• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.702 ■ Fall 2020 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Credential Staffing Attack on The North Face

November 17, 2020 by Vraj Patel Leave a Comment

The North Face has reset all of their users passwords from their website after an attacker lunched a credential staffing attack. On Oct 9th the company has notified their customers regarding the unusual activity on their website.

Credential attack is accomplished by using a credential that were being compromised in the other data breaches and using those credentials to log in to other websites. Accordingly to the article, attacker were able to access to information saved within the account which of the account they were able to access it. The information they could have access is the billing address, shipping address, first and last name, email address, birthday, and phone number. Company does not hold any of the payment information on the portal which the customer has access to which means the attacker was not able to access the payment information such as debit/credit card number, CVV, or the expiration date.

 

References:

O’Donnell, L. 2020. Credential-Stuffing Attack Hits The North Face. Retrieved from: https://threatpost.com/credential-stuffing-attack-north-face/161190/

Filed Under: Week 11: Intro to Dark Web and Intro to Cloud Tagged With:

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (46)
  • Week 01: Overview (3)
  • Week 02: TCP/IP and Network Architecture (6)
  • Week 03: Reconnaisance (5)
  • Week 04: Network Mapping and Vulnerability Scanning (11)
  • Week 05: Metasploit (10)
  • Week 06: More Metasploit (4)
  • Week 07: Social Engineering (7)
  • Week 08: Malware (6)
  • Week 09: Web Application Hacking (7)
  • Week 10: SecuritySheperd (6)
  • Week 11: Intro to Dark Web and Intro to Cloud (4)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (7)
  • Week 13: WPA2 Enterprise and Beyond WiFi (3)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in