Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label American Firm. Show all posts

Social Blade Confirms Data Breach

The company Social Blade has disclosed a security breach after a group of threat actors offered to sell a database illegally obtained from the company’s systems. 

Social Blade is an American social media analytics website that monitors tens of millions of social media accounts. The website primarily tracks the YouTube platform but also provides analytical information regarding other social media platforms such as Twitch, Twitter, Facebook, Instagram, and TikTok. 

Social Blade works as a third-party API, which facilitates its customers with the compilation of data from different social media platforms, it helps content creators boost their number of subscriptions and the channel's popularity. 

According to the reports, on Monday the threat actor offered the database of Social Blade for sale on a hacker forum which included Email addresses, Password hashes, Client IDs, Tokens for business API users, Auth tokens for connected accounts, and Various non-personal and internal data of users. 

The seller has also provided a sample of table names and content. Reportedly, the hacker obtained 5.6 million records. The sample that has been provided by the hacker shows that many of the records contain user credentials.  

"Even the smallest of flaws, if they go unnoticed, can compound into a huge problem for an organization. Without knowing the exact nature of the flaw we can assume it allowed full access to the Database as this is what the attacker had after running the breach. The overall response here was excellent including resetting passwords and flushing API keys as well as addressing the flaw,” Jason Kent, CEO of Social Blade said. 

Following the incident, the company reported that the matter is under investigation after the officials observed that a hacker offered its users data for sale on a criminal website. Also, the company reported that it has started contacting its customers regarding the incident. 

"Had the accounts or API keys been compromised and left valid, the damage could have been much much worse. Imagine having administrative access at the level of every one of their customers. They could sell social analytics to anyone for any purpose including reputational and/or brand damage. Moving on to the knock-on effect of this, now the people that possess the database know a good credential set to try on other platforms. Understand who the customers are for contextual phishing campaigns as well as other scams that can be run with such data. If you are/were a customer of Social Blade, be prepared for these kinds of attacks," he added.

Uber Claims No Private Details Accessed in Latest Network Breach

 

The hacker who claims to have hacked Uber might not have landed a stinging punch. The ridesharing firm has provided an update regarding the security breach by confirming there's "no evidence" to suggest that intruders accessed sensitive user data, such as trip histories. 

All services provided by the company, including Uber, Eats, Freight, and the Uber Driver app are functioning correctly and have also restored the use of internal software it took down upon unearthing the network breach. 

“We have no evidence that the incident involved access to sensitive user data (like trip history),” the company stated. “Internal software tools that we took down as a precaution yesterday are coming back online this morning.” 

Uber contacted law enforcement and started an internal investigation into the incident, a company spokesman confirmed. However, the company didn't say more about the reported perpetrator or the nature of the incident, several security experts believe that it is downplaying the incident and has no clear idea regarding the depth of the breach. 

Intrusion details 

The breach allegedly involved a lone hacker, who claimed to be an 18-years-old male, who employed a social engineering-based hacking technique to trick an Uber employee into revealing login credentials by posing as a coworker. 

Upon securing an initial foothold, the hacker discovered an internal network share containing PowerShell scripts with privileged admin credentials, allowing carte blanche access to other critical systems, including AWS, Google Cloud Platform, OneLogin, SentinelOne incident response portal, and Slack. 

Singapore-based Group-IB's follow-up investigation of downloaded artifacts as captured by the hacker reveals complete access to Uber's cloud-based infrastructure to hold private consumer and financial data. The hacker blamed Uber’s feeble security system for successfully exploiting its databases. He also contacted the New York Times claiming that he hacked Uber for fun and has its source code in his possession, which he might post online. 

Firm’s history of downplaying the data breach 

Network breach has been an issue for Uber in the past. In 2018, it agreed to a $148 million settlement over a 2016 data breach the company failed to reveal. Hackers were able to siphon data on 57 million drivers and riders, including private details such as names, email addresses, and driver's license numbers.

The data breach incident remained buried for more than a year. However, in November 2017 multiple reports surfaced that Uber suffered a massive security breach, and paid the hackers $100,000 to delete the information and had them sign a nondisclosure agreement.