FTC Hits CafePress for Data Breach Cover Up
March 23, 2022
Commission orders e-commerce platform to bolster data security
and provide redress to small businesses
The
Federal Trade Commission took action against online customized
merchandise platform CafePress over allegations that it failed
to secure consumers’ sensitive personal data and covered up a
major breach. The FTC alleges that CafePress failed to implement
reasonable security measures to protect sensitive information
stored on its network, including plain text Social Security
numbers, inadequately encrypted passwords, and answers to
password reset questions. The Commission’s proposed order
requires the company to bolster its data security and requires
its former owner to pay a half million dollars to compensate
small businesses.
“CafePress employed careless security practices and concealed
multiple breaches from consumers,” said Samuel Levine, Director
of the FTC’s Bureau of Consumer Protection. “These orders dial
up accountability for lax security practices, requiring redress
for small businesses that were harmed, and specific controls,
like multi-factor authentication, to better safeguard personal
information.”
In a complaint filed against Residual Pumpkin Entity, LLC, the
former owner of CafePress, and PlanetArt, LLC, which bought
CafePress in 2020, the FTC alleged that CafePress failed to
implement reasonable security measures to protect the sensitive
information of buyers and sellers stored on its network. In
addition to storing Social Security numbers and password reset
answers in clear, readable text, CafePress retained the data
longer than was necessary. The company also failed to apply
readily available protections against well-known threats and
adequately respond to security incidents, the complaint alleged.
As a result of its shoddy security practices, CafePress’ network
was breached multiple times.
According to the complaint, a hacker exploited the company’s
security failures in February 2019 to access millions of email
addresses and passwords with weak encryption; millions of
unencrypted names, physical addresses, and security questions
and answers; more than 180,000 unencrypted Social Security
numbers; and tens of thousands of partial payment card numbers
and expiration dates. Some of the information was later found
for sale on the Dark Web.
After being notified a month later that it had a security
vulnerability and that hackers had obtained consumer data,
CafePress patched the vulnerability but failed to properly
investigate the breach for several months despite additional
warnings, the complaint alleged. This included a warning in
April 2019 from a foreign government, which notified the company
that a hacker had illegally obtained CafePress customer account
information and urged the company to notify affected customers.
The company, however, withheld this essential information, and
instead only told customers to reset their passwords as part of
an update to its password policy.
The complaint alleges CafePress did not inform affected
customers until September 2019—one month after the breach was
reported widely. The company’s lax security practices, however,
still left many consumers at risk. For example, the company
continued to allow people to reset their passwords on the
website by answering security questions associated with customer
email addresses—the same information that had been previously
stolen by hackers.
According to the complaint, CafePress was aware of problems with
its data security prior to the 2019 data breach. Through at
least January 2018, when CafePress determined that certain
accounts of shopkeepers had been hacked, CafePress closed the
accounts and charged the victims a $25 account closure fee. The
company also experienced several malware infections to its
network prior to the 2019 hack but failed to investigate the
source of such attacks.
In addition to its security failures, the FTC alleged the
company misled users by using consumer email addresses for
marketing despite its promises that such information would only
be used to fulfill orders consumers had placed.
As
part of the proposed settlement, Residual Pumpkin and PlanetArt
will be required to implement comprehensive information security
programs that will address the problems that led to the data
breaches at CafePress. This includes replacing inadequate
authentication measures such as security questions with
multi-factor authentication methods; minimizing the amount of
data they collect and retain; and encrypting Social Security
numbers.
In addition, the proposed settlement requires Residual Pumpkin
to pay $500,000 in redress to victims of the data breaches.
PlanetArt will be required to notify consumers whose personal
information was accessed as a result of CafePress’s data
breaches and provide specific information about how consumers
can protect themselves. Both companies will be required to have
a third party assess their information security programs and
provide the Commission with a redacted copy of that assessment
suitable for public disclosure.
The Commission voted 4-0 to issue the proposed administrative
complaint and to accept the consent agreement with the
companies.