StockX confirms it was hacked (updated)

StockX’s warning of “suspicious activity” appears to have stemmed from a serious data breach. TechCrunch has learned through a black market data seller that a hacker stole 6.8 million records from the shoe trading site in May, including names, email addresses and (thankfully hashed) passwords. The data also included less vital info like shoe sizes, trading currencies and device version profiles.

TC verified the claims by contacting people from a sample of 1,000 records using information only they would know.

While the intruders don’t appear to have taken particularly sensitive info, like payment cards, it’s still a significant breach — especially when the seller intends to make the data available through the dark web. It also raises questions as to why StockX alerted users to password resets without explaining what had happened or the extent to which users’ data was at risk. Simply put, victims didn’t know how large the problem really was.

Update (8/3/19, 10:45PM ET): StockX has confirmed to Engadget that it suffered a data breach. Below is the full statement from the company.

StockX cares deeply about the privacy of our customers. In recent days, our company has discovered a data security issue, and we want to provide you with an update on this situation.

We were alerted to suspicious activity potentially involving customer data. Upon learning of the suspicious activity, we immediately launched a comprehensive forensic investigation and engaged third-party data incident and forensic experts to assist. Though our investigation remains ongoing, forensic evidence to date suggests that an unknown third-party was able to gain access to certain customer data, including customer name, email address, shipping address, username, hashed passwords, and purchase history. From our investigation to date, there is no evidence to suggest that customer financial or payment information has been impacted.

While conducting our forensic investigation into the suspicious activity, and out of an abundance of caution, we implemented immediate infrastructure changes to mitigate and address any potential effects of the suspicious activity. These infrastructure changes included:

  • a system-wide security update;
  • a full password reset of all customer passwords with an email to customers alerting them about resetting their passwords;
  • high-frequency credential rotation on all servers and devices; and
  • a lockdown of our cloud computing perimeter


We want you to know that we took these steps proactively and immediately, because we had just begun our investigation and did not yet know the nature, extent, or scope of suspicious activity to which we had been alerted. Though we had incomplete information, we felt a responsibility to act immediately to protect our customers while our investigation continued—and we took steps to do so.

Again, we take data security and privacy very seriously, and will continue to communicate with our customers and work hard to protect those who trust us with their shopping experience.

Must Read

error: Content is protected !!