SelectBlinds says 200,000 customers impacted after hackers embed malware on site

Avatar

More than 200,000 who shopped for blinds or window dressing this year had their credit card information and other data stolen after hackers placed malware on a major retailer’s website.

In breach notification documents filed this week in California and Maine, SelectBlinds said employees discovered the malware on September 28 and realized the malware had been on the company website since at least January 7.

“An unauthorized third party embedded malware on the SelectBlinds website that allowed data scraping on logins on the check-out page,” the company said. “Through our investigation, we learned that your www.selectblinds.com username and password was affected if you logged in to the check-out page only on the SelectBlinds website while making or considering a purchase.”

In addition to login information, the company learned that hackers likely obtained names, emails, shipping and billing addresses, phone numbers and payment card numbers alongside expiration dates and security/CVV codes. 

User accounts have been locked in an effort to force people to change their passwords and SelectBlinds said it has removed the malware. 

The online retailer warned that anyone who reused the same login information on other sites should immediately change their passwords.

Hackers have long embedded malware known as e-skimmers into websites where people purchase things, siphoning millions of credit card numbers and more.

In most attacks, hackers compromise vulnerable websites by injecting malicious code, often JavaScript, into checkout pages or other parts of the site where payment information is entered. 

This code is designed to capture sensitive data such as credit card numbers, CVV codes and personal information entered by users during the checkout process. That information is then often packaged and sold to “carding” operations that use it for fraud.

Recorded Future said in a report last month that hackers posted 15 million card records for sale on dark web carding shops. The Record is an editorially independent unit of Recorded Future.

In April, Russian officials took the rare step of publicly charging six people suspected of stealing the details of 160,000 credit cards as well as payment information from foreign online stores.

Europol joined law enforcement agencies from 17 countries in warning 443 online sellers last year that the payment card data of their customers had been compromised.

CybercrimeNewsNews BriefsPrivacy
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Outages impact Washington state courts after ‘unauthorized activity’ detected on network

Next Post

North Korea allegedly targeting crypto businesses with Mac-focused malware

Related Posts

Earth Kurma Targets Southeast Asia With Rootkits and Cloud-Based Data Theft Tools

Government and telecommunications sectors in Southeast Asia have become the target of a "sophisticated" campaign undertaken by a new advanced persistent threat (APT) group called Earth Kurma since June 2024. The attacks, per Trend Micro, have leveraged custom malware, rootkits, and cloud storage services for data exfiltration. The Philippines, Vietnam, Thailand, and Malaysia are among the
Avatar
Read More

Mozilla Patches Critical Firefox Bug Similar to Chrome’s Recent Zero-Day Vulnerability

Mozilla has released updates to address a critical security flaw impacting its Firefox browser for Windows, merely days after Google patched a similar flaw in Chrome that came under active exploitation as a zero-day. The security vulnerability, CVE-2025-2857, has been described as a case of an incorrect handle that could lead to a sandbox escape. "Following the recent Chrome sandbox escape (
Avatar
Read More

Your Risk Scores Are Lying: Adversarial Exposure Validation Exposes Real Threats

In cybersecurity, confidence is a double-edged sword. Organizations often operate under a false sense of security, believing that patched vulnerabilities, up-to-date tools, polished dashboards, and glowing risk scores guarantee safety. The reality is a bit of a different story. In the real world, checking the right boxes doesn’t equal being secure. As Sun Tzu warned, “Strategy without tactics is
Avatar
Read More