Security

Cyber-crime

Thieves steal 35.5M customers’ data from Vans sneakers maker

But what kind of info was actually compromised? None of your business


VF Corporation, parent company of clothes and footwear brands including Vans and North Face, says 35.5 million customers were impacted in some way when criminals broke into their systems in December.

The announcement was made in a Thursday 8-K/A filing with the Securities and Exchange Commission (SEC), and we're only left to speculate about what kind of information the attackers may have scrambled away with.

The parent company of fashion labels, which also include Supreme, Timberland, and Dickies did, however, confirm the type of data that couldn't have been accessed.

VF Corp said that customers' social security numbers (SSNs), bank account information, and payment card information remain uncompromised as these are not stored in its IT systems.

There's also no evidence to suggest that consumer passwords were accessed, it confirmed, although it did caveat this with "the investigation remains ongoing".

If you want to really look between the lines of the document's wording, you'll see that VF Corp explicitly said SSNs, financial information, and passwords – all excluded from potential compromise – were all explicitly defined as being consumer-related specifically.

The same goes for the number of individuals affected – 35.5 million "individual consumers" had their personal information stolen.

Neither its original breach disclosure filing nor this week's update mentioned compromised data related to staff, business partners, or other stakeholders. The Register requested a statement from VF Corp but had not received a response by the time of publishing.

As for the operational disruption the attack caused, VF Corp said IT systems have been "substantially restored" and its businesses are now operating with minimal disruption.

When the attack was first disclosed, the clothes seller said its ability to fulfill orders was affected, but online and retail stores were still up and running as normal.

This week's filing said the company's ability to replenish retail stores' inventory was affected and combined with the fulfillment issues. This led to customer order cancellations and reduced demand across some of its brands' e-commerce sites.

"Since the filing of the original report, while VF is still experiencing minor residual impacts from the cyber incident, VF has resumed retail store inventory replenishment and product order fulfillment, and is caught up on fulfilling orders that were delayed as a result of the cyber incident," the filing reads. 

"Since the filing of the original report, VF has substantially restored the IT systems and data that were impacted by the cyber incident, but continues to work through minor operational impacts."

The attack on VF Corp is suspected to have involved ransomware. The filings mention parts of its IT systems being encrypted, and the AlphV/BlackCat gang claimed the attack days after its disclosure, but the company has not confirmed this to be the case.

That being said, it wouldn't be the first ransomware victim to carefully massage the wording of its disclosures so as to avoid the dreaded R word.

The practice is commonplace in the industry and reached its peak last year when Minneapolis Public Schools notoriously referred to its attack, later claimed by the Medusa ransomware gang, as an "encryption event." ®

Send us news
8 Comments

Like whitebox servers, rent-a-crew crime 'affiliates' have commoditized ransomware

Which is why taking down chiefs and infra behind big name brand operations isn't working

Medusa ransomware affiliate tried triple extortion scam – up from the usual double demand

Feds warn gang still rampant and now cracked 300+ victims around the world

Up to $75M needed to fix up rural hospital cybersecurity as ransomware gangs keep scratching at the door

Attacks strike, facilities go bust, patients die. But it's preventable

Qilin ransomware gang boasts of cyberattacks on cancer clinic, Ob-Gyn facility

'No regrets' crew continues extorting victims, leaking highly sensitive data

The NHS security culture problem is a crisis years in the making

Insiders say board members must be held accountable and drive positive change from the top down

Ransomware criminals love CISA's KEV list – and that's a bug, not a feature

1 in 3 entries are used to extort civilians, says new paper

Uncle Sam charges alleged Garantex admins after crypto-exchange web seizures

$96B in transactions, some even labeled 'dirty funds,' since 2019, say prosecutors

Toronto Zoo ransomware crooks snatch decades of visitor data

Akira really wasn't horsing around with this one

Cybercrims now licking stamps and sending extortion demands in snail mail

First crooks gave up encrypting data, and just stole it – now they don't even bother pilfering info. Sheesh!

DeepSeek can be gently persuaded to spit out malware code

It might need polishing, but a useful find for any budding cybercrooks out there

Rhysida pwns two US healthcare orgs, extracts over 300K patients' data

Terabytes of sensitive info remain available for download

Microsoft signed a dodgy driver and now ransomware scum are exploiting it

Five flaws found in Paragon Partition Manager's kernel-level .sys