HomeSecurity OperationsDell hacker asserts to have scraped millions of customer records

Dell hacker asserts to have scraped millions of customer records

Published on

spot_img
Dell hacker asserts to have scraped millions of customer records

In a recent data security crisis, Dell finds itself at the center of a cybersecurity breach that has exposed millions of customers’ personal information. The breach was claimed by a hacker named Menelik, who boasted about directly accessing Dell servers and extracting a massive dataset comprising nearly 50 million customer records. This breach puts the privacy and security of Dell customers at risk, as sensitive information such as names, addresses, and details of purchases has been compromised.

Menelik revealed that they exploited a vulnerability in a Dell partner portal using a brute-force attack, bombarding a specific login page with over 5,000 login attempts per minute. This strategy allowed the hacker to crack weak passwords and gain unauthorized access to user accounts, subsequently scraping a vast amount of customer data from Dell’s servers.

Following the breach, Dell launched an investigation to assess the extent of the damage. Despite downplaying the severity of the breach and claiming that the exposed data was not highly sensitive, the hacker managed to list the stolen database on a well-known hacking forum. Reports from Daily Dark Web confirmed the legitimacy of the breach by cross-checking leaked data with some Dell customers.

The duration of the breach and the exact number of affected customers remain undisclosed by Dell. The company has also not provided information on how it plans to notify customers about the breach or the steps being taken to prevent future cybersecurity incidents. This incident underscores the growing threat of cyberattacks targeting major corporations and the crucial need for robust cybersecurity measures to safeguard customer data.

Menelik revealed that they had been exploiting the vulnerability for weeks before notifying Dell about it in mid-April. Despite sharing screenshots as proof, it took Dell nearly a week to patch the issue, raising concerns about the company’s responsiveness to security threats. The hacker’s activities highlight the gaps in Dell’s security infrastructure and the urgency for companies to address vulnerabilities promptly to prevent data breaches.

In the wake of this breach, cybersecurity experts emphasize the importance of proactive measures to protect sensitive information from cyber threats. Companies like Dell must prioritize data security and implement stringent security protocols to prevent unauthorized access to customer data. As cybersecurity incidents continue to pose a significant risk to businesses and consumers, organizations must remain vigilant and proactive in safeguarding against potential breaches.

Overall, the Dell data breach serves as a stark reminder of the evolving cybersecurity landscape and the critical need for comprehensive security measures to mitigate the risks posed by malicious actors. The incident underscores the importance of transparency, accountability, and swift action in response to data breaches to uphold customer trust and protect sensitive information from unauthorized access.

Source link

Latest articles

IIT Kanpur And NPTI Team Up For Power Grid Cybersecurity

IIT Kanpur and NPTI Join Hands to Enhance Cyber Security in India's Power Grid A...

3,000 Fake GitHub Accounts Used to Spread Malware in Stargazers Ghost Scheme

In a recent revelation by Check Point Research (CPR), it has come to light...

Unlocking the Power of Behavioral Cloud Native Threat Detection and Response

Behavioral cloud native threat detection and response have become increasingly crucial as organizations transition...

Live Webinar on AI-Driven Endpoint Security: Adapting to Industry Changes – Source: www.databreachtoday.com

George Chatterton, a seasoned information security professional with almost two decades of experience across...

More like this

IIT Kanpur And NPTI Team Up For Power Grid Cybersecurity

IIT Kanpur and NPTI Join Hands to Enhance Cyber Security in India's Power Grid A...

3,000 Fake GitHub Accounts Used to Spread Malware in Stargazers Ghost Scheme

In a recent revelation by Check Point Research (CPR), it has come to light...

Unlocking the Power of Behavioral Cloud Native Threat Detection and Response

Behavioral cloud native threat detection and response have become increasingly crucial as organizations transition...
en_USEnglish