Drivesure, a dealership service provider, experienced an attack on its database in December of last year. The result was that 26GB of personal information was downloaded and shared on hacking forums. The stolen data set contained names as well as addresses and phone numbers of 3.2 million buyers as well as text messages and email messages between buyers and sellers vehicles, VINs of their vehicles and service records. More than 93, 000 bcrypt hashed passwords were also made public. While bcrypt hashes are considered superior to older methods like SHA1 or MD5, they can still be brute forced after downloading, according to Risk Based Security.

Hacker “pompompurin” disclosed the leaked files and user information in a lengthy post on Raidforums. This is unusual, considering that hackers usually only share valuable segments or trimmed-down versions of the databases they’ve found.

According to CISO Magazine, the database was exposed due to a mistake in an AWS bucket that was utilized by the company. The AWS bucket had been left unprotected, which allowed anyone to gain access to it and its contents. This included over one million email addresses stored in plaintext, as were passwords encrypted with Bcrypt.

The breach is a major worry for those who utilize drivesure, because they could be victims of identity theft or fraud when their information is stolen. Users of the site are advised to change their passwords as quickly as possible. Also, they should think about changing their login details on other sites where they use the same credentials.

vpnversed.com/windscribe-review/

Laisser un commentaire

takugeek