasn't been able to verify the accuracy of the information viewed.
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- Cybersecurity Imperatives: Reinvent your Network Security The Rise of CyberSecurity
- Surescripts Case Study- Securing Keys and Certificates Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its...
- Ponemon 2014 SSH Security Vulnerability Report According to research by the Ponemon Institute, 3 out of 4 enterprises have no security controls in place for SSH which leaves organizations...
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities.
- Deep Dive into Advanced Networking and Security with Hybrid Cloud Security and networking are among the top concerns when moving workloads to the cloud. VMware vCloud® Hybrid Service™ enables you to extend your... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!