Court Rules SilverPop Not Liable for Damages After Data Breach

Back in 2010 and 2011, I posted a number of blog entries about a breach at SilverPop. SilverPop was not particularly transparent/forthcoming about the scope of the breach, but it seemed to be pretty large. Today, Ryan M. Martin of Winston & Strawn LLP writes: A Georgia court recently agreed on a summary judgment motion that a digital marketing contractor was not monetarily responsible for an unauthorized intrusion into its computer network. In the case, Silverpop Systems, Inc., the digital marketing contractor, entered into a service agreement with Leading Marketing Technologies, Inc. (Leading Marketing) that permitted Leading Marketing to upload content to Silverpop’s web-based e-mail marketing tool so Silverpop could send out messages on Leading Marketing’s behalf. (Silverpop Sys., Inc. v. Leading Mkt. Techs., Inc., No. 12:-cv-02513-SCJ (N.D. Ga. Feb. 18, 2014). In November of 2010, Silverpop’s web-based system was hacked, potentially affecting the security of the nearly 500,000 e-mail addresses Leading Marketing had uploaded to the system. After an investigation, Silverpop could not confirm whether any information was exported from its system. Silverpop informed Leading Marketing of the incident. Leading Marketing continued to use the services for several months while withholding payments to Silverpop. Silverpop filed a declaratory action seeking payment. Leading Marketing counterclaimed, arguing that it was justified in withholding payment since Silverpop had failed to keep the addresses secure. Leading Marketing presented a variety of legal claims in support of its argument, including negligence. In finding for the vendor, the court found that Leading Marketing had failed to present evidence regarding the applicable standard of care regarding data breaches in its industry. Read more on Winston & Strawn. Leading Market Technologies was not one of the affected SilverPop customers that we knew about back in 2010 and 2011, but if they had uploaded 500,000 customers’ email addresses to SilverPop, I wonder how large that SilverPop breach really was.

Stolen SilverPop laptop results in notifications

The name “SilverPop” may not seem familiar to some readers of this blog, but if you also read DataBreaches.net, you’ll recognize it as the name of an e-mail marketing service that got hacked a while back.  As a consequence, a number of its clients wound up having to notify their customers that their email addresses had been acquired by hackers.  It seems that wasn’t all of SilverPop’s problems, however, as  HHS’s breach tool shows that they reported that a Health & Welfare Plan laptop stolen on April 15th held PHI on 884 individuals.

Play.com users newest victims of SilverPop breach

Anh Nguyen provides an update on a breach reported on PogoWasRight.org  yesterday. At the time, I had raised the possibility that the breach might be linked to a previously known breach involving SilverPop. It turns out that was the explanation: Play.com has emailed its customers again to shed more light on the security breach it revealed two days ago. The online retailer’s CEO, John Perkins, said that the company was alerted to a security breach when some customers reported receiving spam email to addresses they only use for Play.com. In an initial email alert to customers, Play.com said that a security breach at a third-party company that handles its marketing communications had had a security breach, which meant that “some customer names and email addresses may have been compromised.” However, not all Play.com customers have received an email security alert, which suggests that those who did are the ones that have been compromised. The company has now revealed that the third-party company is email service provider Silverpop, which has been managing Play.com’s email marketing since 2008. Read more on Computerworld. Now to find out if ProFlowers.com customers have also become victims of that breach, as I’ve received several emails indicating that their customer email database has also been compromised.   In light of all of the recent breaches involving email lists, it really would be helpful for SilverPop to issue a list of clients whose data were compromised. I doubt if they’ll do that, of course, but it would sure be helpful keeping all of these breaches straight. [last line corrected to complete it.]

Silverpop’s response to media coverage of breaches

In response to recent news coverage indicating that breaches affecting McDonald’s, DeviantART customers (and possibly Walgreens customers?) were due to a breach at Silverpop, their CEO Bill Nussey responds on Silverpop’s blog: The forensic investigation into the cyber attack on our company and customers has yielded some valuable insights. First, we have confirmed that our quick reaction to reset customer passwords was successful in halting the attack. Second, the specialized monitoring systems run by our outside experts continue to confirm that our existing and enhanced security measures are successfully protecting our application and our customers. Third, we are confident that our application infrastructure, the servers and networks behind our products, was not targeted or compromised as part of this attack. Fourth, third-party experts have confirmed that the attack was particularly sophisticated and we are working with customers and industry peers to share what we have learned. In parallel to our customer and security-focused efforts, we continue to work with law enforcement to identify the criminals that have targeted us and several other companies in our industry. Stephen Emmett, one of the FBI special agents we have been communicating with, allowed me to share the following: “We have been and continue to work with Silverpop and others in the industry who have had criminals attempt to breach their systems and security safeguards. We are focused on identifying those that committed these cybercrimes and bringing them to justice.” The media has recently been covering the security disclosures of several large brands. It is important to clarify that several of these large brands have never been Silverpop customers. I’m hopeful it is clear that the disclosed attacks cover multiple companies in our space and we, as an industry, need to work together to protect the security of all of our customers. For the time being, our efforts will remain focused on the security of our applications and customer data, working with law enforcement and communicating with our customers, especially the small percentage who were negatively impacted by these attacks. Rather than saying that “several of these large brands have never been Silverpop customers,” it would be better to just be clear which ones are not their customers, as they owe them no duty of confidentiality if they are not customers. That way, the media can get the story right.

Survey: 18% of Health Employees Would Sell Confidential Data

Those who said they were willing to sell the data would do so for as little as between $500 and $1,000. Alexandra Wilson Pecci reports: Patients trust their healthcare providers to keep their data safe, but according to a new survey, that trust might sometimes be misplaced. The Accenture survey found that nearly one in five health employees (18%) said they would be willing to sell confidential data to unauthorized parties. In fact, the respondents who said they were willing to sell the data would do so for as little as between $500 and $1,000. Read more on HealthLeaders Media. h/t, Matt Fisher 

Confidentiality language may not throw you into the breach!

Lisa A. Carroll, Martin B. Robins, David G. Kern and James M. Fisher II of Fisher Broyles write: A recent 11th Circuit case may – if followed elsewhere and not reversed by the US Supreme Court – reduce a company’s potential exposure under conventional contract language requiring sensitive materials to be held in confidence. Many companies have been concerned that such language would make them liable if they were the victim of a third-party data breach as opposed to an intentional disclosure by one of their employees or contractors. […] In Silverpop v. Leading Market Technologies, 2016 U.S. App. LEXIS 196, the US Court of Appeals for the Eleventh Circuit held that losses associated with a data breach “are best characterized as consequential” and recovery on a contract claim should be barred when the contract contains a prohibition the award of consequential damages. The Court further found that negligence claims for such data breaches would be barred due to the lack of an applicable standard of care, as well as by the economic loss rule. Thus, absent proof of negligence or specific contractual language that is on-point, a data breach of itself does not constitute a breach of the obligation to take reasonable measures to safeguard confidential material under a confidentiality provision. Read more on Lexology while I go pour some more coffee and try to find someone to translate this into non-legalese for me.

Play.com customers report spam following breach at third-party marketing firm

Network Security Report reports: Play.com, one of the largest online retailers of consumer goods, has suffered a security breach. In a warning to customers, Play.com has said that customer names and email addresses may have been compromised. Play.com is washing its hands of direct responsibility, claiming that a third party on its marketing communications team is at fault. Read more on  Network Security Report. This is not the first time Play.com had a breach that they blamed on a third-party marketing firm. In 2011, they disclosed that spam email addressed to customers was due to a breach at SilverPop. And if this was a breach at an unnamed third-party marketing firm, how many other of the firm’s clients have been been impacted – and how many consumers?

Forbes Breach Email Statistics

Total of 1,056,986 E-mail’s Found are unique. Total of 111,735 E-mail Providers 564  FORBES.COM 844 .GOV 14,572 .EDU Below is a list of all email providers that have 2 or more in the breach. (full list here) Article: https://datalossdb.org gmail.com: [407769] yahoo.com: [181617] hotmail.com: [86667] aol.com: [25032] justafou.com: [20092] asertol1.co.tv: [17472] comcast.net: [11368] live.com: [9842] xamog.com: [7922] msn.com: [7454] ceoll.com: [6940] ymail.com: [6338] sbcglobal.net: [6302] me.com: [5130] yahoo.co.uk: [4199] verizon.net: [4158] att.net: [4009] mac.com: [3439] outlook.com: [3199] rocketmail.com: [2992] cox.net: [2942] mail.ru: [2590] bellsouth.net: [2512] hotmail.co.uk: [2435] yahoo.co.in: [2376] earthlink.net: [2173] googlemail.com: [1766] yahoo.ca: [1649] mail.com: [1564] rediffmail.com: [1525] yahoo.fr: [1458] charter.net: [1272] optonline.net: [1191] yahoo.in: [1132] sharklasers.com: [984] aim.com: [915] 163.com: [904] yahoo.com.br: [868] rogers.com: [863] shaw.ca: [863] hotmail.fr: [826] juno.com: [762] qq.com: [735] btinternet.com: [729] live.co.uk: [699] icloud.com: [651] yahoo.com.au: [604] yandex.ru: [603] forbes.com: [518] GMAIL.COM: [510] roadrunner.com: [491] mindspring.com: [485] live.ca: [454] gmx.com: [450] yahoo.co.id: [441] sympatico.ca: [436] mailinator.com: [436] yahoo.com.sg: [429] bigpond.com: [426] abv.bg: [424] yahoo.es: [414] yahoo.com.ph: [412] pacbell.net: [407] 126.com: [403] hotmail.it: [395] embarqmail.com: [389] netscape.net: [387] frontier.com: [364] windstream.net: [345] excite.com: [337] telus.net: [330] ovi.com: [326] q.com: [321] YAHOO.COM: [318] yahoo.de: [309] tampabay.rr.com: [305] yahoo.it: [303] web.de: [302] oracle.com: [287] hotmail.ca: [286] netzero.net: [282] Gmail.com: [282] gmx.de: [282] yahoo.com.mx: [282] yahoo.com.tw: [279] live.fr: [271] cfl.rr.com: [264] yahoo.gr: [262] prodigy.net: [259] sap.com: [255] libero.it: [253] uol.com.br: [251] rambler.ru: [244] naver.com: [240] swbell.net: [235] mchsi.com: [233] yahoo.com.vn: [227] windowslive.com: [226] netzero.com: [225] ameritech.net: [223] email.com: [216] lycos.com: [211] suddenlink.net: [208] insightbb.com: [208] usa.net: [208] umich.edu: [208] nc.rr.com: [203] cornell.edu: [202] live.com.au: [199] cisco.com: [195] wp.pl: [193] AOL.COM: [191] videotron.ca: [189] us.ibm.com: [188] wi.rr.com: [187] hushmail.com: [187] asfedass.uni.me: [187] cableone.net: [186] frontiernet.net: [183] hp.com: [183] hotmail.es: [182] nyc.rr.com: [182] Yahoo.com: [181] yahoo.co.jp: [180] centurytel.net: [179] redarrow.uni.me: [177] inbox.com: [174] austin.rr.com: [174] optusnet.com.au: [173] centurylink.net: [172] tds.net: [169] ge.com: [168] rcn.com: [165] ukr.net: [164] o2.pl: [162] seznam.cz: [160] microsoft.com: [159] live.in: [158] cs.com: [156] yahoo.cn: [156] yahoo.com.hk: [153] gmx.net: [152] ig.com.br: [152] usa.com: [151] sina.com: [150] bk.ru: [150] xtra.co.nz: [150] Hotmail.com: [147] dell.com: [145] inbox.lv: [144] fuse.net: [144] rochester.rr.com: [144] sky.com: [142] nyu.edu: [142] yahoo.com.ar: [140] yahoo.com.cn: [138] carolina.rr.com: [137] live.nl: [136] HOTMAIL.COM: [136] us.army.mil: [135] wowway.com: [134] ntlworld.com: [133] fastmail.fm: [133] inbox.ru: [132] yeah.net: [131] withum.com: [131] google.com: [131] ix.netcom.com: [129] list.ru: [129] ieee.org: [127] hotmail.de: [126] umn.edu: [125] alum.mit.edu: [124] ptd.net: [121] nycap.rr.com: [121] webmail.co.za: [121] terra.com.br: [121] columbia.edu: [120] pobox.com: [119] adp.com: [119] free.fr: [117] post.harvard.edu: [116] kc.rr.com: [115] tx.rr.com: [115] triad.rr.com: [114] bluewin.ch: [114] columbus.rr.com: [111] accenture.com: [110] bell.net: [110] live.com.mx: [109] iinet.net.au: [108] snet.net: [108] in.com: [108] rmqkr.net: [107] gyro.com: [106] principal.com: [106] optimum.net: [105] satx.rr.com: [105] hughes.net: [104] orange.fr: [104] eircom.net: [103] bol.com.br: [103] bigpond.net.au: [102] cinci.rr.com: [102] live.cn: [101] t-online.de: [100] ca.rr.com: [99] telkomsa.net: [99] wellsfargo.com: [99] yahoo.ie: [98] sify.com: [98] mweb.co.za: [98] stanford.edu: [98] kp.org: [96] san.rr.com: [96] asu.edu: [94] xerox.com: [94] cogeco.ca: [94] usc.edu: [94] intel.com: [91] y7mail.com: [90] hanmail.net: [90] yahoo.co.nz: [90] blueyonder.co.uk: [89] yopmail.com: [88] peoplepc.com: [88] wildblue.net: [87] yandex.com: [87] telenet.be: [87] morgan.edu: [86] hawaii.rr.com: [86] sc.rr.com: [85] bresnan.net: [85] mypacks.net: [85] rediff.com: [84] twcny.rr.com: [84] myway.com: [84] yahoo.com.my: [84] woh.rr.com: [84] msu.edu: [83] live.it: [83] zoominternet.net: [83] prodigy.net.mx: [82] infosys.com: [82] sapo.pt: [81] ufl.edu: [81] socal.rr.com: [80] virginia.edu: [80] btopenworld.com: [79] psu.edu: [78] adelphia.net: [78] wanadoo.fr: [77] vodamail.co.za: [77] neo.rr.com: [77] att.com: [76] facebook.com: [76] zoho.com: [75] osu.edu: [75] kingcross.pl: [74] gmx.at: [74] skynet.be: [74] tiscali.it: [73] indiana.edu: [73] emc.com: [73] deloitte.com: [72] fordham.edu: [71] knology.net: [70] maine.rr.com: [70] freemail.hu: [69] walla.com: [69] linkedin.com: [68] pfizer.com: [68] sonic.net: [68] thesba.com: [68] mail.usf.edu: [68] salesforce.com: [67] thomsonreuters.com: [67] bu.edu: [66] stny.rr.com: [66] ucla.edu: [66] live.co.za: [65] vt.edu: [65] ubs.com: [65] ucdavis.edu: [64] colorado.edu: [64] insidesales.com: [62] talktalk.net: [62] acm.org: [61] alice.it: [61] ya.ru: [60] nate.com: [59] tpg.com.au: [59] citi.com: [59] its.jnj.com: [59] edelman.com: [59] ey.com: [59] babson.edu: [58] myfairpoint.net: [58] sina.cn: [58] opayq.com: [58] stanfordalumni.org: [58] email.sc.edu: [57] temple.edu: [56] tcs.com: [56] mit.edu: [55] tiscali.co.uk: [55] new.rr.com: [55] LIVE.COM: [54] aol.in: [54] otenet.gr: [54] clear.net: [54] syr.edu: [54] wipro.com: [53] uw.edu: [53] mail.bg: [53] interia.pl: [53] singnet.com.sg: [53] dslextreme.com: [52] marketstar.com: [52] fiu.edu: [52] georgetown.edu: [52] siu.edu: [51] bankofamerica.com: [51] netapp.com: [51] surewest.net: [51] aol.co.uk: [51] kw.com: [51] hotmail.co.nz: [51] indiatimes.com: [51] reagan.com: [50] sasktel.net: [50] hvc.rr.com: [50] gci.net: [50] chartermi.net: [50] u.northwestern.edu: [50] live.de: [49] duke.edu: [49] ncsu.edu: [49] eastlink.ca: [48] internode.on.net: [48] sohu.com: [48] purdue.edu: [48] pureseo.co.nz: [48] berkeley.edu: [48] wisc.edu: [48] buffalo.edu: [48] webershandwick.com: [48] utk.edu: [48] yale.edu: [48] consultant.com: [47] pzu-doradca.kobierzyce: [47] jhu.edu: [47] uga.edu: [47] globo.com: [47] planet.nl: [47] merck.com: [47] rtrtr.com: [47] rock.com: [45] uiowa.edu: [45] centrum.cz: [45] flash.net: [45] btconnect.com: [45] wharton.upenn.edu: [45] gsk.com: [45] foxmail.com: [45] statefarm.com: [45] live.com.my: [45] boeing.com: [45] ohio.edu: [45] ogilvy.com: [45] laposte.net: [45] lpl.com: [44] xs4all.nl: [44] target.com: [44] lmco.com: [44] navy.mil: [44] operamail.com: [44] lwcresearch.com: [44] us.pwc.com: [43] live.dk: [43] sas.com: [43] nokiamail.com: [43] illinois.edu: [43] consolidated.net: [43] yahoo.se: [43] online.no: [43] virginmedia.com: [43] dygestoria.mielno.pl: [42] india.com: [42] utexas.edu: [42] atlanticbb.net: [42] ec.rr.com: [42] hush.com: [41] okstate.edu: [41] uchicago.edu: [41] kent.edu: [41] szpik.rawa-maz.pl: [41] udel.edu: [41] rbc.com: [41] erols.com: [41] aya.yale.edu: [41] drexel.edu: [41] netvigator.com: [40] yahoo.dk: [40] forrester.com: [40] hotmail.co.jp: [40] live.com.pt: [40] tin.it: [40] ualberta.ca: [40] telia.com: [39] live.se: [39] reklama.rawa-maz.pl: [39] octanner.com: [39] wegiel-plock.wielun: [39] gmx.us: [39] utoronto.ca: [39] sprint.com: [39] bex.net: [39] northwesternmutual.com: [39] tcd.ie: [39] kotly.pruszkow.pl: [39] GMail.com: [39] crimson.ua.edu: [39] epix.net: [39] kadry.kartuzy.pl: [38] disney.com: [38] clearwire.net: [38] vanderbilt.edu: [38] fedex.com: [38] knights.ucf.edu: [38] ucsd.edu: [38] u.washington.edu: [38] i.ua: [38] tom.com: [38] program-motywacyjny.mazowsze: [38] kadry.swiebodzin.pl: [38] tlen.pl: [38] philips.com: [38] 21cn.com: [38] pepsico.com: [38] bigmir.net: [38] gwu.edu: [38] kolumny.malopolska.pl: [37] fishbowlinventory.com: [37] bc.edu: [37] hawaii.edu: [37] czesci-fadroma.lowicz: [37] sofy.augustow.pl: [37] kosmetyka.sanok.pl: [37] COMCAST.NET: [37] domy-z-bali.kutno: [37] gartner.com: [36] gmx.ch: [36] iafrica.com: [36] attglobal.net: [36] hotmail.gr: [36] live.ie: [36] wal-mart.com: [36] luc.edu: [36] azet.sk: [36] bigfoot.com: [36] email.arizona.edu: [36] db.com: [36] virgilio.it: [36] email.phoenix.edu: [36] osk-wloclawek.podhale: [36] sungard.com: [36] sprynet.com: [36] mopy.wegrow.pl: [35] mycie-para.sanok: [35] umd.edu: [35] nm.com: [35] puchary.jelenia-gora.pl: [35] myself.com: [35] capgemini.com: [35] wavecable.com: [35] wczasy-egipt.tgory: [35] virgin.net: [34] freenet.de: [34] dayrep.com: [34] mail.missouri.edu: [34] […]

Breaches without details (updated)

When HHS’s breach tool reveals a breach I was not already aware of, I try to investigate or find media sources. Sometimes, despite my efforts, I can find nothing online to clarify a breach report. In some cases, I write to the organizations, who may – or may not – answer. Here are some breaches reported to HHS this year where we have no additional details. Each entry gives the name of the covered entity, the state, the number of patients reportedly affected, the date of the incident, and what the breach involved. If you have more info on any of these, please let me know or post a link. Amerigroup Community Care of New Mexico, Inc,NM,,”1,537″, 7/15/2011,Theft,Paper Stone Oak Urgent Care & Family Practice,TX,,”3,079″, 10/23/2011,Theft/Loss,Computer (see this post) Conway Regional Medical Center,AR,,”1,472″, 8/24/2011,Loss,Other (CDs) UCLA Health System,CA,,”2,761″, 9/7/2011,Theft,Other Portable Electronic Device (see update below) Julie A. Kennedy, D.M.D., P.A.,FL,,”2,900″, 9/30/2011,Theft,Network Server Knox Community Hospital,OH,, “500”,  10/1/2010,Improper Disposal,Other (X-ray film) Centro de Ortodancia ,PR,,”2,000″,  5/6/2010,Unauthorized Access/Disclosure,Paper InStep Foot Clinic, P.A.,MN,,”2,600″, 8/28/2011,Theft,”Laptop, Electronic Medical Record” Gail Gillespie and Associates, LLC,TX,,”2,334″,6/25/2011,Theft,”Laptop, Computer, Network Server” Capron Rescue Squad District,IL,, “815”,  2/5/2011,Unauthorized Access/Disclosure,Laptop Health Care Service Corporation,IL,, “501”,  6/28/2011,Theft,Paper Silverpop Systems, Inc. Health and Welfare Plan,GA,, “884”, 4/15/2011,Theft,Laptop Gene S. J. Liaw, MD. PS,WA,,”1,105″, 4/4/2011, Loss,Other Portable Electronic Device Update:  Found an explanation for the UCLA breach discussed in the Comments section.   Joseph Conn mentioned the discrepancy in an article: A Nov. 4 public notice on a breach reported by the UCLA Health System states that “some personal information on 16,288 patients” was stolen, but the wall of shame lists the “individuals affected” in the UCLA incident as 2,761. UCLA spokeswoman Dale Tate said in an e-mail that the nearly six-times-larger number in its notice “represents the number of individuals who had some information on the hard drive,” while the 2,761 figure sent to the OCR “represents the number of people that met the specific criteria” under the federal breach notification rule. Under the federal rule, Tate says, “the information for these individuals could possibly cause more than a minimal amount of financial, reputational or other harm.” Information on the rest of the individuals, Tate said, did not meet the criteria. So it was the same incident.

Epsilon a Victim of Spear-Phishing Attack, Says Report (update/correction)

Jaikumar Vijayan follows up on the news story by iTnews, mentioned earlier today, which reported that the Epsilon attack was a spear-phishing attack that resulted in the downloading of malware. Jai makes a point of noting, however, that there’s no proof or confirmation yet from Epsilon that this was a spear-phishing attack. As I commented earlier today, although iTnews claimed that it was “revealing” the type of breach and I suspect Neil Schwartzman of CAUCE is quite correct in his opinion on this, there’s not yet any confirmation that this is what happened this time. Jai reports: It’s not clear whether anyone at Epsilon, or Silverpop saw the alert, or how they may have responded if they did. Neither email service provider responded to a Computerworld request for comment today. According to ITNews, the breaches at Silverpop and Epsilon in the weeks that followed were caused by spear these phishing attacks. Read more on CIO. Could Epsilon have known about this type of attack to proactively prevent it? Absolutely. Should they have known about it in November when it was reported by Return Path and Brian Krebs of KrebsonSecurity.com? Absolutely. Did they know back then? They haven’t said. What did they do if they did know back then? They haven’t said. And that’s why we need a Congressional or legal inquiry into this breach. And we need to get other ESPs under oath to answer the question of whether they, too, were breached back in November or more recently. Updated: As Neil Schwartzman noted in a comment under another blog entry, he didn’t claim that the Epsilon breach was due to this type of attack. According to Neil, “They used 4-month old quotes to draw a causal link. This could just as easily be copycats exploiting another vector. We simply don’t know.” iTnews got ahead of the story, it seems.