Tag: data breach

Massive Data Release on Internet

Collection #1 is a data set that was dumped onto the Internet. It contains 773 million email IDs and 21 million passwords and anybody can see the data.

Security researcher Troy Hunt runs the Have I Been Pwned website that lets people check if their email address has been in a data breach and he has analysed the data and uploaded it to his website haveibeenpwned.com so anyone can check if their details are included in this or any other high profile data breach. He does make the actual data available to anybody.

His analysis shows that Collection #1 is a set of email addresses and passwords totalling 2,692,818,238 rows. It’s made up of many different individual data breaches from literally thousands of different sources”

After cleaning the data and removing duplicates, it seems that 772,904,991 unique email addresses, along with 21,222,975 unique passwords are available in plain text. This does not include passwords that were found still in their hashed form.

Importantly, anyone who gets their hands on the cache can easily test the plain-text passwords against actual accounts. Approximately 140 million email accounts and some 10.6 million passwords were not known from past breaches.

If one or more of your accounts are in this data breach, then it is likely that one or more of your old passwords are available for others to see. Make sure you are not still using passwords from years ago.

Check if your accounts are included in the breach and if necessary change passwords and delete unnecessary accounts.

Do enter your email address and click on the subscribe button on top right to keep up to date with new posts.

Fightback Ninja Signature

Morrison’s to Pay Staff after Data Breach

In 2014, the personal details of thousands of Morrison’s staff including salaries, bank account details and home addresses were stolen and published online.

At the time, Morrisons said that all the staff details published were put on an unspecified location on the web for a few hours and were taken down immediately when they were discovered. It said in a statement: “We can confirm there has been no loss of customer data and no colleague will be left financially disadvantaged.” It was working with police to identify the source of the theft.

The hacker posted the information – including names, addresses, bank account details and salaries – online and sent it to newspapers.

It turned out that it was an employee, Andrew Skelton, who had posted the data online. He was caught and jailed for eight years in 2015 after being found guilty at Bradford Crown Court of fraud, securing unauthorised access to computer material and disclosing personal data.

However, Morrisons faced a huge payout to staff whose personal data were posted on the Internet after workers brought a claim against the company for “upset and distress”.

The High Court ruling that Morrisons is liable for the data breach then the Court of Appeal upheld the original decision against the supermarket. Morrisons said it would now appeal to the Supreme Court.

This case is the first data leak class action in the UK.

Morrisons had argued that it could not be held liable for the criminal misuse of its data, but three Court of Appeal judges rejected the company’s appeal, saying they agreed with the High Court’s earlier decision.

They said Morrisons was “vicariously liable for the offences committed by Mr Skelton against the claimants”.

Skelton was given eight years in prison for fraud, securing unauthorised access to computer material and disclosing personal data at a criminal trial in 2015.

The case continues.

If you have any experiences with scammers, spammers or time-waster do let me know, by email.

Fightback Ninja Signature

Tesco Bank Fined for Data Breach

Tesco Bank was fined £16.4m by the City watchdog over a cyber-attack it suffered that netted cyber criminals £2.26m.

The Financial Conduct Authority (FCA) said deficiencies at the bank had left account holders vulnerable to the incident. The bank had received a specific warning that was not properly addressed until the attack had started and the response was “too little, too late”.

This is the first time the FCA has issued a fine for a cyber-related incident.

Tesco Bank said that since the incident in November 2016 it had “significantly enhanced” security measures, and apologised to customers.

Mark Steward, executive director of enforcement and market oversight at the FCA, said the fine “reflects the fact that the FCA has no tolerance for banks that fail to protect customers from foreseeable risks”. Banks must ensure resilience against such crime reducing the risk of a cyber attack occurring in the first place, not only reacting to an attack.

Tesco Bank said the cyber attack in 2016 did not involve the theft or loss of any customers’ data but led to 34 transactions where funds were debited from customers’ accounts, and other customers having normal service disrupted.

The bank’s chief executive Gerry Mallon said: “We are very sorry for the impact that this fraud attack had on our customers.”

Banks and other financial institutions must learn that it’s cheaper to build proper protection that wait for a catastrophe to happen.

Do leave a comment on this post – click on the post title then scroll down to leave your comment.

Fightback Ninja Signature

Data Breach Affects Major Fashion Brands

Brands including AX Paris, DLSB, Elle Belle Attire, Perfect Handbags and Traffic People are among those affected by a data breach at IT ecommerce supplier Fashion Nexus with White Room Solutions.

Fashion Nexus stated that that on or around 9 July a “white hat hacker” or “ethical hacker” breached one of company’s web servers. Fashion Nexus advised its clients using the software to file reports with the Information Commissioner’s Office and Fashion Nexus also filed a breach report.

Around 650,000 of its clients’ customers were believed to be affected.

The majority had their names and email addresses accessed, and one-fifth also had their home address details accessed. There was no payment card information stored in the databases. But the data did include hashed passwords, names, email addresses, phone numbers, and other data.

Rob Sherwood, director at Fashion Nexus, said: “Our experience with this as a small company has been extremely stressful and unsettling. Contrary to the way we’ve been portrayed in the IT security press, we care deeply about our clients and the rights of their customers.

“As a small business with limited resource and funding, we had put in place security measures but clearly, somehow, this wasn’t sufficient to prevent an attack, and we can’t apologise enough to our clients and their customers.”

The personally identifiable information accessed can lead to scammers carrying out identity fraud and identity theft.

If you are a customer of one of the affected brands, then change your password immediately and also the login and passwords of any other accounts using the same login details.

Do click on the Facebook or Twitter icons on top right to follow Fight Back Ninja.

Fightback Ninja Signature

Butlin’s Data Breach

Butlin’s – the holiday camps company has confirmed that the records of up to 34,000 guests have been accessed by hackers.

The stolen data does not include payment details, but does include customer names, holiday dates, postal and email addresses and telephone numbers.

The compromise is believed to have been caused by a phishing email.

Under the EU’s new General Data Protection Regulation (GDPR), British companies must notify the Information Commissioner’s Office of any data breaches within 72 hours or face a fine. Butlin’s say they have done so.

The company said its own investigations have not found any fraudulent activity related to this event, but anyone whose records have been accessed by hackers needs to beware of calls, emails etc. from people claiming to be from Butlin’s and seeking more information

Butlin’s says it is contacting all those affected by the data breach.

If you believe your data may have been included in the hacked data then contact Butlin’s directly and be careful over any contact from Butlin’s – ensure they are genuine not scammers looking to trick you.

Do Share this post on social media – click on the post title then scroll down to the social media share buttons.

Fightback Ninja Signature

Dixons Carphone Data Breach

Dixons Carphone admitted there had been a data breach in 2017 which included 5.8 million credit and debit cards.  105,000 of those cards are not the chip-and-pin type. The chip and pin cards are assumed to be safe from fraud but this may be a false assumption.

Apparently, the hackers had tried to gain access to one of the processing systems used by Currys PC World and Dixons Travel stores.

Dixons also announced that the personal details of 1.2 million people (name, address, email address) may have been exposed.

STOP PRESS: Dixons Carphone has just increased that estimate from 1.2 million to 10 million people whose information may have been compromised.

Dixons Carphone said it had no evidence that any of the cards had been used fraudulently following the breach.

The incident happened before the new GDPR regulation came into force or Dixons Carphone would be looking at potentially much higher fines than currently expected.

Dixons Carphone said that “unauthorised access” of data held by the company had prompted an investigation, the hiring of external security experts and efforts to shore up its security defences. It has informed police, regulators at the Information Commissioner’s Office and the Financial Conduct Authority.

The data about these cards that may have been compromised does not contain PIN numbers or the CVV number and does not contain authentication data that would enable cardholder identification or a purchase to be made.  At least that’s the theory, but hackers and scammers can use starting information to get access to more information and then perpetrate fraud.

“The National Cyber Security Centre is working with Dixons Carphone plc and other agencies to understand how this data breach has affected people in the UK and advise on mitigation measures.

Do enter your email address and click on the subscribe button on top right to keep up to date with new posts.

Fightback Ninja Signature