Can a Locked Filing Cabinet Be Stolen and Still Be Considered Locked? Graham Cluley Investigates

Our investigation has revealed that a threat actor has exfiltrated encrypted backups from a third-party cloud storage service related to Central, Pro, and join products. This is a serious issue, as losing backups is almost as bad as losing your password vaults. We also have evidence that the threat actor was able to exfiltrate an encryption key for a portion of the encrypted backups. This means that the backups were not as secure as they seemed, as the encryption key could be used to easily unencrypt them. The affected information may include account usernames, salted and hashed passwords, Multi-Factor Authentication settings, product settings, and licensing information. While Rescue and GoToMyPC encrypted databases were not exfiltrated, MFA settings of a small subset of customers were impacted. GoTo has taken the necessary steps to reset passwords and reauthorise MFA settings. The breach occurred at a third-party cloud storage service, which both GoTo and LastPass use. This raises questions about the security configuration of the cloud-based storage for the backups, as well as the encryption key for those backups. Graham Cluley is a veteran of the anti-virus industry, having worked for a number of security companies since the early 1990s. He is now an independent security analyst, and regularly makes media appearances and speaks internationally on the topics of computer security, hackers, and online privacy.

This Cyber News was published on grahamcluley.com. Publication date: Mon, 30 Jan 2023 16:37:02 +0000


Cyber News related to Can a Locked Filing Cabinet Be Stolen and Still Be Considered Locked? Graham Cluley Investigates

Securenvoy and Graham Cluley Partner to Feed the Hungry - Securenvoy and Graham Cluley have recently joined forces in a campaign to help feed the hungry. They have begun the "Feed Sponsor Securenvoy" program, and are encouraging their customers and followers to donate to their chosen charity. With the help ...
1 year ago Grahamcluley.com
Mt. Graham Regional Medical Center Recovers from Ransomware Attack but Confirms Data Breach - On September 29, 2023, Mount Graham Regional Medical Center filed a notice of data breach with the U.S. Department of Health and Human Services Office for Civil Rights after confirming a recent ransomware attack. In this notice, MGRMC explains that ...
7 months ago Jdsupra.com
Can a Locked Filing Cabinet Be Stolen and Still Be Considered Locked? Graham Cluley Investigates - Our investigation has revealed that a threat actor has exfiltrated encrypted backups from a third-party cloud storage service related to Central, Pro, and join products. This is a serious issue, as losing backups is almost as bad as losing your ...
1 year ago Grahamcluley.com
Smashing Security podcast #307: ChatGPT and the Minister for Foreign Affairs Graham Cluley - Could a senior Latvian politician really be responsible for scamming hundreds of "Mothers-of-two" in the UK? And should we be getting worried about the AI wonder that is ChatGPT? All this and more is discussed in the latest edition of the "Smashing ...
1 year ago Grahamcluley.com
Jailed for VPN Mishap Illegal Messaging Apps and Smartwatches that Sound the Alarm Graham Cluley on the Smashing Security Podcast 308 - When Ubiquiti was hacked, people assumed it was a typical security breach, but the truth was much more interesting. In the latest episode of the Smashing Security podcast, Graham Cluley and Carole Theriault, along with Mark Stockley, discussed why ...
1 year ago Grahamcluley.com
Take a tour of the Edgescan Cybersecurity Platform Graham Cluley - Graham Cluley Security News is sponsored this week by the folks at Edgescan. Edgescan simplifies Vulnerability Management by delivering a single full-stack SaaS solution integrated with world-class security professionals. Edgescan helps enterprise ...
1 year ago Grahamcluley.com
GitHub code-signing certificates stolen - Another day, another access-token-based database breach. This time, the victim is Microsoft's GitHub business. On December 6, 2022, repositories from our atom, desktop, and other deprecated GitHub-owned organizations were cloned by a compromised ...
1 year ago Nakedsecurity.sophos.com
How to lock a file or folder in MacOS Finder - Of course, when you have those types of sensitive documents, you'd want them stored more securely than within a locked file. If the files are less sensitive yet you still don't want anyone monkeying with them, MacOS Finder has a feature that can help ...
5 months ago Zdnet.com
361 million stolen accounts leaked on Telegram added to HIBP - A massive trove of 361 million email addresses from credentials stolen by password-stealing malware, in credential stuffing attacks, and from data breaches was added to the Have I Been Pwned data breach notification service, allowing anyone to check ...
1 week ago Bleepingcomputer.com
Hackers Stole Data of 1.3 Million Financial National Fidelity Users - Hackers stole data from more than 1.3 million Fidelity National Financial customers when the giant real estate services firm was hit with a ransomware attack in November 2023 that shut down the company's operations for a week. The company wrote that ...
5 months ago Securityboulevard.com
CVE-2020-1300 - A remote code execution vulnerability exists when Microsoft Windows fails to properly handle cabinet files.To exploit the vulnerability, an attacker would have to convince a user to either open a specially crafted cabinet file or spoof a network ...
4 years ago
Have I Been Pwned adds 71 million emails from Naz.API stolen account list - Have I Been Pwned has added almost 71 million email addresses associated with stolen accounts in the Naz.API dataset to its data breach notification service. The Naz.API dataset is a massive collection of 1 billion credentials compiled using ...
5 months ago Bleepingcomputer.com
Update your iPhone and turn on Stolen Device Protection ASAP. Here's why - Apple has rolled out a new update that promises to better secure your iPhone from the bad guys. Released on Monday, iOS 17.3 kicks in a few helpful new features, including Apple Music playlist sharing and AirPlay support for hotel room TVs. But the ...
5 months ago Zdnet.com
Innovative Legal Move Restores Hospital's Stolen Information - There has been a handover of patient data stolen by the notorious LockBit gang from a cloud computing company to a New York hospital alliance that is partnered with that company. There was a lawsuit filed by the North Star Health Alliance - a group ...
5 months ago Cysecurity.news
Kraft Heinz investigates hack claims, says systems 'operating normally' - Kraft Heinz has confirmed that their systems are operating normally and that there is no evidence they were breached after an extortion group listed them on a data leak site. Kraft Heinz is one of the world's largest food and beverage companies, with ...
6 months ago Bleepingcomputer.com
The Worst Hacks of 2023 - The cybersecurity slog will no doubt continue in 2024, but to cap off the past 12 months, here's WIRED's look back at the year's worst breaches, leaks, ransomware attacks, digital extortion cases, and state-sponsored hacking campaigns. One of the ...
6 months ago Wired.com
Fidelity National Financial: Hackers stole data of 1.3 million people - Fidelity National Financial has confirmed that a November cyberattack has exposed the data of 1.3 million customers. FNF is an American title insurance and transaction services provider for the real estate and mortgage industries. It is one of the ...
5 months ago Bleepingcomputer.com
Cardiovascular Consultants Confirms Data Breach in SEC Filing - On December 6, 2023, Cardiovascular Consultants Ltd. filed a notice with the Securities and Exchange Commission disclosing a recent cyberattack and subsequent data breach. In this notice, Cardiovascular Consultants explains that the incident resulted ...
6 months ago Jdsupra.com
Ransomware victims targeted by fake hack-back offers - Some organizations victimized by the Royal and Akira ransomware gangs have been targeted by a threat actor posing as a security researcher who promised to hack back the original attacker and delete stolen victim data. Both Royal and Akira ransomware ...
5 months ago Bleepingcomputer.com
D-Link confirms data breach after employee phishing attack - Taiwanese networking equipment manufacturer D-Link confirmed a data breach linked to information stolen from its network and put up for sale on BreachForums earlier this month. The attacker claims to have stolen source code for D-Link's D-View ...
7 months ago Bleepingcomputer.com
Europol confirms web portal breach, says no operational data stolen - Europol, the European Union's law enforcement agency, confirmed that its Europol Platform for Experts portal was breached and is now investigating the incident after a threat actor claimed they stole For Official Use Only documents containing ...
1 month ago Bleepingcomputer.com
Europol confirms web portal breach, says no operational data stolen - Europol, the European Union's law enforcement agency, confirmed that its Europol Platform for Experts portal was breached and is now investigating the incident after a threat actor claimed they stole For Official Use Only documents containing ...
1 month ago Bleepingcomputer.com
Ticketmaster confirms massive breach after stolen data for sale online - Live Nation has confirmed that Ticketmaster suffered a data breach after its data was stolen from a third-party cloud database provider, which is believed to be Snowflake. While the breach has allegedly exposed the data of over 560 million ...
1 month ago Bleepingcomputer.com
Hacker leaks millions of new 23andMe genetic data profiles - A hacker has leaked an additional 4.1 million stolen 23andMe genetic data profiles for people in Great Britain and Germany on a hacking forum. Earlier this month, a threat actor leaked the stolen data of 1 million Ashkenazi Jews who used 23andMe ...
7 months ago Bleepingcomputer.com
Data allegedly stolen in Ticketmaster hack - A group of hackers say they have stolen the personal details of 560 million Ticketmaster customers. ShinyHunters, the group claiming responsibility, says the stolen data includes names, addresses, phone numbers and partial credit card details from ...
1 month ago Packetstormsecurity.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)