Given the sensitivity of the matter, Cyble researchers investigated further and verified that the threat actor has got hold of Data Viper’s database records along with the structure of the database.
Critical information obtained after further analysing the data breach -:
- Database list specifying the entities been breached and the number of breached records.
- Sample of Data Viper’s user records: contained user’s email ID, username, password, full name, unique API key details.
- Posted a list of database samples: contained sample records of the breached databases.
- Threat actor has posted many of the company’s databases for sale on one of the darkweb markets.
No comments:
Post a Comment