Packers Pro Shop Data Breach Exposes Thousands of Fans’ Credit Card Information

Summary

Over 8,500 Green Bay Packers fans who purchased merchandise from the team’s online Pro Shop between September 23 and October 23, 2024, had their personal and financial information compromised in a data breach. Hackers inserted malicious code into the website, allowing them to steal names, addresses, email addresses, and credit card details. The Packers have notified affected customers and are offering three years of complimentary credit monitoring and identity theft protection.

Protect your data without breaking the bankTrueNAS combines award-winning quality with cost efficiency.

Main Story

So, here’s the deal: the Green Bay Packers, yeah, the football team, just announced a pretty significant data breach that hit their online Pro Shop. It’s a bummer, I know. Over 8,500 customers had their info compromised between September and October of last year. I mean, who would have thought a football team’s website would be a target, right?

Apparently, some sneaky hackers managed to insert malicious code onto the site’s checkout page. This code was basically a digital payment card skimmer. Can you believe it? It grabbed names, addresses, emails, and credit card info – the whole shebang: card numbers, expiration dates, even those pesky CVV numbers. It’s like, what else do they need?! Anyway, that happened between September 23rd and October 23rd.

When they found out – and they found out on October 23rd, thankfully – the Packers acted fast, shutting down the payment and checkout functions immediately. Good for them! They brought in outside cybersecurity folks and their website vendor to figure out what happened, exactly. The investigation wrapped up on December 20th, confirming that, yes, they had a big problem and showing just how much data had been affected. Talk about a pre-Christmas headache.

Now, here’s a bit of good news. Not everyone was hit. If you used a gift card, your Pro Shop account, PayPal, or Amazon Pay to make your purchase, your information is safe. That’s some small comfort, at least.

The Packers took immediate steps to clean up the mess, of course. They removed the bad code, changed all the passwords, and made sure their website hosting company fixed any security holes. Plus, they’re working on even better ways to prevent this kind of thing from happening again.

It turns out a Dutch security company, Sansec, is the one who first identified the problem and alerted the Packers. That’s good detective work. These guys figured out that the hackers used a trick with JSONP callback and YouTube’s oEmbed feature to get around the site’s security. They snuck in a script that harvested data from input fields. Clever, but so not cool.

The Packers, to their credit, are notifying all the affected people by mail. You’d get a letter if your data was compromised, and they’re also offering three years of free credit monitoring and identity theft protection. It’s an extra measure to help those that were affected stay secure.

Also, this was just their Pro Shop site that was impacted; no other systems, thank goodness. They’re also working with law enforcement and they seem very serious about protecting fan’s info.

This whole ordeal highlights the sad reality of how common online data breaches are today. For instance, just a couple of months ago, my favorite indie coffee shop’s website got hacked – it wasn’t fun. E-commerce places really need to beef up their security. You have to be careful out there. Even the Packers aren’t immune, you know? This is a good reminder to be cautious when you’re making online purchases and to keep an eye on your bank and credit card accounts. Report anything weird immediately!

And speaking of being cautious, you might also consider using payment methods like PayPal and Amazon Pay. Since you’re not directly entering your credit card on websites they provide an extra layer of security. As cyber threats continue to get more sophisticated, both businesses and us, as consumers, need to stay vigilant. It’s really a shared responsibility to protect ourselves out here in the wild west of the internet. And honestly? It’s a wild west out there!

9 Comments

  1. “Digital payment card skimmer,” eh? Sounds like the Packers’ website needs a better offensive line against those malicious code blitzes. Maybe they should draft some cybersecurity experts next season?

    • Haha, I love the analogy! It’s definitely a game of cat and mouse out there, and having a strong cybersecurity “offensive line” is key. Maybe they should start scouting for talent at DEF CON!

      Editor: StorageTech.News

      Thank you to our Sponsor Esdebe – https://esdebe.com

  2. “Acting fast” by shutting down payment functions after a month-long breach hardly inspires confidence. The lack of robust security measures and reliance on third-party discovery reflects poorly on their internal IT protocols and priorities.

    • That’s a really valid point about the timing. A month-long breach does raise questions, and it definitely highlights the importance of proactive security measures. It seems relying on third-party discovery indicates an area for improvement in their internal monitoring systems.

      Editor: StorageTech.News

      Thank you to our Sponsor Esdebe – https://esdebe.com

  3. The breach highlights the sophistication of modern cyberattacks, particularly the use of techniques such as JSONP callback and oEmbed exploitation to circumvent security measures, requiring continual adaptation of defense strategies.

    • Absolutely, it’s fascinating how these attack methods like JSONP callback and oEmbed are used to bypass security. It really underscores the need for constantly updated and adaptive security protocols. It’s a reminder that staying one step ahead is a moving target.

      Editor: StorageTech.News

      Thank you to our Sponsor Esdebe – https://esdebe.com

  4. The use of JSONP callback and oEmbed to bypass security highlights the need for more robust input validation and content security policies on websites, particularly those handling sensitive data.

    • That’s a crucial point about input validation and content security policies. The sophisticated methods, like JSONP callback and oEmbed, really show how vital it is for websites to implement layered security measures. These types of attacks are unfortunately becoming more common and need constant attention.

      Editor: StorageTech.News

      Thank you to our Sponsor Esdebe – https://esdebe.com

  5. The breach, discovered by a third-party, indicates a significant failure in internal security protocols. Relying on external sources to identify such a prolonged incident suggests a critical lack of vigilance.

Comments are closed.