Hackers steal data on 2.9 million Adobe customers
Source code for some Adobe products also was stolen
IDG News Service - Hackers broke into the internal computer network of Adobe Systems and stole information on 2.9 million customers, as well as source code for several of the company's products.
Adobe's security team discovered "sophisticated attacks" on the company's network "very recently," Brad Arkin, Adobe's chief security officer, said Thursday in a blog post announcing the incident.
So far, Adobe's investigation has revealed that attackers managed to access Adobe customer IDs and encrypted passwords, as well as obtain information on 2.9 million customers, including names, encrypted credit or debit card numbers with their expiration dates, and other customer order details.
"At this time, we do not believe the attackers removed decrypted credit or debit card numbers from our systems," Arkin said.
"Our investigation to date indicates that the cyber attackers removed certain customer information between September 11 and September 17, 2013," an Adobe spokeswoman said via email. As far as the timeline for the source-code compromise is concerned, the investigation is ongoing, she said.
It's not clear if the same attackers are responsible for the compromise of customer information and accounts and the theft of source code.
Adobe is in the process of resetting the passwords of all affected Adobe ID accounts and notifying customers whose credit or debit card information was involved in the security breach. The company is offering U.S.-based customers a one-year complimentary membership in a credit monitoring service.
Adobe has alerted the banks processing customer payments and is working with external partners and law enforcement to address the incident.
According to Arkin, hackers also appear to have accessed the source code of "numerous Adobe products." However, only Adobe Acrobat, ColdFusion and ColdFusion Builder have been named so far.
"Based on our findings to date, we are not aware of any specific increased risk to customers as a result of this incident," Arkin said in a separate blog post, adding that Adobe is not aware of any zero-day exploits -- exploits against previously unknown vulnerabilities -- being used to target Adobe products.
Arkin credited security journalist Brian Krebs, as well as Alex Holden, chief information security officer of Hold Security, a company that monitors the Internet underground for stolen business data, with helping Adobe respond to the incident.
According to Hold Security, more than 40GB of encrypted archives that appear to contain the source code for the Adobe Acrobat and Adobe ColdFusion product lines were found on servers used by cybercriminals who are believed to have also hacked into computer systems of major data brokers Dun and Bradstreet, LexisNexis and Kroll Background America.
The breach appears to have occurred in early August, and it's unclear whether the hackers analyzed the source code or used it for malicious purposes, Holden said on its website.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Mobile Applications Case Study: 8 Billion Transactions a Day The story documents how the online brokerage company tradeMONSTER created a custom mobile app and the success gleaned from this initiative. Also covered...
- Who's afraid of the big (data) bad wolf? Survive the big data storm by getting ahead of integration and governance functional requirements This paper provides a detailed review of the best practices clients should consider before embarking on their big data integration projects.
- Mobile Apps and Devices Slash Customer Cycle Time Consolidated Engineering Laboratories' field employees used to collect data on triplicate forms that were sometimes hard to read and difficult to manage. After...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources... All Cybercrime and Hacking White Papers | Webcasts