HomeCII/OTInternet Archive Suffers a Defeat in Round 2 Breach.

Internet Archive Suffers a Defeat in Round 2 Breach.

Published on

spot_img

The Internet Archive, a digital library website, is once again facing trouble just days after recovering from a data breach and distributed denial-of-service (DDoS) attacks that temporarily took it offline. This time, unknown bad actors have reportedly obtained access tokens to the archive’s Zendesk implementation, allowing them to send a mass email to users who interacted with the platform.

In the email, the hackers criticized the Internet Archive for not rotating API keys exposed in their GitLab secrets, including a Zendesk token with permissions to access over 800,000 support tickets dating back to 2018. The hackers claimed that users’ data is now in the hands of unauthorized individuals, raising concerns about privacy and security breaches.

Chris Hickman, the chief security officer of Keyfactor, suggested that the hackers may not have malicious intent but are trying to highlight the importance of proactive security measures. He emphasized the risks of not regularly rotating tokens, which can lead to unauthorized access, service disruptions, and damage to a company’s reputation.

Despite the breach, the Internet Archive has not issued any public statements. However, the organization recently appealed for donations to support its mission of providing open access to knowledge resources. This latest incident underscores the ongoing challenges of cybersecurity and the need for vigilance in protecting sensitive information online.

As the Internet Archive works to address this latest breach, users are reminded to exercise caution when sharing personal information online and to remain vigilant against potential threats. By staying informed about cybersecurity best practices and taking proactive steps to secure their data, individuals can help mitigate the risks of cyber attacks and safeguard their online privacy.

Source link

Latest articles

UK GCA Launches £2.9B Defense Tech Framework for SMEs

UK Government Expands Access to £2.88 Billion Defense Technology Procurement Framework On May 18, the...

LiteSpeed cPanel Plugin Zero-Day Exploit Allows Server Root Access

Critical Zero-Day Vulnerability in LiteSpeed User-End cPanel Plugin Ignites Security Concerns A significant zero-day privilege...

GraphWorm Malware Utilizes OneDrive for Command and Control

New Threat Emerges: Webworm Utilizes Microsoft's OneDrive for Malicious Activities A rapidly evolving cyber threat...

Hackers Exploit F5 BIG-IP for SSH Access and Lateral Movement into Linux Networks

Cybersecurity Concerns Rise as Threat Actors Exploit F5 BIG-IP Appliances Recent reports reveal a significant...

More like this

UK GCA Launches £2.9B Defense Tech Framework for SMEs

UK Government Expands Access to £2.88 Billion Defense Technology Procurement Framework On May 18, the...

LiteSpeed cPanel Plugin Zero-Day Exploit Allows Server Root Access

Critical Zero-Day Vulnerability in LiteSpeed User-End cPanel Plugin Ignites Security Concerns A significant zero-day privilege...

GraphWorm Malware Utilizes OneDrive for Command and Control

New Threat Emerges: Webworm Utilizes Microsoft's OneDrive for Malicious Activities A rapidly evolving cyber threat...