• Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
Tutorial News Comments FAQ Related Articles

Tommy Hilfiger's ElasticSearch Database Exposed With its Customers' Personal Information

{{postValue.id}}

A misconfigured ElasticSearch database of Tommy Hilfiger, Japan has been found to have exposed the personal information of hundreds of thousands of customers.

The leaky database was discovered by Noam Rotem, and Ran Locar, security researchers from Safety Detective and they have stated this issue to be ‘minimal manipulation’ that could allow attackers to gain access to customer data.The leaky database contained personal information such as names, addresses, phone numbers, email addresses, and dates of birth of Tommy Hilfiger.

Apart from personal information, it also had certain transaction information which included the membership ID numbers, orders made, dates of purchase, product descriptions, prices, SKUs and details on millions of orders.However, no payment card details or financial information was present in the database.

When the two researchers found out about the leaky database, they contacted Tommy Hilfiger to notify them about the unprotected database.The representatives then escalated the issue to its parent company PVH Corp. A representative for PVH Corp revealed that the issue stemmed from a third-party operator that manages the Tommy Hilfiger Japan website.

Upon learning the incident, the company immediately worked to address the issue and quickly resolved the issue.The company had also urged its customers to be wary of the culprits who could impersonate Tommy Hilfiger and try to contact the people whose details they obtained from the leaky database, as they could as for financial details.

Tags:
caden
Author: 

Comments ( 0 )

No comments available

Add a comment
{{postCtrl.cmtErrMsg}}

Frequently asked questions ( 0 )

No questions available

Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Ganesh Konka ?
Zentya 6.1 http proxy configuration

please send link for creating zentyal 6.1 for http proxy and firewall as gateway.

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.