Tag: data breach

  • Valve Confirms No Steam Data Breach, Accounts Remain Secure

    Valve Confirms No Steam Data Breach, Accounts Remain Secure

    Key Takeaways

    1. Valve investigated rumors of a data breach involving 89 million Steam accounts and found that the leaked data only included older one-time codes and phone numbers, with no links to account details or personal information.

    2. The company assured users that the leaked older text messages cannot compromise account security, and users will be notified if any changes are made to their account via SMS.

    3. Users do not need to change passwords or phone numbers, but Valve recommends setting up an authenticator for added security.

    4. The initial breach report originated from a LinkedIn profile claiming a dataset for sale on the dark web, but Valve clarified it does not use Twilio for authentication, despite claims of 2FA logs being involved.

    5. Valve has not confirmed the source of the leak or how the 2FA logs ended up on the dark web, as Twilio denied any breach.


    No, your Steam account hasn’t been compromised. Valve has addressed the latest rumors and leaks concerning a data breach that allegedly involves over 89 million accounts available for purchase on the dark web.

    Company’s Findings

    Valve took a look at the leaked data and discovered it only included “older text messages that had one-time codes valid for only 15 minutes, along with the phone numbers they were sent to.”

    More crucially, the company stated, “The leaked information did not link the phone numbers to any Steam account, nor did it contain password details, payment information, or other personal data.”

    Security Assurance

    The company emphasized that older text messages “cannot be used to compromise the security of your Steam account.” Additionally, they noted that “whenever a code is utilized to alter your Steam email or password via SMS, you will receive a notification via email and/or secure messages on Steam.”

    You don’t need to change your passwords or phone numbers, but it’s always smart to set up an authenticator for extra security. For more details on how to set up and activate Steam Guard, check out the guidance on Steam’s support website.

    Origin of the Report

    The initial report about the hack can be traced back to a LinkedIn profile, Underdark.ai, which asserted that a malicious actor named Machine1337 had uploaded a dataset containing 89 million Steam user accounts on the dark web.

    According to the report, these accounts were being sold for $5000 (€4463.50 or £3766) and required buyers to have a Telegram account to complete the transaction. The report also mentioned internal vendor data in the leak, suggesting there might be some admin access involved.

    Updates and Clarifications

    The report has been revised to indicate that the leak included “real-time 2FA SMS logs routed through Twilio.” Interestingly, Twilio has denied any breach, and Valve clarified that it does not use Twilio for authentication services.

    Currently, Valve has not yet confirmed the origin of the leak or how the two-factor authentication (2FA) logs made their way onto the dark web.

    Source:
    Link

  • Niche Dating Apps Suffer Major Privacy Breach Exposing User Photos

    Niche Dating Apps Suffer Major Privacy Breach Exposing User Photos

    Key Takeaways

    1. Security Flaws in Dating Apps: Serious security issues were found in five niche dating apps from M.A.D. Mobile, risking the exposure of private photos.

    2. Unprotected Data Storage: User-uploaded images were stored in Google Cloud without encryption or password protection, making them accessible to anyone with the URL.

    3. Risks of Privacy Breaches: The exposure of explicit images can lead to harassment, extortion, and reputational damage, especially for users of specialized dating apps.

    4. Lack of Response from Company: M.A.D. Mobile did not initially respond to concerns about the leak, prompting Cybernews to publish their findings before the issue was resolved.

    5. Caution with Unknown Apps: Users should avoid apps from unknown publishers and share sensitive media only on encrypted platforms that ensure user protection and accountability.


    As part of a big investigation into security problems in iOS apps, Cybernews found serious issues that could have led to a huge leak of private photos from several niche dating apps, all linked to one company, M.A.D. Mobile. These images came not just from public profiles and posts, but also from user chats, including ones that were deleted by moderators. Many of these images were explicit.

    Affected Apps

    Five apps from M.A.D. Mobile were compromised – BDSM People, the luxury ‘sugar dating’ app Chica, and LGBT apps Pink, Brish, and Translovefound. All these applications used the same architecture and had critical security credentials left as plaintext in the app code. It was these secret keys that directed researchers to the Google Cloud Storage buckets where the photos were stored without any encryption or password protection. This setup meant that anyone who had the URL—made publicly available—could access the media.

    Risks of Exposure

    When private photos are exposed to potential malicious actors, it raises the risk of harassment, extortion, and damage to one’s reputation. The fallout from a privacy breach is likely to be much more severe for users of specialized dating apps, particularly in places where homosexuality is illegal.

    The size of the leak is shocking—over 1.5 million user-uploaded photos, amounting to several hundred gigabytes of data. It’s somewhat reassuring that the exposed data did not include user identities, usernames, emails, or messages; however, a simple reverse image search could easily circumvent that protection. Notably, all five apps are exclusive to iOS, with no versions available for Android or the web.

    Action Taken

    Cybernews first contacted M.A.D. Mobile in January, but there was no response to the leak. Concerned about the lack of action from the company, and going against its usual practice, Cybernews opted to release a report on the issue before it was resolved. It wasn’t until the BBC reached out to the firm that a representative said the issue was indeed fixed, while thanking the researchers for their input.

    This event underscores what many in the cybersecurity field are aware of: third-party iOS apps are not always safe from data leaks. In fact, Cybernews’ investigation revealed a concerning finding. Out of 156,000 apps examined (which is 8% of all apps on the Apple Store), 71% were found to be exposing at least one secret. On average, the code of each app revealed 5.2 secrets.

    Key Takeaway

    The most important lesson from this incident is that users ought to steer clear of apps from unknown publishers, especially when sharing sensitive information. Specifically, sensitive media should only be shared on encrypted platforms and services that provide a level of protection alongside public accountability.

    Source:
    Link

  • Game Freak Leak Reveals Employee Info and Switch 2 Codename

    Game Freak Leak Reveals Employee Info and Switch 2 Codename

    Game Freak, the studio behind the Pokémon series, has announced a significant data breach that resulted in the theft of over 2,000 pieces of employee information, which has been circulated online. The data taken includes sensitive details like full names, addresses, phone numbers, and email addresses of current, past, and contract staff members—this is only the beginning of the issue. In a public announcement, Game Freak admitted that the breach was caused by a third party gaining unauthorized access through a phishing email.

    Extensive Data Compromised

    The breach is not limited to just employee details. In addition to personal information, a large cache of confidential materials related to the Pokémon franchise was exposed. Among the leaked files is the source code for various games, such as Pokémon HeartGold, SoulSilver, and Black 2/White 2. Furthermore, the leak appears to confirm previous rumors that the codename for the forthcoming Nintendo Switch 2 is "Ounce."

    More Than Just Game Code

    The information leaked reportedly extends beyond game code. It includes stolen assets such as development tools, lore documents, beta designs, unused soundtracks, and even notes from developer meetings. Additionally, the leak seems to contain plans for future Pokémon games, entire movie scripts, new anime seasons, and live-action show projects. This vast amount of revealed information offers fans a rare glimpse into the workings of one of the gaming industry’s most secretive franchises.

    Game Freak has stated that they are taking steps to fix the security flaw that led to the data breach, claiming that the issue has been addressed. They have also assured that they will reach out to affected employees directly whenever possible, while others will be informed through the public announcement made. Even though Game Freak has expressed regret for the trouble this has caused, the repercussions of this data leak could be significant, putting the entire Pokémon brand and its forthcoming projects under scrutiny.

    Fan Reactions and Future Implications

    Fans are already analyzing the leaked information, with recent posts disappearing across X/Twitter, and conversations are anticipated to rise and fall over the coming days. The magnitude of this leak is comparable to previous incidents we’ve witnessed in recent years (if not larger), including the Insomniac leak that exposed Wolverine and other titles. It’s astonishing that everything began with a phishing email—similar to the hack involving Rockstar Games’ GTA 6.

    Video Games Chronicle, Centro LEAKS on X/Twitter, and the r/GamingLeaksAndRumours subreddit are buzzing with the latest updates and discussions.

  • Airtel denies data breach claims affecting 375 million users

    Airtel denies data breach claims affecting 375 million users

    Bharti Airtel, a major player in the Indian telecommunications sector, is currently embroiled in accusations of a data breach affecting an astounding 375 million users. The company has categorically refuted these allegations, labeling them a “desperate attempt to tarnish Airtel’s reputation by vested interests.”

    Reports from the Dark Web

    Dark Web Informer on X.com disclosed that an unidentified vendor named “xenZen” has put the data of 375 million Airtel subscribers up for sale on a hacker forum called BreachForums. The purported data includes sensitive information such as names, family details, contact information, and even Aadhaar numbers, the unique 12-digit identification number assigned to Indian citizens.

    Airtel’s Official Response

    Airtel quickly issued a statement through a spokesperson, stating, “There has been an ongoing report alleging that Airtel customer data has been compromised. This is nothing short of a desperate attempt to tarnish Airtel’s reputation by vested interests. We have done a thorough investigation and can confirm that there has been no breach whatsoever from Airtel systems.”

    Previous Breach Claims

    Alarmingly, xenZen also took credit for another recent data leak involving the Indian Ministry of External Affairs (MEA). This breach, discovered in late June, reportedly compromised data from approximately 200,000 users registered on the MEA’s eMigrate portal. Nevertheless, the authenticity of both claims remains unconfirmed.

    Safeguarding Personal Information

    While the veracity of these claims is still uncertain, the situation underscores the perpetual risk of cyberattacks. Here are some measures to protect your personal data:

    • Be cautious about the information you share online. Limit the amount of personal data you share on public platforms and websites.
    • Use strong and unique passwords for all your online accounts. Consider using a password manager to generate and store complex passwords.
    • Enable two-factor authentication (2FA) wherever possible. This adds an extra layer of security by requiring a second verification code in addition to your password when logging in.
    • Be wary of phishing attempts. Don’t click on suspicious links or attachments in emails or text messages, even if they appear to be from legitimate sources.

    By adhering to these basic security practices, you can help protect your personal information and reduce the potential damage from a data breach.

  • Hackers Allege Dell Data Breach, Company Urges Calm

    Hackers Allege Dell Data Breach, Company Urges Calm

    Dell has reached out to its customers regarding a potential data breach that could have exposed some personal data. Customers were urged to promptly update their personal information to safeguard their privacy and assets.

    Data Breach Impact

    According to reports, around 49 million customers have potentially been impacted by this data leak. Dell, in a recent press release, sought to downplay the severity of the breach by mentioning that while the leaked database may contain purchase records, the risk to customers is not deemed significant.

    Information Compromised

    Despite Dell's reassurances, hackers have claimed to have accessed data on approximately 49 million customers. The stolen information includes customer names, physical addresses, specifics about purchased Dell products, and order details such as service tags, descriptions, purchase dates, and warranty specifics.

    Ongoing Investigation

    Dell has clarified that sensitive details like financial data, payment information, email addresses, and phone numbers were not part of the compromised data. The company is actively collaborating with law enforcement agencies and forensic experts to conduct a thorough investigation into the breach.

  • boAt’s Big Data Breach: 7.5M Customer Records Exposed on Dark Web

    boAt’s Big Data Breach: 7.5M Customer Records Exposed on Dark Web

    Indian electronics brand boAt recently experienced a serious security breach which compromised personal details belonging to approximately 7.5 million customers, as reported by Forbes India. Specifically, personal information including names, addresses, phone numbers, emails addresses and customer IDs had been exposed in this incident.

    On April 5, 2024, hackers under the moniker "ShopifyGUY" published over two gigabytes (GB) of compromised customer information onto dark web platforms for public consumption. Security specialists warn that affected individuals are now exposed to increased risks related to identity theft, financial scams, phishing endeavors and threat actors may exploit stolen data to access bank accounts, conduct illegal transactions or execute targeted fraudulent activity.

    Cybersecurity threat researcher Saumay Srivastava warns that boAt may suffer serious repercussions as a result of this breach, including decreased customer trust and even legal action from third parties. He emphasizes the urgency of implementing robust security protocols given its substantial implications; according to Rakesh Krishnan of NetEnrich Security Services a senior threat analyst it’s probable the hacker accessed and released this data before it hit dark web markets suggesting this breach may help solidify his status within cybercrime networks.

    Security Brigade founder Yash Kadaki notes that data theft has been traded at minimal costs on certain forums, suggesting it could soon spread freely through platforms like Telegram. She warns of scammers taking advantage of such stolen information for deceptive phone and email schemes based on this stolen data – however boAt has yet to publicly acknowledge or provide guidance related to their security breach incident.


    boAt’s Big Data Breach: 7.5M Customer Records Exposed on Dark Web
  • Citrix Bleed Flaw Reveals 36M Customer Data in Comcast Xfinity Breach

    Citrix Bleed Flaw Reveals 36M Customer Data in Comcast Xfinity Breach

    Comcast Encounters Security Breach: 36 Million Xfinity Users Vulnerable to Cyber Attacks

    In a worrisome development, Comcast, the corporate parent of Xfinity, was ensnared in a security incident involving the Citrix Bleed vulnerability. As a consequence of this breach, the personal details of 36 million Xfinity subscribers were laid bare to malicious hackers. This particular breach was made possible by the exploitative maneuvers of cybercriminals targeting the Citrix networking devices, widely utilized by various corporations, a nefarious activity that had apparently been ongoing since August.

    Data Breach Timeline and Compromised Customer Information

    It has been confirmed that the hackers capitalized on the Citrix Bleed flaw to infiltrate systems during the period from October 16 to October 19. Shockingly, the breach went undetected until October 25. Among the wealth of compromised customer data are usernames, hashed passwords, names, contact details, the last four digits of social security numbers, birth dates, and even secret questions and their corresponding answers.

    Delayed Response and Customer Guidance

    In a somewhat tardy move, Comcast, despite Citrix having issued patches in October to mitigate the vulnerability, took nine long days to fortify their network defenses against this pernicious threat. In light of this incident, Xfinity is emphatically advising its clientele to alter their passwords, especially if these passwords have been utilized across multiple platforms. Moreover, Xfinity is cautioning customers to remain vigilant against phishing schemes and is instituting prompts for password modifications upon customer login, while also promoting the adoption of two-factor authentication for additional layers of security.

    Law Enforcement Notification and Ongoing Investigative Efforts

    Swiftly reacting to this security breach, Xfinity has alerted law enforcement authorities and is presently engaged in a comprehensive data scrutiny exercise for further exploration. Customers can refer to an official communication dispatched by Xfinity detailing proactive measures essential for mitigating potential risks in the aftermath of the breach.

  • Customer information exposed for over a year in Samsung’s recent data breach

    Customer information exposed for over a year in Samsung’s recent data breach

    Samsung Discloses Data Breach Impacting UK Customers

    Samsung has recently revealed a new data breach that has exposed the personal information of some of its customers in the United Kingdom (UK). The breach specifically affected customers who made purchases from the Samsung UK online store between July 1, 2019, and June 30, 2020.

    Hackers Exploit Third-Party Application Vulnerability

    According to a letter shared on X (formerly Twitter) by a platform user, Samsung discovered the breach on November 13. The breach was a result of hackers exploiting a vulnerability in a third-party application that Samsung utilizes.

    Exposed Data and Security Measures

    The data that may have been exposed during the breach includes names, phone numbers, postal addresses, and email addresses. However, Samsung has clarified that the customers’ passwords and financial information were not impacted by the breach.

    Samsung Takes Action and Reports the Incident

    Upon discovering the breach, Samsung promptly took steps to address the security issue. Additionally, the company has reported the incident to the UK’s Information Commissioner’s Office. This marks the third data breach that Samsung has experienced within the span of two years.

    Previous Data Breaches

    In late July 2022, hackers gained unauthorized access to Samsung’s systems and stole customers’ names, contacts, demographic information, dates of birth, and product registration data. Similarly, in March 2022, the data extortion group Lapsus$ breached Samsung’s network and obtained confidential information, including the source code for Galaxy smartphones.

    Despite these incidents, Samsung remains committed to enhancing its security measures and safeguarding customer data.