Lush A/NZ credit card details pilfered by "hackers"

Powered by SC Magazine

Database stolen, PCI DSS rules flouted.

Soap retailer Lush has urged customers in Australia and New Zealand to cancel their credit cards after revealing the brand's local websites were breached.

It pulled its websites offline today and replaced them with a "privacy breach" message indicating that online shoppers' personal information "may have been obtained by the hackers".

Lush Australasia director Mark Lincoln later told ABC News that the company's online customer database had been stolen.

He also told ABC News that customers were not informed that their credit card details would be retained by the company and stored in a database. 

The Payment Card Industry compact to protect cardholders and their banks known as PCI DSS sets basic rules for accepting, storing and handling credit card details. These included keeping the credit card numbers for only as long as is necessary, usually just the time it takes to complete the transaction, and encrypting data as it is transmitted and when it is at rest.

Many online stores use merchant gateways or an intermediary such as PayPal and never see the cardholders' details.

It was unclear if Lush was in breach of its online merchant agreement and would face sanction from its issuing financial institution.

click to view full size image

"Lush is working with the police, forensic investigators and banks and doing all that we can to investigate the breach of privacy," it said.

"We are currently in the process of contacting each of our online customers individually by email."

Lush said it was in the process of carrying out "further security checks" in a bid to determine the extent of the breach.

However, it denied the hack was linked to an attack on the retailer's UK website in late January, other than to say that its site had also been targeted by hackers.

- additional reporting by Nate Cochrane

Copyright © . All rights reserved.

Lush A/NZ credit card details pilfered by "hackers"
Top Stories
Rio Tinto's big data play delivers promised ore
Returns trickle in from long-term technology investment.
Time management tips for CIOs
[Blog post] How to get to the genba.
Making a case for collaboration
[Blog post] Tap into your company’s people power.
Sign up to receive iTnews email bulletins
Latest Comments
Which is the most prevalent cyber attack method your organisation faces?

   |   View results
Phishing and social engineering
Advanced persistent threats
Unpatched or unsupported software vulnerabilities
Denial of service attacks
Insider threats