Hackers steal data on 2.9 million Adobe customers
Source code for some Adobe products also was stolen
IDG News Service - Hackers broke into the internal computer network of Adobe Systems and stole information on 2.9 million customers, as well as source code for several of the company's products.
Adobe's security team discovered "sophisticated attacks" on the company's network "very recently," Brad Arkin, Adobe's chief security officer, said Thursday in a blog post announcing the incident.
So far, Adobe's investigation has revealed that attackers managed to access Adobe customer IDs and encrypted passwords, as well as obtain information on 2.9 million customers, including names, encrypted credit or debit card numbers with their expiration dates, and other customer order details.
"At this time, we do not believe the attackers removed decrypted credit or debit card numbers from our systems," Arkin said.
"Our investigation to date indicates that the cyber attackers removed certain customer information between September 11 and September 17, 2013," an Adobe spokeswoman said via email. As far as the timeline for the source-code compromise is concerned, the investigation is ongoing, she said.
It's not clear if the same attackers are responsible for the compromise of customer information and accounts and the theft of source code.
Adobe is in the process of resetting the passwords of all affected Adobe ID accounts and notifying customers whose credit or debit card information was involved in the security breach. The company is offering U.S.-based customers a one-year complimentary membership in a credit monitoring service.
Adobe has alerted the banks processing customer payments and is working with external partners and law enforcement to address the incident.
According to Arkin, hackers also appear to have accessed the source code of "numerous Adobe products." However, only Adobe Acrobat, ColdFusion and ColdFusion Builder have been named so far.
"Based on our findings to date, we are not aware of any specific increased risk to customers as a result of this incident," Arkin said in a separate blog post, adding that Adobe is not aware of any zero-day exploits -- exploits against previously unknown vulnerabilities -- being used to target Adobe products.
Arkin credited security journalist Brian Krebs, as well as Alex Holden, chief information security officer of Hold Security, a company that monitors the Internet underground for stolen business data, with helping Adobe respond to the incident.
According to Hold Security, more than 40GB of encrypted archives that appear to contain the source code for the Adobe Acrobat and Adobe ColdFusion product lines were found on servers used by cybercriminals who are believed to have also hacked into computer systems of major data brokers Dun and Bradstreet, LexisNexis and Kroll Background America.
The breach appears to have occurred in early August, and it's unclear whether the hackers analyzed the source code or used it for malicious purposes, Holden said on its website.
- Step Out of the Bull's-Eye Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Cybercrime and Hacking White Papers | Webcasts