Evan Siegle / Green Bay Packers / Packers.com

The Green Bay Packers just fell victim to hacker — or rather , the squad ’s online memory did . The bad tidings ? That means your credit card information could be in danger if you ’ve recently denounce at the NFL team ’s prescribed online retail store . The Packers released anotice of a data breach , send word its customer about the October hack . Here ’s what we know .

Hackers managed to get to the store and tuck a calling card skimmer script to steal requital and personal information . The data affected includes course credit posting types , expiration dates , numbers , and confirmation numbers , which could put customer at risk of credit rating card fraud . Hackers also got memory access to names , address , and email addresses , saysBleeping Computer .

The NFL team had already change state off all requital and checkout capabilities after discovering on October 23 that the site had been compromised . The Green Bay Packers take cybersecurity expert to investigate the incident and determine whether any customer information had been accessed . Thanks to the investigation , they discovered that personal and defrayment information was stolen between September and former October 2024 .

“ Based on the results of the forensic probe , on December 20 , 2024 , we discovered that the malicious codification may have allowed an unauthorized third political party to view or acquire certain customer information entered at the checkout that used a limited set of payment options on the Pro Shop website between September 23 and 24 , 2024 , and October 3 and 23 , 2024 . ”

There is some salutary news program in all of this . If customer paid for their item using PayPal , Amazon Pay , a Pro Shop website account , or a giving card , their information was not sham . The NFL team also bring action .

“ We also instantly ask the vender that hosts and manages the Pro Shop website to remove the malicious codification from the checkout page , refreshen its passwords , and substantiate there were no remaining vulnerabilities , ” said Chrysta Jorgensen , the Packers ’ director of retail performance .

Sansec , a Dutch security company , notified the Packers of the falling out . According to Sansec , the threat role player used a JSONP recall ( JSON with Padding , which means a technique that enables cross - domain petition ) as well as YouTube ’s oEmbed feature to bypass the Content Security Policy ( CSP ) and carry out their plan of attack .

The Green Bay Packers offered those affected three year of mention monitoring and identity thievery restoration services . If you bought anything in the Packers ’ online memory board during the period of September to October 2024 , make certain to monitor your credit poster statements for fraudulent activities .

This is n’t the first time hackers have targeted the NFL.Multiple team were targetedback in 2023 , and a total of 15 NFL teams had their social media accounts breached .