At least 500 in California, with an unspecified number in other states
Retail giant Petco has reported a data breach stemming from an internal software misconfiguration. The security lapse left files containing highly sensitive customer Personally Identifiable Information (PII) exposed on the public internet, accessible without any authentication. The compromised data includes Social Security numbers (SSNs), driver's license numbers, and financial account information. This type of incident, caused by an internal error rather than an external attack, highlights the critical importance of secure configuration management and Cloud Security Posture Management (CSPM). The full scope of the breach is not yet public, but it poses a severe risk of identity theft and fraud for the affected customers.
The breach was not the result of a sophisticated cyberattack but a preventable internal error. A software application used by Petco was misconfigured, causing files containing sensitive customer data to be publicly accessible. The company discovered the exposure during an internal review and subsequently secured the files and corrected the configuration.
The types of data exposed are among the most sensitive for consumers:
Petco has begun notifying affected individuals and has filed notices with several state attorneys general, including in California, Massachusetts, Montana, and Texas. The filing in California confirmed at least 500 residents were affected.
This incident is a classic example of a security misconfiguration, a leading cause of data breaches in the cloud era. While the specific software was not named, this pattern is common with misconfigured cloud storage services like Amazon S3 buckets, Azure Blob Storage, or unsecured web servers.
T1530 - Data from Cloud Storage Object: This technique describes accessing data stored in a cloud storage offering. If the misconfiguration involved a cloud bucket, this would be the relevant technique for how an unauthorized party could have accessed the data.T1088 - Bypass User Account Control: While typically for endpoints, the concept applies here figuratively. The misconfiguration effectively bypassed all authentication and authorization controls meant to protect the data.This breach underscores that data does not need to be 'hacked' to be stolen. Negligence in configuration management can be just as damaging as a malicious actor's attack.
The impact on affected customers is severe. With their SSNs, driver's license numbers, and financial details exposed, they are at a very high risk of identity theft, financial fraud, and targeted social engineering attacks. They will need to take immediate steps, such as freezing their credit and monitoring their accounts. For Petco, the breach will result in significant costs related to incident response, customer notifications, potential credit monitoring services for victims, and regulatory fines under laws like the California Consumer Privacy Act (CCPA). The company will also suffer reputational damage and a loss of customer trust.
Detecting misconfigurations requires proactive and continuous monitoring.
Preventing misconfiguration breaches requires a combination of technology, process, and policy.
M1054 - Software Configuration.M1041 - Encrypt Sensitive Information. This provides a crucial layer of protection if the storage itself is accidentally exposed.M1047 - Audit).Implementing secure configuration management for all software and cloud services, including using Infrastructure as Code (IaC) scanning.
Using tools like Cloud Security Posture Management (CSPM) to continuously audit cloud configurations for security policy violations.
Ensuring that all sensitive data, such as PII and financial information, is encrypted at rest to mitigate the impact of an exposure.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats