HomeCII/OTInternet Archive Suffers a Defeat in Round 2 Breach.

Internet Archive Suffers a Defeat in Round 2 Breach.

Published on

spot_img

The Internet Archive, a digital library website, is once again facing trouble just days after recovering from a data breach and distributed denial-of-service (DDoS) attacks that temporarily took it offline. This time, unknown bad actors have reportedly obtained access tokens to the archive’s Zendesk implementation, allowing them to send a mass email to users who interacted with the platform.

In the email, the hackers criticized the Internet Archive for not rotating API keys exposed in their GitLab secrets, including a Zendesk token with permissions to access over 800,000 support tickets dating back to 2018. The hackers claimed that users’ data is now in the hands of unauthorized individuals, raising concerns about privacy and security breaches.

Chris Hickman, the chief security officer of Keyfactor, suggested that the hackers may not have malicious intent but are trying to highlight the importance of proactive security measures. He emphasized the risks of not regularly rotating tokens, which can lead to unauthorized access, service disruptions, and damage to a company’s reputation.

Despite the breach, the Internet Archive has not issued any public statements. However, the organization recently appealed for donations to support its mission of providing open access to knowledge resources. This latest incident underscores the ongoing challenges of cybersecurity and the need for vigilance in protecting sensitive information online.

As the Internet Archive works to address this latest breach, users are reminded to exercise caution when sharing personal information online and to remain vigilant against potential threats. By staying informed about cybersecurity best practices and taking proactive steps to secure their data, individuals can help mitigate the risks of cyber attacks and safeguard their online privacy.

Source link

Latest articles

5 Essential Steps for Building Business Resilience in Cybersecurity

Business Resilience in the Face of Cyber Threats: Insights from N-able's 2026 SOC Report In...

Hackers Initiate Social Engineering Attack on Major Node.js Maintainers

Following the recent high-profile supply chain breach involving the widely utilized Axios package, a...

6 Metrics IT Leaders Must Prioritize for Business Resilience

In today's rapidly changing digital landscape, effective risk management and business continuity hinge on...

Six Critical Mistakes That Undermine Cyber Resilience and How to Fix Them

Breaking Down Silos: A Path to Enhanced Business Resilience Silos within organizations are increasingly recognized...

More like this

5 Essential Steps for Building Business Resilience in Cybersecurity

Business Resilience in the Face of Cyber Threats: Insights from N-able's 2026 SOC Report In...

Hackers Initiate Social Engineering Attack on Major Node.js Maintainers

Following the recent high-profile supply chain breach involving the widely utilized Axios package, a...

6 Metrics IT Leaders Must Prioritize for Business Resilience

In today's rapidly changing digital landscape, effective risk management and business continuity hinge on...