{"id":78767,"date":"2015-12-30T20:55:11","date_gmt":"2015-12-31T01:55:11","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-07-31T21:22:13","modified_gmt":"2021-08-01T01:22:13","slug":"target-wish-list-leaks-your-info","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/target-wish-list-leaks-your-info\/","title":{"rendered":"Target Wish List Leaking Your Data"},"content":{"rendered":"<p><a href=\"http:\/\/www.bytebacklaw.com\/2015\/05\/taking-stock-of-the-target-data-breach\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-98549 size-medium\" title=\"Target Wish List Leaking Your Data\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/arrow-e1564255996100-150x101.jpg?resize=150%2C101&#038;ssl=1\" alt=\"Target Wish List Leaking Your Data\" width=\"150\" height=\"101\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/arrow-e1564255996100.jpg?resize=150%2C101&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/arrow-e1564255996100.jpg?resize=75%2C50&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/arrow-e1564255996100.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>The holiday shopping season has not been merry for mega-mart <strong>Target<\/strong>. You would think the <strong>mega-retailer<\/strong> that <strong>leaked info on 110 million customers<\/strong> would learn how to keep their customers&#8217; info secure but <strong>NOOOO<\/strong>. The anti-virus firm <strong><a href=\"https:\/\/avast.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">AVAST<\/a><\/strong> has <a href=\"https:\/\/blog.avast.com\/2015\/12\/15\/retailers-apps-reveal-my-christmas-list-to-the-public\/\" target=\"_blank\" rel=\"noopener noreferrer\">discovered<\/a> the <strong><a href=\"http:\/\/www.target.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Target<\/a> <\/strong>(<a href=\"https:\/\/www.tradingview.com\/symbols\/NYSE-TGT\/\" target=\"_blank\" rel=\"noopener noreferrer\">TGT<\/a>)<strong> <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.target.ui\" target=\"_blank\" rel=\"noopener noreferrer\">Wish List app<\/a><\/strong> is <strong>leaking<\/strong> your data, your <strong>personally identifiable information (<a title=\"Personally identifiable information\" href=\"http:\/\/en.wikipedia.org\/wiki\/Personally_identifiable_information\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">PII<\/a>)<\/strong>.<\/p>\n<p><a href=\"https:\/\/www.clearswift.com\/blog\/2014\/09\/22\/australian-federal-police-department-sensitive-data-leak-scandal\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98568\" title=\"Data leak\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data-leak-2-e1564256967736-150x98.png?resize=105%2C69&#038;ssl=1\" alt=\"Data leak\" width=\"105\" height=\"69\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data-leak-2-e1564256967736.png?resize=150%2C98&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data-leak-2-e1564256967736.png?resize=75%2C49&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data-leak-2-e1564256967736.png?w=291&amp;ssl=1 291w\" sizes=\"auto, (max-width: 105px) 100vw, 105px\" \/><\/a>The Avast Blog says that if you created a <strong>Christmas wish<\/strong> list using the Target app it is leaking your data.\u00a0 it might be accessible to more people than you want to actually receive gifts from. The Target app keeps a database of users\u2019 wish lists, <strong>names, addresses, and email addresses.<\/strong><\/p>\n<p>Alarmingly, for a firm that has privacy issues, the Target app\u2019s <strong>backend<\/strong> interface is <strong>not secured. <\/strong>This allowed the database to be accessed <strong>over the Internet<\/strong>. The author reports that the <a title=\"Application programming interface\" href=\"http:\/\/en.wikipedia.org\/wiki\/Application_programming_interface\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">Application Program Interface<\/a> (<strong>API<\/strong>) is easily accessible over the Internet. An API is a set of conditions where if you ask a question it sends the answer. Also, the Target API does <strong>not require any authentication<\/strong>. The only thing you need to parse all the data automatically is to figure out how the user ID is generated. Once you have that figured out, all the <strong>data is served to you on a silver platter in a <a title=\"JSON\" href=\"http:\/\/json.org\/\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">JSON<\/a> file<\/strong>.<\/p>\n<h3>Leaking your data<\/h3>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98559 \" title=\"while developers investigate\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/confused-face-with-glasses.jpg?resize=80%2C118&#038;ssl=1\" alt=\"while developers investigate\" width=\"80\" height=\"118\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/confused-face-with-glasses.jpg?resize=102%2C150&amp;ssl=1 102w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/confused-face-with-glasses.jpg?resize=51%2C75&amp;ssl=1 51w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/confused-face-with-glasses.jpg?w=175&amp;ssl=1 175w\" sizes=\"auto, (max-width: 80px) 100vw, 80px\" \/><\/p>\n<p>The JSON file that the AVAST researchers requested from Target\u2019s API leaked lots of interesting data. The leaked data included: <strong>users\u2019 names, email addresses, shipping addresses<\/strong>, phone numbers, the type of registries, and the items on the registries. The AVAST researchers did not store any PII, but they did aggregate data from 5,000 inputs for statistical analysis.<\/p>\n<p>The AVAST researchers took the sample and looked at which some of the data they got. It included; brands, states the Target app users are from, and the most common names of people using Target\u2019s app.<\/p>\n<p><a href=\"https:\/\/blog.avast.com\/2015\/12\/15\/retailers-apps-reveal-my-christmas-list-to-the-public\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-98556 size-full\" title=\"Leasked info\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/target-distribution-of-top-10-brands.png?resize=480%2C268&#038;ssl=1\" alt=\"Leasked info\" width=\"480\" height=\"268\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/target-distribution-of-top-10-brands.png?w=884&amp;ssl=1 884w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/target-distribution-of-top-10-brands.png?resize=75%2C42&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/target-distribution-of-top-10-brands.png?resize=150%2C84&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/target-distribution-of-top-10-brands.png?resize=768%2C428&amp;ssl=1 768w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><\/a><\/p>\n<p>This appears to be a classic case of <strong><a title=\"Security through obscurity\" href=\"http:\/\/en.wikipedia.org\/wiki\/Security_through_obscurity\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">security by obfuscation<\/a>.<\/strong> The app developers created the online API for data that is uploaded by <strong>Target.<\/strong> They also set up a separate API in tandem so that the retail chain could download and process the uploaded data \u2013 but without any security measures in place.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20160503145406\/https:\/\/inventorysystemsoftware.wordpress.com\/2011\/10\/17\/stop-pouring-inventory-money-down-drain\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98561 \" title=\"Target has reached a $39.4 million settlement\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/money-down-the-drain.jpg?resize=105%2C100&#038;ssl=1\" alt=\"Target has reached a $39.4 million settlement\" width=\"105\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/money-down-the-drain.jpg?resize=150%2C143&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/money-down-the-drain.jpg?resize=75%2C71&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/money-down-the-drain.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 105px) 100vw, 105px\" \/><\/a>In a <a href=\"http:\/\/arstechnica.com\/security\/2015\/12\/wish-list-app-from-target-springs-a-major-personal-data-leak\/\" target=\"_blank\" rel=\"noopener noreferrer\">post<\/a> on <a href=\"https:\/\/arstechnica.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Ars Technica<\/em><\/a>, a Target spokesperson said that it has suspended elements of the app while developers investigate. Hopefully, this should mean that the data-leaking has stopped while the backend has been disabled.<\/p>\n<p>In other Target data breach news <a href=\"https:\/\/web.archive.org\/web\/20160729153456\/http:\/\/www.fierceitsecurity.com:80\/?\" target=\"_blank\" rel=\"noopener noreferrer\"><em>FierceITSecurity<\/em><\/a> <a href=\"https:\/\/web.archive.org\/web\/20160111203806\/http:\/\/www.fierceitsecurity.com:80\/story\/target-inks-394m-settlement-banks-over-data-breach\/2015-12-03?\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that Target has reached a <strong>$39.4 million settlement<\/strong> with banks and credit unions over claims they lost millions of dollars as a result of the <strong>massive 2013 data breach<\/strong> at the retailer. The massive data breach at Target exposed the credit and debit card numbers of 40 million customers to hackers and personal information on another 70 million.<\/p>\n<p>The settlement, if accepted, will resolve class-action lawsuits by the banks and credit unions seeking reimbursement for fraudulent charges and issuing new cards. Of the $39.4 million, $20.25 million will be paid to banks and credit unions, and $19.11 million will be paid to reimburse <a title=\"MasterCard\" href=\"http:\/\/www.mastercard.com\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">MasterCard<\/a> card issuers.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20180823102332\/http:\/\/remuvebedbugs.com\/page\/4\/Don%5C%27t_Bury_Your_Head_In_The_Sand\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98563 size-medium\" title=\"cautionary tale\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/head_in_the_sand.jpg?resize=150%2C83&#038;ssl=1\" alt=\"cautionary tale\" width=\"150\" height=\"83\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/head_in_the_sand.jpg?resize=150%2C83&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/head_in_the_sand.jpg?resize=75%2C41&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/head_in_the_sand.jpg?w=600&amp;ssl=1 600w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>This follows settlements that Target reached with <a title=\"Visa Inc.\" href=\"http:\/\/visa.com\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">Visa card<\/a> issuers for <strong>$67 million<\/strong> and with customers for <strong>$10 million<\/strong>. Target estimated that the breach so far has cost it $290 million, with insurers picking up $90 million, according to a filing with the <a title=\"U.S. Securities and Exchange Commission\" href=\"https:\/\/www.sec.gov\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">Securities and Exchange Commission<\/a> last week. Target is not out of the woods yet. It still has to deal with <strong>shareholder lawsuits<\/strong> and a <strong>probe by the <a title=\"Federal Trade Commission\" href=\"http:\/\/www.ftc.gov\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">Federal Trade Commission<\/a><\/strong> and state <strong>attorneys general<\/strong> related to the data breach.<\/p>\n<p>Fred Donovan at <em>FierceITSecurity<\/em> says Target is a cautionary tale for any enterprise. Despite handling billions of dollars in credit card transactions, the retailer <strong>did not have one person responsible for IT security<\/strong> at the time of the breach. While it had a network security system in place, it <strong>did not<\/strong> have IT security personnel skilled enough to <strong>recognize an alarm<\/strong> the system set off <strong>months before<\/strong> Target discovered the breach.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>Cash is king, especially at Target.<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20230902045128\/https:\/\/www.thesafemac.com\/massive-mackeeper-data-breach\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Massive MacKeeper data breach<\/a> (thesafemac.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Target which lost PII on 40 million customers is now leaking your data again with its mobile app<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3277,1795,849,433,2278,2370,951,4,2049,2276],"class_list":["post-78767","post","type-post","status-publish","format-standard","hentry","category-security","tag-3277","tag-breach","tag-data","tag-law-suit","tag-master-card","tag-pci-dss","tag-pii","tag-security","tag-target","tag-visa"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/78767","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=78767"}],"version-history":[{"count":15,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/78767\/revisions"}],"predecessor-version":[{"id":129909,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/78767\/revisions\/129909"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=78767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=78767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=78767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}