Anti-Phishing, DMARC , Data Loss Prevention (DLP) , Email Threat Protection

Amazon Snafu Exposed Customers' Names and Email Addresses

Scant Detail About Incident and Unusual Notification Raises Eyebrows
Amazon Snafu Exposed Customers' Names and Email Addresses
Photo: Robert Scoble via Flickr/CC

Amazon has blamed a technical error for its inadvertent exposure of some customers' names and email addresses online, and it says the problem has now been fixed. The online retailing giant maintains that its systems were not breached, and it says that it has emailed a notification to all affected customers.

See Also: Live Webinar | How the Assume Breach Mentality Limits ROI of Security Programs

"We have fixed the issue and informed customers who may have been impacted," an Amazon spokesman tells Information Security Media Group.

Amazon declined to specify how many people were affected, in which regions of the world they live or whether it has alerted any regulators about the data exposure. Based on posts to Twitter from customers who received a notification, it appears that the data exposure at minimum affected individuals in the U.S. and Europe.

The scant information issued by Amazon about the incident has raised some eyebrows, especially because consumers are becoming increasingly attuned to data privacy issues, thanks to many countries strengthening their data protection laws.

Mandatory Disclosure?

It's not clear whether Amazon's data exposure would require the online retail giant to directly notify affected U.S. residents. Every state has slightly different rules and requirements for when that needs to happen.

Washington state, where Amazon is headquartered, requires that organizations that suffer a data breach or inadvertent data exposure notify affected residents as well as the state's attorney general's office within 45 days of discovering the incident. The law applies to breaches affecting 500 or more people.

The state defines a breach as being an unauthorized acquisition of data, according to the law firm Perkins Coie. No notice is required if the breach does not disclose information that could result in a risk of harm to consumers, the law firm writes.

Because Amazon says the exposure was the result of a technical problem rather than a malicious action, it would appear to avoid the first threshold under Washington state's law.

The types of personal information the state of Washington considers to qualify for a mandatory data breach notification are first names, first initials and last names that are leaked in combination with another piece of sensitive data, such as a Social Security number, driver's license number or bank account details. Email addresses are not mentioned.

GDPR Now in Full Effect

The scene may be different in Europe, however, where the General Data Protection Regulation took effect in May (see: Fresh GDPR Complaints Take Aim at Targeted Advertising).

GDPR now stands as one of the most strict regulations in the world when it comes to how organizations must deal with leaks, and violators face the threat of severe potential penalties. GDPR requires organizations to report incidents to an appropriate regulator within 72 hours of discovering them.

Under GDPR, email addresses - even ones that are work-related - are considered personal data, according to an analysis published by the U.K.-based law firm Beswicks Legal.

The Information Commissioner's Office, which enforces GDPR in the U.K., didn't immediately respond to a request for comment. But it told the Register on Wednesday that it had yet to receive any notification from Amazon, and it noted that choosing whether the data exposure would meet GDPR's mandatory breach-reporting threshold would be up to Amazon (see: Europe Catches GDPR Breach Notification Fever).

Phishing Threat

Regardless of data security laws, Amazon's leak of email addresses could put customers at risk from phishing attacks, says Colin Bastable, CEO of Lucy Security. Phishing emails continue to be devastatingly effective at duping people into divulging their login credentials to attackers.

"Most U.S. households have an Amazon account, and as we know, consumers recycle the same three or four passwords over most accounts," Bastable says. "Cybercriminals can now start to build consumer profiles to rival Facebook, Google and Amazon, with significantly heightened online risk for all consumers."

In fact, some security experts have been warning that many gangs likely already possess such profiles, which they use to facilitate identity theft, money laundering and other criminal activities.

Suspicious Email, From Amazon

Some Amazon customers posted the email notification they received on Twitter, and many had immediately spotted an oddity.

Although Amazon encrypts connections over the web - signified by "https" being in the URL window - the signature block of the link to Amazon within the email doesn't have that. Amazon says the emails are genuine. But it appears that they may have been hastily composed.

"Turns out that weird data breach notification email from Amazon *is* real ..." writes Graham Cluley, a cybersecurity expert and blogger, on Twitter. "Amazing lack of detail, and plenty of reasons why people felt it could be dodgy."

Executive Editor Mathew Schwartz contributed to this story.


About the Author

Jeremy Kirk

Jeremy Kirk

Executive Editor, Security and Technology, ISMG

Kirk was executive editor for security and technology for Information Security Media Group. Reporting from Sydney, Australia, he created "The Ransomware Files" podcast, which tells the harrowing stories of IT pros who have fought back against ransomware.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.