• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
AskCyber Home » News » data privacy » Shopify Data Breach an Inside Job

Shopify Data Breach an Inside Job

2020-09-23 by Michelle Dvorak

Shopify Data Breach

Customer PII Compromised in Shopify Data Breach Allegedly Schemed by 2 Support Members

Shopify announced that some of its merchants were impacted by a data breach. The company is investigating the security incident and has notified both the US Federal Bureau of Investigation (FBI) and the Royal Canadian Mounted Police of the data breach.

Shopify (SHOP) reports that the data breach was the work of “two rogue members” of a support team who allegedly “engaged in a scheme to obtain customer transactional records of certain merchants,” said the company about the Shopify data breach.

Under 200 merchants were affected by the Shopify Data breach. As of October 2019, Shopify had one million merchants across 175 countries using its eCOmmerce platform. The company did not state how many customers were compromised or the number of records were breached.

I am one of those customers. Scroll down to see the breach notification I received.

Shopify is back-end platform for online sellers. Most customers never knew they were buying on a site powered by Shopify technology.

The pair schemed to steal the transactional data of merchants. So far there is no evidence that the stolen data has been used in any other type of cyber attack. However, it is very common for stolen personal information to be stalled on the dark web two other hackers or used in future email phishing campaigns.

Compromised Shopify Data Breach PII Includes:

  • Name
  • Email address
  • Street address
  • Order details – products and services purchased from impacted merchants
  • Last four digits of payment card (according to a breahc notification I received)

No financial information such as payment card information was breached although the investigation is still ongoing.

The data includes basic contact information, such as email, name, and address, as well as order details, like products and services purchased, but not financial information such as credit-card information.

“We immediately terminated these individuals’ access to our Shopify network and referred the incident to law enforcement,” said Shopify in a statement.

What is Shopify?

Shopify Inc. (SHOP.TO) is a Canadian e-commerce company headquartered in Ottawa, Ontario. Shopify is also the name of the company’s eCommerce solution. Shopify allows businesses to start selling their products and services online.  

The company is based in Ottawa and also has offices in Montreal, Toronto, and Waterloo. In the States, Shopify has offices in San Francisco and Manhattan.

Shopify Data Breach – What to Do Next?

If you’re like me, you were sent a notification saying that your data was part of the Shopify data breach. Although no payment information appears to have been compromised, hacked personally identifiable information (PII) can lead to identity theft or monetary losses in the future.

You should consider proactively protecting your credit file with an identity with the monitoring service. An identity theft monitoring app will notify you if there are any changes to your credit files –  like new credit cards, car loans, mortgages, or other changes to lines of credit.

Even though the two support employees that allegedly breached the system did not steal payment card information, it’s possible that this data leaks online and gets used in other cyber crimes.

READ How to Spot a Phishing Email

Another cyberattack that uses seemingly harmless personal information, like stolen email addresses, are phishing attacks. In an email phishing attack, the hacker sends you an email because they have your stolen email address. Phishing emails attempt to trick you into downloading a malicious attachment or clicking on a link that steals your usernames, passwords, or financial account numbers.

This is why protecting PII like it was cash is very important.

Filed Under: data privacy

About Michelle Dvorak

Michelle writes about cyber security, data privacy focusing on social media privacy as well as how to protect your IoT devices. She has worked in internet technology for over 20 years and owns METRONY, LLC. Michelle earned a B.S. in Engineering from Rensselaer Polytechnic Institute. Michelle published a guide to Cyber Security for Business Travelers


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version