Thursday, March 23, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > 200,000 The North Face customers’ information stolen

200,000 The North Face customers’ information stolen

The company sent a breach notification to thousands of users to inform them about the credential stuffing attack.


Erdem Yasar Erdem Yasar
September 7, 2022
2 min read
200,000 The North Face customers' information stolen
  • The attackers breached 195,095 accounts with valid credentials, which allowed them to gather customer information.
  • The North Face reset all user passwords and all payment card tokens are wiped after the investigation.
  • The company stated that they do not keep a copy of payment card details, thus users’ credit cards are not at risk.

The popular outdoor apparel brand, The North Face suffered a credential stuffing attack. As a result, approximately 200,000 accounts are hacked on the company’s official website. The credential stuffing attack means that attackers are using either email addresses and usernames and password combinations gathered from data breaches to hack into accounts. Thus, users who are using the same username/email and password combination in multiple services are at extra risk.

Credential stuffing

The investigation showed that the attack started on the 26th of July, however, the admins could detect the unusual activity almost two weeks later, on August 11. Finally, the company managed to stop the attack on August 19. The attackers breached 195,095 accounts with valid credentials, which allowed them to gather customer information like full name, purchase history, billing and shipping address, telephone number, account creation date, gender, and XPLR Pass reward record.

The company also confirmed that users’ credit card data are not at risk. The company’s parent firm, VF Corporation stated that they do not keep a copy of payment card details. The company only retains a “token” linked to the payment card, and only our third-party payment card processor keeps payment card details. This token can not be used anywhere else to initiate a purchase.

After the incident, The North Face reset all user passwords and all payment card tokens are wiped. Users need to enter a new password and provide the payment card details again to make a purchase. In the breach notification, the company also said,

« Please change your password at thenorthface.com and other sites where you use the same password. We strongly encourage you not to use the same password for your account at thenorthface.com that you use on other websites. If a breach occurs on one of those other websites, an attacker could use your email address and password to access your account at thenorthface.com. In addition, we recommend avoiding using easy-to-guess passwords. You should also be on alert for schemes known as “phishing” attacks, where malicious actors may pretend to represent The North Face or other organizations. You should not provide your personal information in response to any electronic communications regarding a cybersecurity incident. »

See more Cybersecurity News

A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


Erdem Yasar

Erdem Yasar

Erdem Yasar is a news editor at Cloud7. Erdem started his career by writing video game reviews in 2007 for PC World magazine while he was studying computer engineering. In the following years, he focused on software development with various programming languages. After his graduation, he continued to work as an editor for several major tech-related websites and magazines. During the 2010s, Erdem Yasar shifted his focus to cloud computing, hosting, and data centers as they were becoming more popular topics in the tech industry. Erdem Yasar also worked with various industry-leading tech companies as a content creator by writing blog posts and other articles. Prior to his role at Cloud7, Erdem was the managing editor of T3 Magazine.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
T5 and Flexential announced a build-to-suit project in Oregon

T5 and Flexential announced a build-to-suit project in Oregon

Related News

CISA aims to identify vulnerabilities that attract ransomware

CISA aims to identify vulnerabilities that attract ransomware

March 22, 2023 2:10 pm
7 best cybersecurity schools

7 best cyber security schools

March 21, 2023 9:00 pm
Akamai researchers warn about the new HinataBot botnet

Akamai researchers warn about the new HinataBot botnet

March 20, 2023 6:10 pm
7 biggest data breaches in the history of the internet

7 biggest data breaches in the history of the internet

March 16, 2023 10:55 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • How to change system language on Windows 11
  • How to create and manage menus in WordPress
  • Interview: Tim Mackey, head of supply chain risk strategy of Synopsys
  • 7 richest domains and the reasons why
  • CISA aims to identify vulnerabilities that attract ransomware

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.