Published:
18 October 2022
Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2022.0200.2 MyDeal Data Breach Incident 18 October 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: MyDeal Data Breach Resolution: None Revision History: October 18 2022: Received further information October 17 2022: Initial Release OVERVIEW Woolworths has confirmed a security incident targeting MyDeal, a Woolworths Group subsidiary where a compromised user credential has been used to gain unauthorised access to the MyDeal's Customer Relationship Management system affecting 2.2 million customer data [1][2]. IMPACT According to the reports, MyDeal customer data which has been accessed in the data breach includes; Customer Name Email Address Phone Number Delivery Address Date of Birth (In some instances) [1][2] Woolworths has confirmed that MyDeal does not store payment, drivers licence or passport details in their CRM system and no customer account passwords or payment details have been accessed in this breach [1][2]. Woolworths has also confirmed that Mydeal.com.au website and app have not been impacted [1][2] UPDATE 18/10/2022: The threat actor reportedly has released samples of the stolen MyDeal customer data to a hacking forum [3]. MITIGATION Woolworths reported that they are working together with relevant authorities to investigate the issue. AusCERT is aware of the situation and will keep members updated with information and share actionable Indicators of Compromise (IoCs) as they become available [1][2]. UPDATE 18/10/2022: While MyDeal has confirmed that no passwords were exposed in the attack, MyDeal customers are encouraged to reset their passwords [3]. REFERENCES [1] https://www.woolworthsgroup.com.au/au/en/media/latest-news/2022/mydeal-data-breach-notification.html MyDeal data breach notification [2] Woolworths subsidiary MyDeal leaks 2.2 million customers' details https://www.itnews.com.au/news/woolworths-subsidiary-mydeal-leaks-22-million-customers-details-586489 [3] MyDeal data breach impacts 2.2M users, stolen data for sale online https://www.bleepingcomputer.com/news/security/mydeal-data-breach-impacts-22m-users-stolen-data-for-sale-online/ AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY04Q08kNZI30y1K9AQipgw/+JD1qty1imaZFSO9hyfvdzZtI6XxAu365 B6TCkmnUTxmmeSJey0lQEfYwsf3ykxXA6jmTjupaigYAg5CPPSkJPO+Yx4oURKBD uiHAO/TqCCpUDC1eV8XFCKdkcy7DgE1exWEM/iLkKy/rOVT74mU1hzKQK+2DInlN WtbdR9Jjxtrg+xIfMbDNH0c0TwzPWYKucs0pr/Vyod0b/Wv+Vpa0XuqkvViiUhaz MmE8KunVl7p6Iwv/qskgndMYQDSESHD1i8nupNfKFs9IJHislgtvGvPg574q3GCF 7qXJiHF7dvATXrOyoOki+p6iP26WmUAwv7w9svaMlOE6zfKtSLE5BVhR0lfbTwM4 rDJs6t2NXZKVk70ZZ/EyQCCgmyeVxTVhR+wnt0NyO/W0UT9z19i4Q6eih7PRVmgM 3NnLlcvNdCXWY9sbml9NxjQLGuAuAlwKS5jfA54RR4/pg7LU9NZqtELch0j6cDmd By9B4/LeX5Wq7bUvQMfTwq96bc0CeEtO8++zZ0o7nyy9+m5weLk77E8V/PsqWMYd +O9MHQ4/nr8h9IKK/EPGCrR/JYsFSkpmzHS4zUtsV7mZd+RwjLK8GXKeAXTZq0VZ qlTOEjRk1P4L4vkb+xaT1K6AOiMQMosfnJMq/Mbb810lsFmsI5WVqsRE3kgXvb8E cicB+OgJxv8= =Dyal -----END PGP SIGNATURE-----