Unknown – €75,000 Fine (France, 2021)

€75,000Commission Nationale de l'Informatique et des Libertés27 January 2021France
final
Fine

General GDPR enforcement action

This case relates to broader data protection obligations, not specifically to cookie or consent banner compliance. It is not included in cookie statistics or the Risk Calculator.

The French privacy authority fined a company and its subcontractor for not doing enough to stop credential stuffing attacks on their website. These attacks allowed hackers to access customer information like names, emails, and order details. This case highlights the importance of quickly implementing security measures to protect customer data.

What happened

A company and its subcontractor failed to prevent credential stuffing attacks, exposing customer data.

Who was affected

Customers who shopped on the company's website and had their personal data exposed in the attacks.

What the authority found

The CNIL found that the companies did not take adequate security measures to protect customer data, violating GDPR Article 32.

Why this matters

This case emphasizes the need for companies to act swiftly and effectively against cyberattacks to protect customer data. It serves as a warning that slow responses to security threats can lead to significant fines.

GDPR Articles Cited

Art. 32 GDPR
Full Legal Summary
Detailed

The French DPA (CNIL) fined a company and its subcontractor EUR 150,000 and EUR 75,000 for failing to take sufficient measures against credential stuffing attacks on the company's website. Between June 2018 and January 2020, the CNIL received several notifications of personal data breaches related to a website where several million customers regularly shop. In response, the CNIL decided to investigate the company and its subcontractor entrusted with the management of this website. In the course of its investigations, the CNIL found that the website in question had been subjected to numerous waves of credential stuffing attacks. In this type of attack, a malicious person obtains lists of 'unencrypted' identifiers and passwords published on the Internet, usually after a data breach. Assuming that users frequently use the same password and username (email address) for different services, the attacker will use 'bots' to try to log in to a large number of websites. If the authentication is successful, this will allow the attacker to see the information associated with those accounts. The CNIL found that the attackers were able to obtain the following information: Surname, first name, email address and date of birth of customers, as well as their loyalty card number and balance, and information related to their orders. The CNIL considers that the two companies had breached their obligation to maintain the security of customers' personal data under Article 32 of the GDR. In fact, the companies took slow action to effectively combat these repeated attacks. They had decided to focus their response strategy on developing a tool to detect and block attacks launched by robots. However, the development of this tool took a year from the first attacks. In the meantime, however, a number of other measures with faster impact could have been considered to prevent further attacks or mitigate the negative impact on individuals. As a result of this lack of diligence, the data of approxi

Details

Fine Date

27 January 2021

Authority

Commission Nationale de l'Informatique et des Libertés

Fine Amount

€75,000

Enforcement Tracker ID

ETid-536

About this data

Data: CMS GDPR Enforcement Tracker
Licensed under CC BY-NC-SA 4.0
AI-verified and classified

Cite as: Cookie Fines. Unknown - France (2021). Retrieved from cookiefines.eu

Report Inaccuracy

Last updated: