HomeMalware & ThreatsAssailants Launch Two Attacks Within Seven Days

Assailants Launch Two Attacks Within Seven Days

Published on

spot_img

Hackers have struck Dell once again, causing a second data breach within a week. This breach reportedly involved the compromise of sensitive internal files through Atlassian tools, including Jira, Jenkins, and Confluence. Dell is currently conducting an investigation into the initial breach while grappling with the fallout of these latest cyberattacks.

The latest breach was brought to light by a report published on 19 September 2024 by Hackread.com, detailing a breach that exposed sensitive information of over 10,000 Dell employees. The same hacker responsible for the first breach, known by the alias “grep,” has now claimed responsibility for this second breach alongside another hacker named Chucky. Their actions allegedly resulted in the unauthorized access to Dell’s internal systems and the leakage of confidential data.

According to grep’s post on the Breach Forums platform on 22 September, the breach involved Jira files, database tables, and schema migrations, totaling 3.5 GB of data. The hackers claimed to have accessed Dell’s Atlassian software suite, which includes Jenkins and Confluence, essential tools for software development and collaboration.

Dell, in response to the initial breach, acknowledged the incident and initiated an investigation. However, the company has yet to address the latest claims of this subsequent breach. Hackread.com researchers who reviewed some of the leaked files found potentially sensitive information related to Dell’s internal infrastructure, such as system configurations, user credentials, security vulnerabilities, and development processes. This data, if confirmed, could pose a significant risk to Dell’s systems.

Experts like Anne Cutler, a cybersecurity specialist at Keeper Security, have expressed concern over the successive breaches affecting Dell employees and customers. Cutler pointed out that the recent breach included employee information like names, unique identifiers, employment status, and internal identification, adding to the previous breach that exposed customer data. She emphasized the need for affected individuals to take immediate steps to protect their identity, such as changing passwords, enabling Multi-Factor Authentication (MFA), and being vigilant against phishing attempts.

Cutler highlighted the importance of proactive cybersecurity measures and urged organizations to prioritize the protection of both customer and employee data. She emphasized the need for strong privileged access management, continuous monitoring, and rapid incident response to detect and prevent unauthorized access and privilege escalation.

In light of these breaches, organizations are advised to reevaluate their cybersecurity posture and take concrete steps to safeguard sensitive information. The evolution of cyber threats underscores the necessity of robust security measures and technologies to protect against potential breaches and data theft. As the investigation into Dell’s latest breach continues, the company faces the challenge of securing its systems and restoring trust among its employees and customers.

Source link

Latest articles

U.S. Indicts 2 Top Russian Hackers, Imposes Sanctions on Cryptex – Krebs on Security

The United States has taken a significant step in combating cybercrime by unveiling sanctions...

Linux systems at risk due to CUPS vulnerabilities

A recent discovery by security researcher Simone Margaritelli has unveiled four critical vulnerabilities in...

Cyber vandalism at UK train stations escalates with spread of anti-Islam message on Wi-Fi networks

In a recent cyber attack that disrupted Wi-Fi networks at various train stations across...

Ireland’s Data Protection Commission Fines Meta €91 Million for GDPR Violation

The Data Protection Commission (DPC) in Ireland has imposed a fine of €91m ($102m)...

More like this

U.S. Indicts 2 Top Russian Hackers, Imposes Sanctions on Cryptex – Krebs on Security

The United States has taken a significant step in combating cybercrime by unveiling sanctions...

Linux systems at risk due to CUPS vulnerabilities

A recent discovery by security researcher Simone Margaritelli has unveiled four critical vulnerabilities in...

Cyber vandalism at UK train stations escalates with spread of anti-Islam message on Wi-Fi networks

In a recent cyber attack that disrupted Wi-Fi networks at various train stations across...
en_USEnglish