Asda website leaves customer details vulnerable for 677 days

Asda, the second largest supermarket in the UK by market share, reportedly failed to patch a vulnerability in its online grocery store that exposed customers’ personal information and payment details for nearly two years. Information security consultant Paul Moore estimates that over 19 million transactions were potentially at risk in that period.

In March 2014, Mr Moore contacted Asda “to report several security vulnerabilities” that he’d discovered in its website, but nothing was done to fix them. After 677 days, he says, his patience ran out, so he blogged about it, explaining his proof of concept in a handy video: “all that’s required for this exploit to be successful is for you to be signed in and browsing the web. If, at the end of your shop, you search for a voucher or discount code and that website contains the same malicious payload, you could potentially lose your card details.”

Walmart subsidiary Asda fixed the vulnerability shortly after Mr Moore published his blog on Monday, telling the BBC: “Asda and Walmart take the security of our websites very seriously. We are aware of the issue and have implemented changes to improve the security on our website.”

Patch management

The exploitation of known vulnerabilities is one of the easiest methods by which cyber criminals can hack websites, so the importance of maintaining up-to-date software is paramount for all organisations that value their information security. If you continue to use unsupported or vulnerable versions, then your website runs a significantly higher risk of compromise.

Penetration testing

If you’re unsure about your patch management practices and are concerned about your organisation’s susceptibility to online attack, you’ll be interested in IT Governance’s penetration testing packages. Designed to identify vulnerabilities and provide remedial measures that you can take to secure your systems, they provide a complete solution for the routine security testing of your websites and IT systems to ensure that your networks and applications remain secure against cyber attacks.

Share now…

Share on Twitter Share on Facebook Share on LinkedIn