![]() “Drizly’s recommendation for customers to change passwords is not enough to keep user data protected. “As most use the same password across accounts, fraudsters can use this same password to access the user’s banking accounts, social media profiles, unemployment benefit sites and more to steal benefits and change the password to lock the real user out,” Prigge said. Tools exist that can reduce dwell time substantially but organizations need to be proactive about adding them to their security suites.”ĭiscussing the consumer ramifications of the stolen data, Robert Prigge, chief executive officer of identity verification solutions company Jumio Corp., said that with this information, cybercriminals can decode passwords and log in as the user, allowing them to steal credit card information to make fraudulent purchases on the site and elsewhere. “Dwell time has been going down for the last several years but, as this shows, it is still far too high. “That is a two-week delay between identifying the breach and informing affected customers,” he said. He noted that the stolen data has been available on the dark web since mid-February, but the breach was only identified by Drizly on July 13 and reported to customers on today. “The reported Drizly data breach is interesting for what it shows about attacker dwell time - the time between an initial breach and the victim noticing it,” Saryu Nayyar, chief executive officer of security information and event management firm Gurucul Solutions Pvt Ltd A.G., told SiliconANGLE. One thing pointing against the user of OAuth tags is the timing: It appears the stolen data has been online since well before the hack of Waydev. ShinyHunters has used various hacking methods since emerging earlier this year in its successful raids on dozens of companies. It’s not known if Drizly was hacked in a similar fashion. to gain access to the company’s database. In the case of Dave, ShinyHunters used stolen OAuth tokens from Git analytics provider Waydev Inc. Drizly noted that no financial information was compromised, but the dark web listing for Drizly’s stolen customer data claims to include valid credit card numbers.ĭrizly did not say how the data breach took place. The company has now confirmed the hack with TechCrunch reporting that it sent an email to customers saying that a hacker obtained “some customer data.” The stolen data includes email addresses, dates of birth, hashed passwords and in some instances delivery addresses. Records from Drizly appeared alongside those from Dave and other companies on a dark web marketplace run by the hacking group ShinyHunters. News that Drizly may have suffered a data breach first emerged alongside news Monday that financial service provider Dave Inc. Alcohol delivery service Drizly is the latest to suffer a confirmed data breach, with some 2.5 million customer records finding their way to the shady corner of the internet known as the dark web.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |