BreachExchange mailing list archives
Target breach notifications are a perfect example of what not to do
From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Fri, 17 Jan 2014 18:05:01 -0700
http://www.pcworld.com/article/2089104/target-breach-notifications-are-a-perfect-example-of-what-not-to-do.html Hopefully your company will never be the victim of a massive data breach. If it is, though, and customer data is compromised, make sure you don’t follow Target’s lead when it comes to notifying customers. Target’s customer notification efforts are wrong on almost every level. Customers are conditioned to not click on links in email messages. In the wake of a massive data breach like Target experienced, phishing scams often try to exploit the heightened awareness by sending out emails that look very legitimate. Security experts warn users to specifically avoid such emails following a data breach, and remind users that a legitimate, reputable company would not send you an email and ask you to click on a link. Apparently, Target did not get that memo. James Lyne, global head of security for Sophos, received an email from Target—although he claims that he is not even a Target customer. There are apparently many people receiving breach notification emails from Target who did not shop at Target and are not affected by the breach. Lyne dissected the email in a post on Forbes, breaking down point by point all the ways Target failed. It uses a shady subdomain—“target.bfi0.com” rather than just “target.com”—and directs users to click on a link comprised of endless gibberish. The email is distributed using a ridiculously suspicious-looking email address. In a nutshell, there is nothing about the legitimate breach notification email from Target that differentiates it in any way from a reasonably well-crafted phishing attack. “What hope do users have of making a decision about the legitimacy of emails when the good guys behave like this?” asks Lyne. “Target needs to look closely at how it rebuilds consumer trust and suspicious looking emails is not going to help.” Try this If you ever find your company in the unfortunate position of needing to notify customers of a data breach and possible compromise of personal information, this is not how you do it. The notification email should originate from a domain that is instantly identifiable as your company. If your Web domain is “pcworld.com”, the notification email should come from “<SomeRelevantAddress>@pcworld.com”. The notification should be just that—a notification. It should clearly state the facts of the incident, and explain in simple terms what information is potentially compromised, and what customers can do to determine if they’re affected, and what they should do to protect themselves and their personal data. It can provide a phone number for customers to call, but it should not contain a link that customers are expected to click on for any reason. We can excuse Target to some extent for being the unfortunate victim of such a massive data breach. It’s response to the breach, however, and these very shady customer notification emails, are inexcusable.
_______________________________________________ Dataloss Mailing List (dataloss () datalossdb org) Archived at http://seclists.org/dataloss/ Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss For inquiries regarding use or licensing of data, e-mail sales () riskbasedsecurity com Supporters: Risk Based Security (http://www.riskbasedsecurity.com/) Risk Based Security offers security intelligence, risk management services and customized security solutions. The YourCISO portal gives decision makers access to tools for evaluating their security posture and prioritizing risk mitigation strategies. Cyber Risk Analytics offers actionable threat information and breach analysis.
Current thread:
- Target breach notifications are a perfect example of what not to do Audrey McNeil (Jan 21)