Tuesday, November 26, 2024
HomeCyber Security NewsOver 14000 customers Impacted with the BevMo Payment Card Breach

Over 14000 customers Impacted with the BevMo Payment Card Breach

Published on

BevMo Payment Card Breach impacted more than 14000 customers, attackers injected skimmer scripts into the checkout page of the website.

The injected skimmer scripts record keystrokes from customers and transfer the data to the attacker’s server.

Attackers stolen data includes customer names, phone numbers, addresses and credit, and debit card numbers along with security codes.

- Advertisement - SIEM as a Service

BevMo said the attackers placed the skimmer scripts between Aug.2 and Sept.26 and the company has notified the California attorney general’s office about the breach.

Now the wine and liquor company announced that they have removed the malicious script from the website checkout page and the investigation still in progress.

As we know hackers are determined and they spent huge time with an organization to find the network structure and they will infiltrate the best way.

Last month Amazon suffered a data breach before the Black Friday, the number of customers names and Email address has been exposed.

Recent Breaches

120 Million Unique Taxpayer ID Numbers Exposed Online From Misconfigured Servers

66 Million Users Personal Data Exposed From Unprotected MongoDB Database

Quora Hacked – 100 Million User’s Data Stolen By Hackers

Hackers Stolen 500 Million Guests Personal Information From Starwood Hotels Guest Reservation Database

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

IBM Workload Scheduler Vulnerability Stores User Credentials in Plain Text

IBM has issued a security bulletin warning customers about a vulnerability in its Workload...

Multiple Flaws With Android & Google Pixel Devices Let Attackers Elevate Privileges

Several high-severity vulnerabilities have been identified in Android and Google Pixel devices, exposing millions...

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

IBM Workload Scheduler Vulnerability Stores User Credentials in Plain Text

IBM has issued a security bulletin warning customers about a vulnerability in its Workload...

Multiple Flaws With Android & Google Pixel Devices Let Attackers Elevate Privileges

Several high-severity vulnerabilities have been identified in Android and Google Pixel devices, exposing millions...

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...