CYBER NEWS

Shein servidores infectados por malware, Dados de 6.4m Clientes Stolen

servidores Shein foram rompidas por hackers e como um resultado dos dados sensíveis de intrusão através 6.4 milhões de usuários foi sequestrado. O incidente ocorreu entre junho e agosto 2018 de acordo com o comunicado da empresa. Our article sums up the available information on the incident.




Shein Infected With Malware, As a Result of the Infection Data of 6.4 Customers Was Hijacked

The SHEIN servers were breached by an unknown hacker or criminal collective, the available information shows that this happened this year between the months of June and August. The company states that the main cause is a targeted cyberattack on their main servers which resulted in the deployment of malware. The dangerous virus code accessed the stored customers data which includes their email address and encrypted passwords. It is estimated that this affects over 6.4 million of users that have used the online site.

Story relacionado: conjunto de dados com 42 Milhões de e-mails e senhas Uploaded on Kayo.me

As soon as the security staff discovered the threat they removed the backdoor access and mitigated the malware infection. At the moment the users are being notified of the impact and the company has started an investigation seeking to find out what caused the infection and who are the responsible groups behind the cyberattack.

This particular attack is merely yet another hit on major online retailers targeting data extraction of customers data. In most of the cases the hackers will seek to harvest the data in large databases which can either be abused further or sold to interested parties. A list of the possible actions taken on by the hackers against SHEIN customers include the following:

  • Roubo de identidade — The fact that the hackers have extracted the email and encrypted password means that they can use it to acquire other personal information about the victims either manually or using automated software. Identity theft is a common crime among computer criminals and it can lead to various types of abuse that ultimately will have a very negative impact on the victims.
  • Phishing Messages Creation — The email messages acquired through the hack can be used to coordinate large-scale phishing campaigns. They pose as legitimate messages sent by a company or service they use and the most common call to action is the deployment of a malware threat. In the last few months both miners and ransomware strains are the main weapons of choice.
  • Chantagem — The victims can be blackmailed via email messages or other contact methods. The collected information information about them can be used to coerce the users into paying the criminals.

For more information you can access their statement here.

Avatar

Martin Beltov

Martin formou-se na publicação da Universidade de Sofia. Como a segurança cibernética entusiasta ele gosta de escrever sobre as ameaças mais recentes e mecanismos de invasão.

mais Posts - Local na rede Internet

Me siga:
TwitterGoogle Plus

Deixe um comentário

seu endereço de e-mail não será publicado. Campos obrigatórios são marcados *

limite de tempo está esgotado. Recarregue CAPTCHA.

Compartilhar no Facebook Compartilhar
Carregando...
Compartilhar no Twitter chilrear
Carregando...
Compartilhar no Google Plus Compartilhar
Carregando...
Partilhar no Linkedin Compartilhar
Carregando...
Compartilhar no Digg Compartilhar
Compartilhar no Reddit Compartilhar
Carregando...
Partilhar no StumbleUpon Compartilhar
Carregando...