DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Outed by judge, Wet Seal reveals 2008 breach

Posted on March 30, 2010 by Dissent

After being outed by a Massachusetts judge who felt that the retailer should have disclosed the incident in 2008, Wet Seal subsequently issued a statement acknowledging that they had a security breach that involved the hacking ring led by Albert Gonzalez.

According to Wet Seal’s statement:

In May 2008, we became aware that a criminal group obtained unauthorized access to our information systems in an attempt to steal credit and debit card data of our customers. Through an investigation led by an independent, third-party computer forensics firm, and corroborated by members of the U.S. Secret Service and U.S. Department of Justice who led the government’s prosecution of Mr. Gonzalez, we found no evidence to indicate that any customer credit or debit card data or other personally identifiable information was taken. In working with the major credit card processing agencies, we also have identified no instances of credit card fraud to suggest that any such data was taken.

Not revealed in their statement is whether Wet Seal discovered the breach themselves or were informed by federal investigators. And while the retailer pats itself on the back for responding promptly once they found out, it seems that they simply lucked out, as the indictment of Gonzalez in the New Jersey case indicated that:

In or about January 2008, Company B was the victim of a SQL Injection Attack that resulted in the placement of malware on its network.

In or about January 2008, over an internet messaging service, GONZALEZ sent P.T. a SQL Injection String that was used to penetrate Company B’s computer network (the “Company B SQL String”). The Company B SQL String was programmed to direct data to Hacking Platforms, including the ESTHOST Server and the Ukranian Server.

[…]

On or about April 22, 2008, GONZALEZ modified a file on the Ukranian Server that contained computer log data
stolen from Company B’s computer network.

[…]

Between in or after March 2007 and in or about May 2008, GONZALEZ participated in a discussion over an internet messaging service in which one of the participants stated “core still hasn’t downloaded that [Company B] sh-t.”

From the above, it seems that at any point between January 2008 and May 2008, Gonzalez and his fellow hackers could have downloaded Wet Seal customer data and it is only a matter of Wet Seal’s good fortune that the hackers hadn’t gotten around to it before Wet Seal found out about the breach and secured their server.

Why Wet Seal felt that they were entitled to victim status and that their reputation and privacy should be respected escapes me, as it seems evident that their customers were lucky but still entitled to know that the retailer’s system had been breached. Maybe not entitled by law, but entitled.

Category: Breach IncidentsHack

Post navigation

← Organizations Rarely Report Breaches to Law Enforcement
Court papers confirm JC Penney as hacking victim →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.