During the analysis of the Samsung Germany data breach, a wide range of sensitive information was found to be compromised, including customer names, addresses, email addresses, order history, and internal communications, among other sensitive data. Those findings were contained in a report released by cybersecurity firm Hudson Rock, which examined the breach and the reasons that led to it thoroughly.
Spectos GmbH, a third-party IT service provider, is believed to have been compromised in 2021 when an infostealer malware infection occurred on an employee’s computer. Hudson Rock explains that this is an initial point of compromise dating back to 2021.
Spectos GmbH, a third-party IT service provider, is believed to have been compromised in 2021 when an infostealer malware infection occurred on an employee’s computer. Hudson Rock explains that this is an initial point of compromise dating back to 2021.
By using the domain samsung-shop.spectos.com, Spectos’ software solutions for monitoring and improving service quality are directly integrated with Samsung Germany’s customer service infrastructure.
It was found that access to Samsung Germany’s systems was gained using credentials that had previously been compromised as a result of the Racoon Infostealer malware. It is well known that the specific strain of malware is capable of harvesting a large amount of sensitive data from infected machines, including usernames, passwords, browser cookies, and auto-fill information.
It was found that access to Samsung Germany’s systems was gained using credentials that had previously been compromised as a result of the Racoon Infostealer malware. It is well known that the specific strain of malware is capable of harvesting a large amount of sensitive data from infected machines, including usernames, passwords, browser cookies, and auto-fill information.
As it transpired, the credentials in this case came from the device of an employee of Spectos GmbH in 2021 that was stolen.
Although there were no security practices in place, such as the rotation of passwords or revocation protocols, the login information was valid
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Although there were no security practices in place, such as the rotation of passwords or revocation protocols, the login information was valid
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents
Read the original article: