Skip to main content

The Packers were targeted by hackers, putting credit cards in danger

Green Bay Packers helmet and logo.
Evan Siegle / Green Bay Packers / Packers.com

The Green Bay Packers just fell victim to hackers — or rather, the team’s online store did. The bad news? That means your credit card information could be in danger if you’ve recently shopped at the NFL team’s official online retail store. The Packers released a notice of a data breach, notifying its customers about the October hack. Here’s what we know.

Hackers managed to access the store and insert a card skimmer script to steal payment and personal information. The data affected includes credit card types, expiration dates, numbers, and verification numbers, which could put customers at risk of credit card fraud. Hackers also got access to names, addresses, and email addresses, says Bleeping Computer.

Recommended Videos

The NFL team had already turned off all payment and checkout capabilities after discovering on October 23 that the site had been compromised. The Green Bay Packers hired cybersecurity experts to investigate the incident and determine whether any customer information had been accessed. Thanks to the investigation, they discovered that personal and payment information was stolen between September and early October 2024.

“Based on the results of the forensic investigation, on December 20, 2024, we discovered that the malicious code may have allowed an unauthorized third party to view or acquire certain customer information entered at the checkout that used a limited set of payment options on the Pro Shop website between September 23 and 24, 2024, and October 3 and 23, 2024.”

Jordan Love, the quarterback of the Green Bay Packers.
NFL

There is some good news in all of this. If customers paid for their items using PayPal, Amazon Pay, a Pro Shop website account, or a gift card, their information was not affected. The NFL team also took action.

“We also immediately required the vendor that hosts and manages the Pro Shop website to remove the malicious code from the checkout page, refresh its passwords, and confirm there were no remaining vulnerabilities,” said Chrysta Jorgensen, the Packers’ director of retail operations.

Sansec, a Dutch security company, notified the Packers of the breach. According to Sansec, the threat actors used a JSONP callback (JSON with Padding, which means a technique that enables cross-domain requests) as well as YouTube’s oEmbed features to bypass the Content Security Policy (CSP) and carry out their attack.

The Green Bay Packers offered those affected three years of credit monitoring and identity theft restoration services. If you bought anything in the Packers’ online store during the period of September to October 2024, make sure to monitor your credit card statements for fraudulent activities.

This isn’t the first time hackers have targeted the NFL. Multiple teams were targeted back in 2023, and a total of 15 NFL teams had their social media accounts breached.

Judy Sanhz
Computing Writer
Judy Sanhz is a Digital Trends computing writer covering all computing news. Loves all operating systems and devices.
Security experts warn of new hacker strategy targeting Windows drivers
hacker, cybersecurity

As if there weren't enough threats to your Windows computer already, here is another one to be careful with. Kaspersky reports that tens of thousands of compromised PCs are infected as cybercriminals advertise fake activators and cracks to lure in unsuspecting users for distinct software such as AutoCAD, JetBrains, and Foxit PDF Editor.

The malicious package named SteelFox has been quietly spreading since February 2023, but its distribution has exploded recently. The malware is dispersed using torrent trackers and forums, where it is used as a tool to activate authentic versions of the previously mentioned software.

Read more
Don’t trust that Google sign-in — how hackers are swiping passwords in Chrome
Google Chrome browser running on Android Automotive in a car.

Hackers are swiping passwords from Google accounts in Chrome, and it can happen from the official Google sign-in page. The vehicle being used is called the AutoIt Credential Flusher, and it was discovered by the researchers at OALabs. The attack locks you into your browser at the Google sign-in page and doesn't allow you to leave, all while logging your email and password as you sign into your Google account.

The attack leverages "kiosk mode" in Chrome, which is a limited full-screen interface that doesn't have elements like the address bar or navigation buttons. It's used mainly for demonstration purposes -- think a laptop on display at Best Buy. And this attack is using kiosk mode to annoy users enough that they give up their passwords. It also blocks some normal commands to exit full-screen mode, such as Esc and F11. 

Read more
Hackers claim 440GB of user data breached from large cybersecurity company
A hacker typing on an Apple MacBook laptop while holding a phone. Both devices show code on their screens.

Cybersecurity firm Fortinet has confirmed that user data has been taken from its Microsoft Sharepoint server and was posted to a hacking forum early this morning, as BleepingComputer reports.

The threat actor, "Fortib**ch," shared the credentials to an alleged S3 bucket (a digital box to store files online) for others to download, claiming the total is 440GB.

Read more