Endpoint Protector Appliance: Stop data theft on Windows and Mac

Mozilla closes shop due to vendor security breach

August 25th, 2009 by Agent Smith (2) In the News,security breach

The Mozilla Foundation takes security breaches very seriously. It immediately closed its online stores after finding out a third-party company that runs one of the sites’ back-end operations had suffered a breach.

The security issues affected GatewayCDI, an SMB with offices in three US cities, which runs the Mozilla Store, the foundation said in a blog post quoted by the Register. There is still no information to confirm whether any customers of the website selling coffee cups, tee-shirts, and other Mozilla promotional goods have been compromised.

“Once notified, we took the immediate preventative step of shutting down the Mozilla Store to ensure that no additional users could be compromised,” Mozilla representatives wrote. “Mozilla immediately reached out to GatewayCDI and encouraged them to quickly inform individuals whose data had been compromised.”

Mozilla also stated they were undergoing a thorough analysis of their systems to determine the cause and extent of the breach. Additionally, GatewayCDI  will make sure to contact directly any Mozilla Store customers who may have been affected by this blurry breach.

According to the same Register article, Mozilla also closed down its International Mozilla Store, although it wasn’t run by GatewayCDI. Both stores displayed a message saying “closed for maintenance.”

2 Responses to “Mozilla closes shop due to vendor security breach”

  1. Frank McLaughlin Says:

    How will we know when the store reopens?
    I’m desperate for a the lap the bag.

  2. Agent Smith Says:

    Hi Frank,

    I have no idea, the store page says nothing, other than the fact that they’re closed for maintenance. But the international store seems to be working fine. I suggest you drop them an email using the email listed here http://store.mozilla.org/ I am sure they can at least let you know when they open shop again :)

Leave a Reply