'Fraudster' posts confidential eBay member info on forum
Data dump leads to shutdown of (ironically) a security-issues discussion list
IDG News Service - Someone used an eBay Inc. discussion forum on Tuesday to post confidential information about eBay users along with what may be their credit card numbers.
The incident, which was first reported by AuctionBytes.com, a technology news site that focuses on e-commerce, led the e-commerce giant to shut down the forum, which ironically is devoted to the discussion of security issues.
Nichola Sharpe, an eBay spokeswoman, confirmed that on Tuesday morning someone the vendor describes as "a malicious fraudster" posted the names and contact information of 1,200 eBay members on the company's Trust & Safety discussion forum.
"This information could have been obtained as part of an account takeover. Since this time, our Trust and Safety team has been proactively addressing this situation," she said via e-mail.
Along with members' information, the "fraudster" also posted what appear to be credit card numbers. However, if that's what they are, they don't match the ones eBay has on file for the members whose contact information was disclosed, Sharpe said.
"We are in the process of proactively contacting members by phone, so that if the information is valid somehow -- regardless how this fraudster acquired the information -- these members can take the steps they need to take to protect themselves," Sharpe said.
The "fraudster" didn't obtain the information by breaching eBay's security systems, so eBay thinks the culprit stole the information via methods such as phishing, she said.
The company has given additional information in an official blog post.
The incident, which eBay continues to monitor, has been broadly reported and commented on by eBay users on this long thread.
In its article, AuctionBytes reported being able to access the forum and view several posts before they were removed.
The posts included fields labeled "Id verified" and "Store" along with a time-date stamp of the user registration, AuctionBytes reported, adding that it hasn't been able to verify the accuracy of the information viewed.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts