Summer is almost over. Almost no data leaked





While some enjoyed summer vacations, others enjoyed catching sensitive data. Cloud4Y has prepared a brief overview of sensational data leaks this summer.



June



one.

More than 400 thousand email addresses and 160 thousand phone numbers, as well as 1,200 login-password pairs for access to personal accounts of customers of the largest transport company Fesco were in the public domain. There is probably less real data since entries may be repeated.



Logins and passwords are valid, they allow you to get complete information about the transportation performed by the company for a specific customer, including acts of work performed and scans of consignment notes with seals.



The data was made publicly available through the logs left by the CyberLines software used by Fesco. In addition to logins and passwords, the logs also contain personal data of representatives of Fesco client companies: names, passport numbers, phone numbers.



2.

On June 9, 2019, 900 thousand customers of Russian banks became aware of a data leak. Passport data, phone numbers, places of residence and work of citizens of the Russian Federation were in the public domain. Clients of Alfa-Bank, OTP-Bank and HKF-Bank, as well as about 500 employees of the Ministry of Internal Affairs and 40 people from the FSB suffered.



The experts found two databases of Alfa-Bank clients: one contains data on more than 55 thousand customers from 2014–2015, and the second contains 504 records from 2018–2019. The second database also contains data on the account balance, limited to a range of 130–160 thousand rubles.



July



It seems that in July most people rested, so for the whole month there was only one noticeable leak. But what a thing!



3.

At the end of the month, it became known about the largest leak of data from bank customers. The financial holding Capital One suffered, which estimates the damage at $ 100-150 million. As a result of the hacking, the attackers gained access to the data of 100 million clients of Capital One in the USA and 6 million in Canada. The information from the applications for obtaining credit cards and the data of the current holders of such cards were compromised.



The holding claims that the data of the credit cards themselves (numbers, CCV codes, etc.) remained safe, but 140 thousand social security numbers and 80 thousand bank accounts were stolen. In addition, fraudsters obtained credit histories, statements, addresses, birth dates and salaries of clients of a financial institution.



In Canada, approximately one million social security numbers were compromised. Also, hackers got data on card transactions scattered over 23 days for the 2016th, 2017th and 2018th years.



Capital One conducted an internal investigation, as a result of which the company said that the stolen information was unlikely to be used for fraudulent purposes. Interesting, and in what then was used?



August



Having a rest in July, in August they returned with renewed vigor. So.



How much has been said about the storage of biometrics and here again ...

four.

In mid-August 2019, a leak of more than a million fingerprints and other sensitive data was discovered. Employees of the company claim to have gained access to biometric data from the Biostar 2 software.



Biostar 2 is used by thousands of companies around the world, including the London police, to control access to protected sites. Suprema, the developer of Biostar 2, claims to be already solving this problem. Researchers note that along with fingerprint records, they found photographs of people, face recognition data, names, addresses, passwords, employment history and records of visits to protected sites. Many victims are concerned that Suprema did not report a possible data leak so that its customers can take action locally.



A total of 23 gigabytes of data containing nearly 30 million records were discovered on the network. Researchers note that biometric information can never become confidential after such a leak. Among the companies whose data were online were Power World Gyms, a gym in India and Sri Lanka (113,796 user records, including fingerprints), Global Village, the annual festival in the UAE (15,000 fingerprints), Adecco Staffing, Belgian recruiting company (2000 fingerprints). Most of the leak affected British users and companies - millions of personal records were in the public domain.



Mastercard payment system officially notified the Belgian and German regulators that on August 19 the company recorded a data leak of a “large number” of customers, “a significant part of which” are German citizens. The company indicated that they had taken the necessary steps and deleted all personal data of customers that got on the Internet. According to Mastercard, the incident is related to the loyalty program of a third-party German company.



5.

Meanwhile, our compatriots are not asleep either. As the saying goes: "Thanks to Russian Railways, but no."

The data leak of employees of Russian Railways, ashotog spoke about , became the second largest in Russia in 2019. SNILS numbers, addresses, phone numbers, photos, full names and positions of 703 thousand employees of Russian Railways out of 730 thousand got into open access.



Russian Railways checks the publication and prepares an appeal to law enforcement agencies. The personal data of the passengers were not stolen, the company says.



6.

And just yesterday, Imperva announced the leak of confidential information of a number of its customers. The incident affected users of the Imperva Cloud Web Application Firewall CDN service, formerly known as Incapsula. According to a publication on the Imperva website, the company became aware of the incident on August 20 of this year after reporting a leak of data from a number of customers who had accounts in the service until September 15, 2017.



The compromised information included email addresses and password hashes of users who registered before September 15, 2017, as well as API keys and SSL certificates of some clients. The company did not disclose details about exactly how the data leak occurred. Cloud WAF users are recommended to change their account passwords, enable two-factor authentication and implement a Single Sign-On mechanism, as well as download new SSL certificates and reset API keys.



When collecting information for this collection, the thought involuntarily came up: how many wonderful leaks will autumn bring to us?



What else is useful to read on the Cloud4Y blog



vGPU - use cannot be ignored

AI helps study animals in Africa

4 ways to save on backups in the cloud

5 Best Kubernetes Distributions

Robots and strawberries: how AI increases field yields



Subscribe to our Telegram channel so as not to miss another article! We write no more than twice a week and only on business.



All Articles