Connect with us

Malware

Breaking News: Deutsche Bank Discloses Major Security Breach, Exposing Sensitive Customer Data

Deutsche Bank, a prominent financial institution, has confirmed a breach in one of its service providers, leading to exposure of customer data. The breach highlights the vulnerability of sensitive information in third-party systems. To ensure data security, companies must prioritize implementing robust security measures and regularly assess their service providers’ security protocols. Stay informed and updated to safeguard your personal information.

Published

on

Breaking News: A large building exposes sensitive customer data with a sign on it.

Deutsche Bank Confirms Data Breach on Service Provider

Deutsche Bank AG has confirmed that one of its service providers experienced a data breach, resulting in the exposure of customer data in a likely MOVEit Transfer data-theft attack, according to a statement provided to IT Services.

“We have received notification of a security incident at one of our external service providers, which operates our account switching service in Germany,” stated a Deutsche Bank spokesperson.

The statement further reveals that over 100 companies across 40 countries may potentially be affected, indicating a connection to the recent wave of MOVEit attacks facilitated by Clop ransomware.

Deutsche Bank assures that its own systems were not compromised during the incident at the service provider.

As one of the largest banks globally, Deutsche Bank possesses total assets of $1.5 trillion and an annual net income of $6.3 billion. The breach specifically impacted customers in Germany who utilized the bank’s account switching service in 2016, 2017, 2018, and 2020.

The bank emphasizes that only a limited amount of personal data was exposed as a result of the security incident.

Although the exact number of affected clients remains unknown, Deutsche Bank has taken the necessary steps to inform all impacted individuals about the incident and provide guidance on precautionary measures to safeguard their exposed data.

Simultaneously, the bank is conducting an investigation into the causes of the data leak and implementing targeted measures to enhance data security protocols, aiming to prevent similar incidents from affecting its clients in the future.

Deutsche Bank clarifies that cybercriminals cannot gain unauthorized access to accounts using the exposed data. However, there is a risk of unauthorized direct debits being initiated.

In response to this risk, the bank has extended the period for unauthorized direct debit returns to 13 months. This extension allows customers ample time to identify, report, and receive reimbursement for any unauthorized transactions.

What Measures Did Microsoft Take to Safeguard Customer Accounts After the Data Breach?

Microsoft denies data breach reports and has taken various measures to safeguard customer accounts. These include implementing multi-factor authentication, enhancing password monitoring and reset processes, and conducting regular security audits. The company is also continuously investing in advanced security technologies and threat intelligence to ensure the protection of its customers’ sensitive data.

How Did Paramount Respond to the Data Breach and Security Incident?

Paramount’s response to the paramount data breach exposes alarming security incident was swift and comprehensive. They immediately launched an internal investigation to identify the extent of the breach and took necessary measures to mitigate its impact. Paramount also prioritized informing the affected individuals and implementing stronger security measures to prevent any future incidents. Their proactive approach demonstrated a commitment to safeguarding their data and the trust of their users.

Impact on Other Banks

Reports from German media suggest that the security incident involving the unnamed service provider also affected other major banks and financial service providers, including Commerzbank, Postbank, Comdirect, and ING.

Commerzbank confirmed to Handelsblatt that the breached service provider is ‘Majorel,’ who independently acknowledged being targeted in a cyberattack exploiting a vulnerability in the MOVEit software.

While Commerzbank stated that none of its customers were affected, its subsidiary, Comdirect, experienced indirect consequences.

Postbank acknowledged a limited impact from the incident without disclosing specific client numbers.

ING, on the other hand, acknowledged awareness of the cyberattack on a service provider, which affected a “low four-digit number of customers” who utilized account-switching services.

IT Services has reached out to all impacted financial service providers for comment but has yet to receive a response.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Malware

USDoD Hacker Responsible for Massive National Public Data Breach Captured in Brazil

Brazilian authorities have arrested a hacker accused of stealing 223GB of sensitive data from the US Department of Defense (DoD). The hacker, known as “Zambrius,” sold the data on the dark web and was also involved in other cybercrimes.

Published

on

In a dimly lit room filled with computer screens displaying sensitive data, a person in a hoodie is captured by an armed officer. The individual is reportedly connected to the National Public Data Breach incident, raising suspicions of being a USDoD hacker.

Imagine waking up one day to find your personal information plastered all over the internet. Well, that nightmare became a reality for millions of Americans when notorious hacker USDoD, also known as EquationCorp, breached National Public Data and the FBI’s InfraGard, leaking sensitive information online. But this cybercriminal’s reign of terror has come to an end, as Brazil’s Polícia Federal recently arrested USDoD in “Operation Data Breach.”

USDoD’s Infamous Data Breaches

USDoD gained notoriety for his high-profile data breaches, often stealing data and leaking it on hacking forums while taunting his victims. His breaches include the FBI’s InfraGard, a threat information sharing portal, and National Public Data, where the personal data and social security numbers of hundreds of millions of US citizens were leaked online.

However, things took a turn for the worse for USDoD when he targeted cybersecurity firm CrowdStrike and leaked the company’s internal threat actor list.

How USDoD Was Caught

After leaking CrowdStrike’s list, Brazilian publisher Techmundo received an anonymous report created by CrowdStrike that allegedly identified, or doxed, the threat actor, revealing he was a 33-year-old Brazilian named Luan BG. Strangely, USDoD confirmed that CrowdStrike’s information was accurate in an interview with HackRead and said he was currently living in Brazil.

With this information, Brazil’s Polícia Federal (PF) announced his arrest in Belo Horizonte/MG. “The Federal Police launched Operation Data Breach on Wednesday (16/10), with the aim of investigating invasions of the systems of the Federal Police and other international institutions,” reads the PF’s press release.

The Importance of Cybersecurity

This arrest serves as a reminder of the importance of cybersecurity. As individuals and businesses, we must stay vigilant and proactive in protecting our sensitive data. But you don’t have to navigate the world of cybersecurity alone.

Our IT Services team is here to help you protect your data and ensure your digital safety. From implementing robust security measures to providing guidance on best practices, we’ll work with you to keep your information secure.

Stay Informed and Stay Safe

Knowledge is power, and staying informed about the latest cybersecurity threats and best practices is the first step in keeping your data safe. We encourage you to reach out to our team and keep coming back to learn more about how to protect yourself and your business from cybercriminals.

Continue Reading

Malware

Cisco Probes Intrusion as Stolen Data Emerges for Sale on Cybercriminal Platform

Cisco is investigating a potential breach after a hacker claimed to have stolen 200GB of sensitive data. The company is working to determine the authenticity of the claim and assess any potential impacts on its customers. Protect your network with Cisco’s integrated security solutions and stay informed with the latest cybersecurity updates.

Published

on

In a striking visual, the Cisco logo emerges against a backdrop of red and blue diagonal light streaks and dots, echoing the dynamic atmosphere where Cisco probes intrusion within cybercriminal platforms.

Recently, we received information that Cisco, a leading IT company, is investigating a possible data breach after a threat actor claimed to have stolen sensitive data and put it up for sale on a hacking forum. Don’t worry, we’ve got you covered with the latest updates on this situation.

What’s going on with Cisco?

Cisco confirmed that they are looking into these claims and have launched an investigation to assess the situation. A Cisco spokesperson stated, “We are aware of reports that an actor is alleging to have gained access to certain Cisco-related files.” The investigation is still ongoing.

This all started when a notorious threat actor going by the name “IntelBroker” claimed that they, along with two accomplices called “EnergyWeaponUser” and “zjj,” had breached Cisco on October 6, 2024, and made off with a significant amount of developer data from the company. The stolen data apparently includes GitHub projects, GitLab projects, SonarQube projects, source code, hardcoded credentials, customer documents, and much more.

What has been leaked?

IntelBroker shared samples of the alleged stolen data, which includes a database, customer information, various customer documentation, and screenshots of customer management portals. However, they did not provide any details about how they obtained the data.

It’s worth noting that back in June, IntelBroker was involved in selling or leaking data from several other companies, such as T-Mobile, AMD, and Apple. Those attacks were believed to have been carried out by targeting a third-party managed services provider for DevOps and software development. It’s not clear yet whether the Cisco breach is related to these previous incidents.

What’s the current status of the investigation?

As of now, Cisco is continuing to investigate the reports and has engaged law enforcement to assist in their efforts. So far, they have found no evidence of a breach in their systems. If any confidential customer information is confirmed to have been obtained by the threat actor, Cisco has stated that they will notify the affected customers.

In conclusion, it’s essential to stay vigilant and keep up-to-date on the latest cybersecurity news and threats. You can trust us to provide you with the most recent information and help you navigate the ever-evolving world of cybersecurity. Don’t hesitate to contact us to learn more about how to protect your organization, and keep coming back for more updates on this and other cybersecurity topics.

Continue Reading

Malware

Game Freak Confirms Massive Breach: Stolen Pokémon Data Exposed Online

Game Freak, the developer behind Pokémon, has confirmed a security breach after stolen data leaked online. The leaked data includes information on unreleased games, potentially impacting both the company and fans. Game Freak is working to address the situation and strengthen their security measures to prevent future incidents.

Published

on

An animated character in an orange outfit and hat stands beside a fox-like creature with large ears in a sunlit forest, reminiscent of a Game Freak creation.

Imagine spending years of your life working on a top-secret project, only for it to be stolen and leaked online. That’s what happened to Game Freak, the Japanese video game developer behind the wildly popular Pokémon series, in August 2024. And now, we’re learning just how extensive the damage was.

A Digital Heist in the World of Pokémon

Game Freak has been at the forefront of the Pokémon gaming world since 1996, when they released Pokémon Red and Blue for the Nintendo Game Boy. Since then, they’ve produced countless titles for various Nintendo platforms, as well as for iOS and Android devices.

But in August, things took a turn for the worse. Screenshots of source code and development builds for upcoming Pokémon games started appearing on leak sites and channels like Discord, Reddit, and X. While Game Freak didn’t acknowledge the leak of the game data, they did confirm something even more concerning: the personal information of their workforce, contractors, and former employees was stolen in the cyberattack.

Damage Control and Apologies

In a machine-translated notice, Game Freak stated, “We deeply apologize for any inconvenience and concern this may have caused to all concerned parties.” They went on to explain that the leaked information included full names and company email addresses. While this doesn’t put people at risk for identity theft, it does leave them vulnerable to phishing and targeted brute-forcing attacks.

Game Freak is working to contact those affected by the incident individually, but they published the notice on their site because not everyone can be reached. On a positive note, it seems that Pokémon player data hasn’t been impacted. Game Freak has completed a detailed investigation of the breached servers and implemented security measures to prevent similar incidents in the future.

Not an Isolated Incident

Game Freak isn’t the only gaming company to fall victim to a cyberattack recently. Earlier this month, Canadian video game developer Red Barrels warned its community that an attack could cause delays on patches and additional content for existing Outlast games and upcoming titles. The Nitrogen ransomware group later claimed responsibility for the attack, boasting that they had stolen 1.8 TB of confidential data from Red Barrels.

As for the attack on Game Freak, no one has claimed responsibility yet. But the fact remains that this is a stark reminder of the vulnerability of even the most successful companies in the gaming industry.

What You Can Do to Help

As fans and consumers, it’s essential for us to stay informed and vigilant about cybersecurity. By keeping up-to-date with the latest news and best practices, we can help protect ourselves and the companies we love from these devastating cyberattacks.

But you don’t have to do it alone. Our IT Services team is here to help you navigate the ever-evolving landscape of cybersecurity. Don’t hesitate to contact us with any questions or concerns you might have. And remember to keep coming back for the latest information and advice on staying secure in the digital world.

Continue Reading

Trending