DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

BreyerHorse.com site compromised for 18 months

Posted on October 23, 2014 by Dissent

Reeves International is notifying consumers who made purchases on BreyerHorses.com that their personal information may have been compromised in a breach that went undetected for 18 months.

In a letter to those affected, Arthur Minnocci, CFO, writes:

On September 9, 2014, we learned that unauthorized individuals installed malicious software on the computer server hosting the Breyer Horses website and took certain personal data entered by our customers. After an extensive forensic investigation, it appears that the initial compromise occurred on March 31, 2013 and ended on October 6, 2014. The malicious software and fraudulent use of our website could have compromised the personal information and other information of visitors that made purchases on our website, including name, address, website username and password, payment card account number, card expiration date, and payment card security code. According to our records, you made a payment card purchase at the Breyer Horses website and your information may be at risk.

The total number of customers potentially affected was not disclosed in the notification letter, and they don’t explain how they learned of the software injection. Did they discover it through their own measures or did a customer notify them of fraudulent charges on their card? The notification does not provide the usual “we have no evidence that…” reassurance.

In response to the breach, Reeves International took a number of steps, including hiring a forensic investigator. They report they have “taken measures designed to prevent this from happening again in the future, such as updating the code we use to run the Breyer Horses website.”

There does not appear to be any notification on their web site at the time of this posting.


Related:

  • Au: Qantas hackers gave airline 72-hour deadline
  • BlackSuit ransomware site seized as part of Operation Checkmate
  • Korea imposes 343 million won penalty on HAESUNG DS for data breach of 70,000 shareholders
  • HHS OCR Settles HIPAA Ransomware Investigation with Syracuse ASC for $250k plus corrective action plan
  • Clorox Files $380M Suit Alleging Cognizant Gave Hackers Passwords in Catastrophic 2023 Cyberattack
  • Cyberattacks Paralyze Major Russian Restaurant Chains
Category: Business SectorMalwareU.S.

Post navigation

← Recent updates to HHS's public breach tool
FCC jumps into data security; plans $10 million fine for carriers that breached consumer privacy →

1 thought on “BreyerHorse.com site compromised for 18 months”

  1. Regret says:
    October 24, 2014 at 1:10 am

    Insert something about horses and barn doors here.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • White House ordered to restore Medicaid funding to Planned Parenthood clinics
  • California Attorney General Announces $1.55M CCPA Settlement with Healthline.com
  • Canada’s Bill C-2 Opens the Floodgates to U.S. Surveillance
  • Wiretap Suits Pit Old Privacy Laws Against New AI Technology
  • Action against tiny Scottish charity sparks huge ICO row
  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.