Shopify employees accessed customer databases without authorization
175 points| synunlimited | 5 years ago
Shopify, the company whose software runs the Fangamer store (and more than a million others online), has informed us that an internal security event it has been investigating since late last year included Fangamer customer data. Information regarding customer financial accounts and payment cards was not affected, but we are writing to make you aware of the situation.
According to Shopify, certain members of its support team used their Shopify credentials to obtain archived customer data from several hundred stores without authorization. The team members accessed data associated with order fulfillment — names, addresses, email addresses, cart contents, and phone numbers — but did not access or acquire any financial-account or payment-card information.
We are extremely frustrated and sorry to be sending you this email; Fangamer's internal development team takes data security extremely seriously. Data not in Fangamer's Shopify store — including Kickstarter backer information, account information and passwords, and email addresses used to sign up for our newsletter — was not accessed, and the store continues to operate as normal. Fangamer Japan, which operates as a separate store, was also not affected.
Shopify has terminated the employees who did this and eliminated the vulnerabilities that made it possible. Shopify has also reported that it will be providing any other relevant information to us as its investigation continues, and we'll pass along any new material details. If you have any questions, though, please contact us at orders@fangamer.com.
Thank you, Fangamer
wyxuan|5 years ago
In any case I'm wondering - how did Shopify discover this intrusion? Do they check logs regularly? Did they receive a tip off?
twunde|5 years ago
dgudkov|5 years ago
I'm pretty sure that at exactly this moment somewhere someone criminal is already analyzing organization structures, employee profiles, internal security policies and tools of the cloud giants.
Dracophoenix|5 years ago
sep_field|5 years ago
Facebook warn you when you are hired not to actually do this, because they have auditing systems to watch for it and you will be fired (supposedly) but for people employed by some other agency specifically for the purpose of getting high-value private data out of Facebook, being fired by Facebook for doing so is part of the expected outcome and no big deal.
A well funded agency could easily keep getting people hired at Facebook to get whatever data they want, as often as they want. Facebook is constantly trying to keep their hiring pipelines full and despite the image Facebook likes to portray, it isn't "only the best talent" that gets a job there. There are some very smart, capable people at Facebook, but there are a ton of very mediocre engineers that lucked out in the hiring process, as well. It's really just a numbers game to get in.
I'm sure much the same is true at Google/Twitter/etc.
manbackharry|5 years ago
https://www.cbc.ca/news/business/shopify-data-breach-1.57351...
tantalor|5 years ago
So what then? Did they deceive or coerce somebody?
imhoguy|5 years ago
motohagiography|5 years ago
Someone should tell reddit/google/facebook/amazon as that will blow things up pretty badly.
Wait until they are subject to normal privacy regulations that require the companies to list the names of people who have accessed their user data.
sitkack|5 years ago
But it doesn't stop the government from bulk copying "business data" via powers granted by the Patriot Act.
twunde|5 years ago
thebrain|5 years ago
spoonjim|5 years ago
jasfi|5 years ago
jpalomaki|5 years ago
For troubleshooting purposes create debugging tools. Log and check their usage. When things mature, you can even require multiple admins to work together for certain actions.
Minimize human access to production envs. Automate deployments. When access is needed, use jump servers and block file transfers (or force them to go through channel that is audited).
Do review logs and alerts on regular basis. Put effort to minimize false alerts and excessive logging. Quite when reviewing logs you just notice things that “don’t look right”.
Nothing is 100% secure, but also people with bad intensions don’t always have unlimited skills/energy/time.
Intermernet|5 years ago
It's not perfect, but it adds another layer to prove malicious intent.
mytailorisrich|5 years ago
Then, there should be an audit trail of all accesses and this should be known to employees. First that dissuades employees from acting improperly, second that allows the company to verify that they indeed do not act improperly and to track down culprits if something happens.
notadev|5 years ago
thinkingkong|5 years ago
natmaka|5 years ago
If he is a spy/robber, if he is corruptible or threatened... a third party will obtain this copy. For the main culprit this doesn't induce any risk (where is the evidence?). This is absolutely not as with your bank, for example, which cannot really steal money without you taking notice.
How serious people are willing to store confidential data on any rented or hosted server is completely beyond me. Then some of their competitors' proposals are "just a little bit" better than theirs', or seem to have a pretty good grasp on some R&D or customer database.
Many here work on some cloud thing, most are honest and some will be upset by my comment. This is not about you but about rotten fruits in the basket.
tantalor|5 years ago
The "oh shit" scenario is when the stolen data is used against to commit crimes against customers, e.g., identity theft, stalking, you name it.
krthkv|5 years ago
bg24|5 years ago
unknown|5 years ago
[deleted]
xtiansimon|5 years ago
antihacker_team|5 years ago
[deleted]