Contact lens supplier Vision Direct has released information about a data breach it suffered earlier this month.
“Between 12.11am GMT 3rd November 2018 and 12.52pm GMT 8th November, the personal and financial details of some of our customers ordering or updating their information on visionDirect.co.uk was compromised,” said a statement on its website.
It’s not clear how many people are affected, but the compromised data includes:
- Full name
- Billing address
- Email address
- Telephone number
- Payment card information
- Card expiry data
This breach could cause serious harm to those affected. Vision Direct has advised customers who believe they are affected to contact their banks. It claims to have fixed the issue with its website.
How did the breach happen?
That’s exactly what it was. The data was stolen via a fake Google Analytics script: https://g-analytics[.]com/libs/1.0.16/analytics.js – you can view a copy of the JS via the @urlscanio archive of https://t.co/TV22dxvCcK https://t.co/SFi5Wp4gm3 pic.twitter.com/rY13cMR2TL
— Bad Packets Report (@bad_packets) November 18, 2018
Mursch said the code was a fake Google Analytics script. Google Analytics is used on a significant number of websites, meaning it could be easy to fail to spot an imposter version of it hiding in a website’s code.
Has the breach been reported?
In its statement, Vision Direct says it “has taken the necessary steps to prevent any further data theft, the website is working normally, and we are working with the authorities to investigate how this theft occurred”.
We hope this means the breach has been reported to the ICO (Information Commissioner’s Office). If so, the ICO will investigate and could hand Vision Express a significant fine.
Would you organisation survive a data breach? Download our free Data Breach Survival Guide to find out!