Hackers attack PR Newswire, get user data
Stolen data includes account customer credentials and contact information
IDG News Service - Hackers managed to steal a database containing customer credentials and contact information from PR Newswire, a major press release distribution service that's used by tens of thousands of companies and public relations agencies.
The database was discovered on the same hacker server where stolen source code for several Adobe products was recently found, suggesting that the same attackers might be responsible for both incidents, according to Alex Holden, chief information security officer of Hold Security, a company that monitors the Internet underground for stolen business data.
The same group of cybercriminals are believed to have also hacked into computer systems belonging to several major data brokers including Dun and Bradstreet, LexisNexis and Kroll Background America.
"Cleverly disguised as an image, an archive of PR Newswire was found on hackers' repository server," Hold Security said Wednesday in a blog post. "The database date appears to be from March 8, 2013 but it is unclear yet if the breach had happened at the same time or at a later date as the archive was created on April 22, 2013."
The company worked with independent security reporter Brian Krebs, who alerted PR Newswire of the breach.
PR Newswire, a company owned by marketing and communications services firm UBM, confirmed the breach Wednesday.
"We recently learned that a database, which primarily houses access credentials and business contact information for some of our customers in Europe, the Middle East, Africa and India, was compromised," Ninan Chacko, PR Newswire's CEO, said in a blog post.
"We are conducting an extensive investigation and have notified appropriate law enforcement authorities," Chacko said. "Based on our preliminary review, we believe that customer payment data were not compromised."
PR Newswire told Krebs there were approximately 10,000 records in the compromised database, but that the actual number of affected customers is likely much lower, because customers generally maintain multiple accounts.
PR Newswire has notified affected customers and has enforced a mandatory password reset for their accounts, a PR Newswire spokesman said Thursday. The passwords were hashed, he said.
Hashing is a one-way form of encryption where plaintext data is passed through an algorithm to generate a unique cryptographic representation of it, random-looking string of characters referred to as a hash.
A hash is not meant to be decrypted to recover the original plaintext information, but can be used to validate information inputted at a later time by rehashing it and comparing the results. Modern websites store hashes in their databases instead of passwords for security reasons.
However, once stolen, some password hashes can be "cracked" using brute-force methods, their resistance against such attacks depending on the complexity of the original passwords, the hashing algorithm used and whether other strengthening methods like salting were also applied.
- Path Selection Infographic Path Selection Infographic
- Hyperconvergence Infographic A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Preparing Your Infrastructure for the Hyperconvergence Era From cloud computing and virtualization to mobility and unified communications, an array of innovative technologies is transforming today's data centers.
- How WAN Optimization Helps Enterprises Reduce Costs If you wanted to break down innovation into a tidy equation, it might go something like this: Technology + Connectivity = Productivity. Productivity...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users? All Cybercrime and Hacking White Papers | Webcasts