The Green Bay Packers warned customers of the team’s online store that hackers inserted malicious code that allowed them to steal payment information.
In breach notification letters sent out on Monday, the NFL team said it was notified on October 23 of an intrusion into the Green Bay Packers Pro Shop website.
The team shut down the payment and checkout functions on the site and began an investigation, hiring an outside cybersecurity firm to see if customer information was stolen.
“Based on the results of the forensic investigation, on December 20, 2024 we discovered that the malicious code may have allowed an unauthorized third party to view or acquire certain customer information entered at the checkout that used a limited set of payment options on the Pro Shop website between September 23-24, 2024 and October 3-23, 2024,” the team said.
The team told regulators in Maine that 8,514 people were impacted by the breach and that it notified other states including Texas, Vermont, Massachusetts and more.
The hackers acquired the data entered by customers on checkout pages, including names, billing and shipping addresses, credit card numbers, expiration dates, verification numbers and credit card types.
Those who used gift cards, Paypal or Amazon Pay were not impacted by the malicious code.
The code has since been removed from the checkout page and anyone with an account on the site has had to change their password.
Victims are being given three years of credit monitoring and identity theft protection services through Experian.
“Our IT team, in conjunction with outside cybersecurity experts and the vendor that hosts the Pro Shop website, worked to successfully contain and remediate the security incident,” the team explained, noting that they have taken several other steps to resolve cybersecurity issues.
The team did not respond to requests for comment about whether the hackers identified themselves.
In a statement to the Green Bay Press Gazette on Tuesday, the team said no other platforms were affected by the breach.
BleepingComputer first reported the breach notification letters on Monday and noted that Dutch cybersecurity firm Sansec was the company that warned the Green Bay Packers about the malicious code on its site.
Sansec is one of the leading companies tracking such attacks, also known as e-skimming..
The company published a blog on December 31 showing the malicious code that was inserted into the Green Bay Packers website.
Payment-skimming malware infections have been a tried and true method for cybercriminals to earn money for years. In skimming attacks, hackers embed tools or malware onto e-commerce sites that allow them to siphon credit card information from online stores during the checkout process. The tactic has long been a problem for popular internet sellers.
In July 2024 alone, Recorded Future found 3,799 e-commerce domains suffered an e-skimmer infection. The Record is an editorially independent unit of Recorded Future.
Recorded Future
Intelligence Cloud.
No previous article
No new articles
Jonathan Greig
is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.