Hackers attack PR Newswire, get user data
Stolen data includes account customer credentials and contact information
IDG News Service - Hackers managed to steal a database containing customer credentials and contact information from PR Newswire, a major press release distribution service that's used by tens of thousands of companies and public relations agencies.
The database was discovered on the same hacker server where stolen source code for several Adobe products was recently found, suggesting that the same attackers might be responsible for both incidents, according to Alex Holden, chief information security officer of Hold Security, a company that monitors the Internet underground for stolen business data.
The same group of cybercriminals are believed to have also hacked into computer systems belonging to several major data brokers including Dun and Bradstreet, LexisNexis and Kroll Background America.
"Cleverly disguised as an image, an archive of PR Newswire was found on hackers' repository server," Hold Security said Wednesday in a blog post. "The database date appears to be from March 8, 2013 but it is unclear yet if the breach had happened at the same time or at a later date as the archive was created on April 22, 2013."
The company worked with independent security reporter Brian Krebs, who alerted PR Newswire of the breach.
PR Newswire, a company owned by marketing and communications services firm UBM, confirmed the breach Wednesday.
"We recently learned that a database, which primarily houses access credentials and business contact information for some of our customers in Europe, the Middle East, Africa and India, was compromised," Ninan Chacko, PR Newswire's CEO, said in a blog post.
"We are conducting an extensive investigation and have notified appropriate law enforcement authorities," Chacko said. "Based on our preliminary review, we believe that customer payment data were not compromised."
PR Newswire told Krebs there were approximately 10,000 records in the compromised database, but that the actual number of affected customers is likely much lower, because customers generally maintain multiple accounts.
PR Newswire has notified affected customers and has enforced a mandatory password reset for their accounts, a PR Newswire spokesman said Thursday. The passwords were hashed, he said.
Hashing is a one-way form of encryption where plaintext data is passed through an algorithm to generate a unique cryptographic representation of it, random-looking string of characters referred to as a hash.
A hash is not meant to be decrypted to recover the original plaintext information, but can be used to validate information inputted at a later time by rehashing it and comparing the results. Modern websites store hashes in their databases instead of passwords for security reasons.
However, once stolen, some password hashes can be "cracked" using brute-force methods, their resistance against such attacks depending on the complexity of the original passwords, the hashing algorithm used and whether other strengthening methods like salting were also applied.
- Step Out of the Bull's-Eye Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Cybercrime and Hacking White Papers | Webcasts