FTC Takes Action Against CafePress for Data Breach Cover Up
The Federal Trade Commission yesterday took action against
online customized merchandise platform CafePress over allegations that it
failed to secure consumers’ sensitive personal data and covered up a major
breach. The FTC alleges that CafePress failed to implement reasonable security
measures to protect sensitive information stored on its network, including
plain text Social Security numbers, inadequately encrypted passwords, and
answers to password reset questions. The Commission’s proposed order requires
the company to bolster its data security and requires its former owner to pay a
half million dollars to compensate small businesses.
“CafePress employed careless security practices and
concealed multiple breaches from consumers,” said Samuel Levine, Director of
the FTC’s Bureau of Consumer Protection. “These orders dial up accountability
for lax security practices, requiring redress for small businesses that were
harmed, and specific controls, like multi-factor authentication, to better safeguard
personal information.”
In a complaint filed against Residual Pumpkin Entity, LLC,
the former owner of CafePress, and PlanetArt, LLC, which bought CafePress in
2020, the FTC alleged that CafePress failed to implement reasonable security
measures to protect the sensitive information of buyers and sellers stored on
its network. In addition to storing Social Security numbers and password reset
answers in clear, readable text, CafePress retained the data longer than was
necessary. The company also failed to apply readily available protections
against well-known threats and adequately respond to security incidents, the
complaint alleged. As a result of its shoddy security practices, CafePress’
network was breached multiple times.
According to the complaint, a hacker exploited the company’s
security failures in February 2019 to access millions of email addresses and
passwords with weak encryption; millions of unencrypted names, physical
addresses, and security questions and answers; more than 180,000 unencrypted
Social Security numbers; and tens of thousands of partial payment card numbers
and expiration dates. Some of the information was later found for sale on the
Dark Web.
After being notified a month later that it had a security
vulnerability and that hackers had obtained consumer data, CafePress patched
the vulnerability but failed to properly investigate the breach for several
months despite additional warnings, the complaint alleged. This included a
warning in April 2019 from a foreign government, which notified the company
that a hacker had illegally obtained CafePress customer account information and
urged the company to notify affected customers. The company, however, withheld
this essential information, and instead only told customers to reset their passwords
as part of an update to its password policy.
The complaint alleges CafePress did not inform affected
customers until September 2019—one month after the breach was reported widely.
The company’s lax security practices, however, still left many consumers at
risk. For example, the company continued to allow people to reset their
passwords on the website by answering security questions associated with
customer email addresses—the same information that had been previously stolen
by hackers.
According to the complaint, CafePress was aware of problems
with its data security prior to the 2019 data breach. Through at least January
2018, when CafePress determined that certain accounts of shopkeepers had been
hacked, CafePress closed the accounts and charged the victims a $25 account
closure fee. The company also experienced several malware infections to its
network prior to the 2019 hack but failed to investigate the source of such
attacks.
In addition to its security failures, the FTC alleged the
company misled users by using consumer email addresses for marketing despite
its promises that such information would only be used to fulfill orders
consumers had placed.
As part of the proposed settlement, Residual Pumpkin and
PlanetArt will be required to implement comprehensive information security
programs that will address the problems that led to the data breaches at
CafePress. This includes replacing inadequate authentication measures such as
security questions with multi-factor authentication methods; minimizing the
amount of data they collect and retain; and encrypting Social Security numbers.
In addition, the proposed settlement requires Residual
Pumpkin to pay $500,000 in redress to victims of the data breaches. PlanetArt
will be required to notify consumers whose personal information was accessed as
a result of CafePress’s data breaches and provide specific information about
how consumers can protect themselves. Both companies will be required to have a
third party assess their information security programs and provide the
Commission with a redacted copy of that assessment suitable for public
disclosure.
Comments
Post a Comment