On July 25, on his blog Krebs on Security, Brian Krebs covered a flaw in how LifeLock processed “unsubscribe” information related to its marketing activities. For those unfamiliar with LifeLock, it is a subsidiary of Symantec offering identity monitoring and protection services in the U.S. market. Brian outlined an issue impacting recipients of LifeLock marketing material who wished to opt out of further email communications by clicking on a “please remove me from this list” style link within the marketing material. Unfortunately, there was a flaw in that process that allowed anyone to discover email addresses associated with other users. In Symantec’s response, they indicate the issue was limited to the use of a third-party marketing platform used to process marketing communications, not the core LifeLock service, and that with the exception of the security researchers’ efforts, there was no indication of other access attempts.
With this as background, we can see several activities occurring here:
With these observations, made in conjunction with conventional security training intending to identify suspect websites, it’s worth questioning why LifeLock and Symantec didn’t review their opt-out process to ensure it met current security best practices and their branding standards. It’s also worth questioning what data was provided to the third party in addition to the email address. While I doubt this incident rises to the level of a disclosure under GDPR, the security of personally identifiable information (PII) passed to the third party for processing should be reviewed given the issues we’ve observed.