DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

UPS Store discovers malware intrusion; notifies customers at 51 franchise locations

Posted on August 20, 2014 by Dissent

From the uh-oh dept.:

UPS Store, on behalf of 51 franchise center locations writes:

We are writing to notify you of an incident that involves certain of your personal information. The UPS Store, Inc. (“The UPS Store”), among many other U.S. retailers, recently received a government bulletin regarding a broad-based malware intrusion targeting retailers in the United States. The UPS Store discovered malware identified in the bulletin on systems at 51 locations in 24 states (about 1%) of 4,470 franchised center locations throughout the United States. Upon receiving the bulletin, The UPS Store retained an IT security firm and conducted a review of its systems and the systems of its franchised center locations. As part of its response to this incident, The UPS Store has implemented various system enhancements and antivirus updates.

Based on the current assessment of The UPS Store and the IT security firm, we believe that certain personal information you provided in connection with establishing a MailBox Manager account at one of the impacted franchised center locations between January 20, 2014 and August 11, 2014 may have been exposed. For some center locations, the period of exposure to this malware began after January 20, 2014. The malware was eliminated as of August 11, 2014 and no longer presents a threat for customers shopping at The UPS Store locations in the United States. The customer information that may have been exposed in connection with the MailBox Manager accounts includes customers’ names, postal addresses, Social Security numbers and driver’s license numbers. In addition, we believe that your name, postal address, email address and payment card information may have been exposed to the extent you made credit or debit card purchases at the impacted franchised center locations during the same time period. Not all of this information may have been exposed for each customer. Based on the investigation, we think it is appropriate to notify you of the potential for data loss.

You can read the full notification here (pdf). Those affected are being offered free services with AllClear ID.

So it’s a good thing the government sent out a bulletin that UPS Stores personnel read and investigated. If they hadn’t,  this breach would have been even worse.

Category: Business SectorMalwareU.S.

Post navigation

← St. Louis housing complex manager admits stealing identities
When Doctors Have the Right to Speak: Room for Debate →

6 thoughts on “UPS Store discovers malware intrusion; notifies customers at 51 franchise locations”

  1. Amazed Canuck says:
    August 21, 2014 at 3:22 pm

    Hmm, I’m curious about something, and after reading and checking out the links supplied by you (thanks for the info here) and UPS, I couldn’t find an answer… so here’s my question

    Many Canadians use the UPS store to cut down on shipping costs when ordering from the states. They open border town accounts with them (No clue if they have to supply SIN, similar to your SSN), drive over and pick up what they ordered.

    A quick glance shows 7 border states.

    Any Canadians affected by this? If so, were the Canadians notified? If so, why isn’t it mentioned on their website? If so, is their Canadian side credit motoring?

    Just curious…

    1. Dissent says:
      August 21, 2014 at 3:36 pm

      I think there were two types of customers affected – those with Mailbox Manager accounts (which involve SSN) and those who just used their debit/credit cards to pay for services. UPS Store isn’t notifying any customers directly as they don’t have sufficient contact info.

      I’m not sure about whether the offer is good in Canada. I’ll try to find out.

      1. Dissent says:
        August 21, 2014 at 4:10 pm

        Update: UPS Store’s Twitter team responded to my inquiry as to whether Canadian customers were eligible for the AllClear ID offer. They tweeted: “Yes, if they used a payment card at an affected store during relevant dates.”

        So that’s your answer and you can tell fellow Canadians that if their location is on the location list at http://www.theupsstore.com/security/Pages/default.aspx during the relevant dates, they can sign up.

  2. Amazed Canuck says:
    August 21, 2014 at 3:53 pm

    oh, don’t go out of your way. Was just curious about it. Have a couple of Canadian friends who use some sort of NY UPS drop-box where they have parcels (car parts) delivered to. They pick them up State side to save money on surcharges and shipping. I have no clue how the whole thing works really.
    (no clue if they circumvent Custom/Duty charges) 😉

    I guess it must be something like this:
    http://www.ups.com/content/us/en/resources/sri/umc_deliver_to_the_ups_store.html

    Was only curious. The release seems to indicate “shoppers”.

    1. Dissent says:
      August 21, 2014 at 4:14 pm

      Already went out of my way, you bum. 🙂

      1. Amazed Canuck says:
        August 21, 2014 at 5:35 pm

        oh. TY for the reply above, didn’t notice the update.
        Will let them know they should look into it.

        and, TY for going out of your way. I’ll be sure to make you go out of your way more often. :p

        Signed,

        The bum

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • Privilege Under Fire: Protecting Forensic Reports in the Wake of a Data Breach
  • Hacker who breached communications app used by Trump aide stole data from across US government
  • Massachusetts hacker to plead guilty to PowerSchool data breach
  • Cyberattack brings down Kettering Health phone lines, MyChart patient portal access (1)
  • Gujarat ATS arrests 18-year-old for cyberattacks during Operation Sindoor
  • Hackers Nab 15 Years of UK Legal Aid Applicant Data
  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand
  • UK: Post Office to compensate hundreds of data leak victims
  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.