Security

Cyber-crime

Fiend touts stolen Neiman Marcus customer info for $150K

Flash clobber chain fashionably late to Snowflake fiasco party


Customer information said to have been stolen from Neiman Marcus's Snowflake instance has been put up for sale on the dark web for $150,000.

That would make the fancy department store chain the latest outfit to have had its data swiped from its cloud-based Snowflake storage and peddled on an underworld forum.

Between April and May, an intruder accessed 64,472 shoppers' names, contact information, dates of birth, and Neiman Marcus or Bergdorf Goodman gift card number(s) — but not the gift card PINs — according to a privacy breach notification submitted to the Maine Attorney General in the US by the luxury retailer.

In that disclosure, the swish garb slinger blamed the theft on an "unauthorized third party" breaking into "a database platform used by Neiman Marcus Group."

A Neiman Marcus spokesperson declined to answer whether it had turned on multi-factor authentication (MFA) for that database – an oversight common among victims of recent raids on Snowflake cloud accounts – though did confirm to El Reg that the unnamed platform was indeed Snowflake. The rep told us:

Neiman Marcus Group (NMG) recently learned that an unauthorized party gained access to a cloud database platform used by NMG that is provided by a third party, Snowflake. Promptly after discovering the incident, NMG took steps to contain it, including by disabling access to the platform. We also began an investigation with assistance from leading cybersecurity experts and notified law enforcement authorities. Based on our investigation, the unauthorized party obtained certain personal information stored in the platform. 

The Snowflake database did not include customers' credit card information, we're told. Upon discovering the cloud security breach, the high-end chain disabled access to the storage service and hired "leading cybersecurity experts" to assist with the investigation. It also tipped off law enforcement. 

"We will continue to enhance our safeguards for protecting personal information," a letter [PDF] sent to customers by NMG about the privacy snafu added.

Meanwhile, someone who goes by the handle Sp1d3r has touted online what they claim to be "millions of customers" transactions and other details pilfered from Neiman Marcus, and is attempting to trade it all for $150,000.

According to Sp1d3r's dark-web souk listing, the stolen data includes names, addresses, phone numbers, the last four digits of customers' Social Security numbers, plus 50 million customer email addresses with IP addresses, 12 million gift card numbers, and "6 billion rows of customer shopping records, employee data, store information." Presumably that was lifted from NMG's Snowflake account.

We should note that Sp1d3r's inventory of stolen data has not been verified; it may be a wild exaggeration.

While it may be the latest, Neiman Marcus is likely not the last of the Snowflake victims. At least 165 organizations have had their internal data exfiltrated from their Snowflake cloud storage accounts by miscreants using what's understood to be stolen customer credentials – a theft MFA may have been able to thwart.

Gradually these orgs have been disclosing the security breaches as this purloined information is put up for sale on cyber-crime forums.

While Ticketmaster and Spanish bank Santander were among the first to go public, other big names including Pure Storage, Advance Auto Parts, and Australian ticketing provider Ticketek have since emerged as victims.

According to Google's Mandiant, which has been investigating the intrusions, none of the victims had turned on MFA. Doh. ®

Send us news
3 Comments

Alleged Karakut ransomware scumbag charged in US

Plus: Microsoft issues workaround for dual-boot crashes; ARRL cops to ransom payment, and more

Volt Typhoon suspected of exploiting Versa SD-WAN bug since June

The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructure

Iran's Pioneer Kitten hits US networks via buggy Check Point, Palo Alto gear

The government-backed crew also enjoys ransomware as a side hustle

Transport for London confirms cyberattack, assures us all is well

Government body claims there is no evidence of customer data being compromised

Planned Parenthood confirms cyber-attack as RansomHub threatens to leak data

93GB of info feared pilfered in Montana by heartless crooks

Cicada ransomware may be a BlackCat/ALPHV rebrand and upgrade

Researchers find many similarities, and nasty new customizations such as embedded compromised user credentials

White House seizes 32 domains, issues criminal charges in massive election-meddling crackdown

Russia has seemingly decided who it wants Putin the Oval Office

North Korean scammers plan wave of stealth attacks on crypto companies, FBI warns

Feds warn of 'highly tailored, difficult-to-detect social engineering campaigns'

Novel attack on Windows spotted in phishing campaign run from and targeting China

Resources hosted at Tencent Cloud involved in Cobalt Strike campaign

Iran hunts down double agents with fake recruiting sites, Mandiant reckons

Farsi-language posts target possibly-pro-Israel individuals

Feds claim sinister sysadmin locked up thousands of Windows workstations, demanded ransom

Sordid search history 'evidence' in case that could see him spend 35 years for extortion and wire fraud

Seattle airport 'possible cyberattack' snarls travel yet again

No word yet on if ransomware is to blame