-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                              ASB-2022.0200.2
                        MyDeal Data Breach Incident
                              18 October 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:          MyDeal Data Breach
Resolution:       None

Revision History: October 18 2022: Received further information
                  October 17 2022: Initial Release

OVERVIEW

        Woolworths has confirmed a security incident targeting MyDeal, a Woolworths
        Group subsidiary where a compromised user credential has been used to gain
        unauthorised access to the MyDeal's Customer Relationship Management
        system affecting 2.2 million customer data [1][2].


IMPACT

        According to the reports, MyDeal customer data which has been accessed in the
        data breach includes;
        
        Customer Name
        Email Address
        Phone Number
        Delivery Address
        Date of Birth (In some instances) [1][2]
        
        Woolworths has confirmed that MyDeal does not store payment,
        drivers licence or passport details in their CRM system  and no
        customer account passwords or payment details have been
        accessed in this breach [1][2].
        
        Woolworths has also confirmed that Mydeal.com.au website and app
        have not been impacted [1][2]
        
        UPDATE 18/10/2022:
        
        The threat actor reportedly has released samples of the stolen MyDeal
        customer data to a hacking forum [3].


MITIGATION

        Woolworths reported that they are working together with relevant
        authorities to investigate the issue. 
        
        AusCERT is aware of the situation and will keep members updated with
        information and share actionable Indicators of Compromise (IoCs)
        as they become available [1][2].
        
        UPDATE 18/10/2022:
        
        While MyDeal has confirmed that no passwords were exposed in the attack,
        MyDeal customers are encouraged to reset their passwords [3].


REFERENCES

        [1] https://www.woolworthsgroup.com.au/au/en/media/latest-news/2022/mydeal-data-breach-notification.html
            MyDeal data breach notification

        [2] Woolworths subsidiary MyDeal leaks 2.2 million customers' details
            https://www.itnews.com.au/news/woolworths-subsidiary-mydeal-leaks-22-million-customers-details-586489

        [3] MyDeal data breach impacts 2.2M users, stolen data for sale online
            https://www.bleepingcomputer.com/news/security/mydeal-data-breach-impacts-22m-users-stolen-data-for-sale-online/

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/

iQIVAwUBY04Q08kNZI30y1K9AQipgw/+JD1qty1imaZFSO9hyfvdzZtI6XxAu365
B6TCkmnUTxmmeSJey0lQEfYwsf3ykxXA6jmTjupaigYAg5CPPSkJPO+Yx4oURKBD
uiHAO/TqCCpUDC1eV8XFCKdkcy7DgE1exWEM/iLkKy/rOVT74mU1hzKQK+2DInlN
WtbdR9Jjxtrg+xIfMbDNH0c0TwzPWYKucs0pr/Vyod0b/Wv+Vpa0XuqkvViiUhaz
MmE8KunVl7p6Iwv/qskgndMYQDSESHD1i8nupNfKFs9IJHislgtvGvPg574q3GCF
7qXJiHF7dvATXrOyoOki+p6iP26WmUAwv7w9svaMlOE6zfKtSLE5BVhR0lfbTwM4
rDJs6t2NXZKVk70ZZ/EyQCCgmyeVxTVhR+wnt0NyO/W0UT9z19i4Q6eih7PRVmgM
3NnLlcvNdCXWY9sbml9NxjQLGuAuAlwKS5jfA54RR4/pg7LU9NZqtELch0j6cDmd
By9B4/LeX5Wq7bUvQMfTwq96bc0CeEtO8++zZ0o7nyy9+m5weLk77E8V/PsqWMYd
+O9MHQ4/nr8h9IKK/EPGCrR/JYsFSkpmzHS4zUtsV7mZd+RwjLK8GXKeAXTZq0VZ
qlTOEjRk1P4L4vkb+xaT1K6AOiMQMosfnJMq/Mbb810lsFmsI5WVqsRE3kgXvb8E
cicB+OgJxv8=
=Dyal
-----END PGP SIGNATURE-----