Soccer league's online shoppers get kicked by security breach
MLSgear.com site hit by SQL injection attacks; personal data of customers compromised
Computerworld - A series of SQL injection attacks on servers hosted by a third-party service provider has compromised the personal data of an unspecified number of individuals who had shopped on Major League Soccer's MLSgear.com Web site.
The compromised information included names, addresses, credit and debit card data, and MLSgear.com passwords, MLS President Mark Abbott said in a letter sent to affected individuals on Feb. 1. MLSgear.com is the soccer league's official online store.
The incident was first reported by PogoWasRight.org, a blog that tracks data breaches. The blog site also posted a link to a notice that was sent by MLSgear.com to the office of New Hampshire's attorney general, informing the AG of the breach and saying that it affected 169 New Hampshire residents (download PDF).
The notice was signed by Michael Sapherstein, MLS's deputy general counsel. Sapherstein noted that a forensic audit conducted at the behest of Visa and MasterCard showed that the SQL injection attacks appear to have occurred between January and August of last year. The attacks were directed at third-party servers that were hosting the MLS customer data, Sapherstein said.
"We have a zero-tolerance policy when it comes to protection of our customers' personal information and consequently, we are terminating our relationship with that e-commerce provider," Sapherstein wrote. An identical comment was included in Abbott's letter to customers, which was attached to the notice from Sapherstein.
Sapherstein added that MLS had taken further steps to strengthen the "already stringent measures" that were in place for protecting customer data, but he didn't offer any details on what those steps were. He also said that the MLS had contacted the FBI about the breach and that it is working with Visa, MasterCard and Chase Paymentech, which processes its credit card transactions.
MLS officials didn't immediately return a phone call today seeking comment about the security breach.
SQL injection attacks are targeted at the databases that sit behind Web applications. A malicious attacker uses so-called input validation errors to send a malformed SQL query via a Web page to its underlying database, in order to break into the database or alter the information stored in it.
Security analysts expect such attacks to become increasingly common because a large number of Web sites are vulnerable to them. In recognition of that, the major credit card companies in July will begin requiring retailers and other merchants that accept payment cards to either install a firewall in front of all Web-facing applications or submit custom application code to an outside security firm for a vulnerability review.
Those two steps currently are detailed as suggested best practices in Section 6.6 of the Payment Card Industry Data Security Standard (download PDF). But the credit card companies decided last year to make them mandatory.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Cybersecurity for Dummies eBook This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different.... All Cybercrime and Hacking White Papers | Webcasts