Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Bed Bath & Beyond Blames Password Reuse for Hacked Accounts

Retail giant Bed Bath & Beyond revealed in a recent filing with the U.S. Securities and Exchange Commission (SEC) that some online customer accounts were accessed by a third party.

Retail giant Bed Bath & Beyond revealed in a recent filing with the U.S. Securities and Exchange Commission (SEC) that some online customer accounts were accessed by a third party.

“Bed Bath & Beyond Inc.discovered that a third party acquired e-mail and password information from a source outside of theCompany’s systems which was used to access less than 1% of the Company’s online customer accounts,” the company said.

While there has been a lot of speculation regarding the incident, Bed Bath & Beyond told SecurityWeek that its investigation determined that the abused usernames and passwords were likely acquired as a result of a breach at a different company and the attackers relied on the fact that many users set the same password for multiple accounts.

The company’s representatives said they could not provide an exact number of affected accounts, but they confirmed that the incident impacted less than 1% of online customer accounts.

Bed Bath & Beyond has started notifying impacted customers on October 29. The retailer said no payment cards were compromised as a result of the incident.

The company has hired a security forensics firm to investigate the incident and claims to have implemented mitigation measures.

“Due to the limited nature of the security incident and the Company’s cyber incident insurance coverage, the Company does not expect this security incident to have a material adverse effect on its results of operations, cash flows or financial condition for any fiscal period,” Bed Bath & Beyond said in the SEC filing.

Earlier this year, Bed Bath & Beyond informed some customers that their payment card information may have been illegally obtained by one of its call center employees in charge of processing orders over the phone.

Advertisement. Scroll to continue reading.

Related: Ticketmaster Blames Third Party Over Data Breach

Related: Cybercriminals Target Amazon Third-Party Sellers With Password Reuse Attacks

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.