by Fyodor Yarochkin (Senior Threat Researcher) – We uncovered personally identifiable information (PII) stolen from a China-based hotel chain being sold on a deep web forum we were monitoring.
Further analysis revealed that the stolen data was not only the PII of Chinese customers, but also included the hotel chain’s customers from Western and East Asian countries. The sample data we saw was unencrypted (in plaintext), some of which were in CSV, SQL, and TXT dumps.
We believe this stolen data is related to the data breach (reported on August 29) that exposed up to 130 million PII. The news that reported the data breach matched with an advertisement we saw in the dark web selling the stolen data for eight bitcoins (equivalent to more than US$58,000 as of September 5, 2018)…
Kommentare und FragenMöchtest Du zu diesem Artikel ein Kommentar abgeben oder hast dazu eine Frage, dann mach dies bitte immer auf der Herausgeberseite!
Aktuelles von TrendLabs Malware Blog
- URSNIF, EMOTET, DRIDEX and BitPaymer Gangs Linked by a Similar Loader
- Cybercriminals Use Malicious Memes that Communicate with Malware
- Tildeb: Analyzing the 18-year-old Implant from the Shadow Brokers’ Leak
- Cryptocurrency Miner Spreads via Old Vulnerabilities on Elasticsearch
- December Patch Tuesday: Year-End Batch Addresses Win32k Elevation of Privilege and Windows DNS Server Vulnerabilities
- New Exploit Kit “Novidade” Found Targeting Home and SOHO Routers
- Machine-to-Machine (M2M) Technology Design Issues and Implementation Vulnerabilities
- New PowerShell-based Backdoor Found in Turkey, Strikingly Similar to MuddyWater Tools
- Water and Energy Sectors Through the Lens of the Cybercriminal Underground
- Proofs of Concept Abusing PowerShell Core: Caveats and Best Practices
Diese Information erscheint unabhängig vom Artikel!