Euro Security Watch with Mathew J. Schwartz

Breach Notification , Incident & Breach Response , Managed Detection & Response (MDR)

Customers Question Breach Alert Etiquette at Blowout Cards

Why Hasn't Card-Trading Site Alerted Customers to Fraud via Social Media?
Customers Question Breach Alert Etiquette at Blowout Cards
A data breach warning to customers of Blowout Cards was initially issued only via the site's forums, labeled as an "important message."

Update — April 25, 2017: After this piece first appeared April 24, Blowout Cards posted a more detailed security alert to its website, which it also emailed to customers who had been potentially affected by the breach (see Blowout Cards Issues Card-Skimming Breach Alert).

See Also: 5 Requirements for Modern DLP

Free advice for breached businesses: Once you admit that you've suffered a data breach or that you're investigating whether you were breached, disseminate that message far and wide, including via all social media. That way, no one can accuse you of trying to cover it up.

Consider that many police departments now issue statements or updates on investigations not only via their websites, but also Facebook and Twitter. Simply put, those are great ways to get the message out.

And at a minimum, that's what all other organizations should be doing as well, especially when it comes to warning customers or users that they may have been the victim of a data breach or other security-related incident.

Likewise, here's what not to do: Issue a breach notification only via your own forums, while failing to get the word out via social media or email to anyone who may not have logged onto your site in the past day, week, month or year.

That is what seems to be happening with Blowout Cards, a site devoted to the buying, selling and trading of sports cards and trading cards that's owned by Frontline Collectibles Inc. in Sterling, Virginia.

Breach Alert Timeline

Reports of a potential breach at the site - dating from at least January - first surfaced on April 19 via the Blowout Cards forum post with the subject line of "credit card problems." As of April 24, however, the company had yet to issue any alerts via social media or to directly notify potential victims.

"Not sure where to put this, but I ordered something from Blowout in January. Used a credit card that I rarely use - only other place I use is NYTimes subscription," wrote "ForceChange77" in an April 19 post. "Somebody got the card number and started charging all kinds of fraudulent charges. Has there been a problem recently?"

On April 20, a site administrator responded that the organization had been alerted to a security breach - it didn't say by who - and that it was investigating.

On April 21, an "Important Message - Attention Customers" alert was posted to the front page of Blowout Cards site, leading to a security notice posted in the thread started by ForceChange77.

Security Alert

"Recently we were alerted to a potential security breach on our website. After researching this issue, our internet security team detected and patched an exploit that allowed unauthorized access to customers' card information when checking out on," that security alert reads.

"We are currently in contact with several leading third-party security firms to determine the cause of the breach and assure you that we are working with leading experts to harden our security to prevent any future incidents. Although the immediate issue has been resolved, our investigation into this matter is ongoing and we will communicate additional information to you as it becomes available to us," it adds.

Multiple other customers also reported via the forum post that they too seemed to have experienced card fraud tied to the site.

One customer emailed me directly, noting that his debit card was also hit with suspicious charges. He believes the fraud traces back to the Blowout Cards site.

"My debit card was hit with charges," he says. "I quickly cancelled the card and waiting on reimbursement from my bank, which I am sure won't be a problem."

Under U.S. consumer protection law, credit card users are protected if their card gets used fraudulently, provided they notify the card issuer in a timely manner. Debit card users, however, have no such protections, which is why many identity theft experts recommend never using debit cards for online purchases. That said, many banks will refund charges tied to debit card fraud.

Fraud-loss coverage aside, the customer also questions why Blowout Cards had only posted a warning to its forums - even though fraud appears to be ongoing - rather than getting the message out via social media channels.

"Blowoutcards/Frontline collectibles seems like they are trying to hide the information," he says, noting that he rarely looks at the forum articles, because they typically involved just advertisements for sales. "They have the ability to post a message on Twitter/Facebook account which would notify 10-20X as many customers that have been affected. I am sure less than 25 percent of customers affected don't use the company's web forum which is the only place they have the small notice/warning."

Blowout Cards Promises Direct Notifications

I asked Blowout Cards when its breach apparently began, how many users were affected, whether it plans to offer identity theft monitoring services to victims and why it hadn't issued any alerts via social media or other channels.

Thomas Fish, president of Blowout Cards, responded by saying that more details will be forthcoming by April 25.

"At this time, any statement(s) have been posted on the forum where we first became aware of a potential issue. We will be making a more detailed announcement within the next 24 hours," he told me on April 24. "We will be contacting all potentially affected users via email at that time as well."

About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.