DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Have you googled your site to see if you’ve been hacked?

Posted on April 9, 2015 by Dissent

It’s 2015, and too many entities still don’t seem to know to do Google searches or Pastebin searches on themselves to find out if they’ve been hacked or their data dumped somewhere. There’s no way this blog can report on them all or even alert them all, but one of today’s examples is WAYEB, the European Association of Mayanists.

I know, I know: who’d want to hack a non-profit group of folks interested in the Mayan culture, right?  But being an academically oriented organization does not immunize you from those who run around testing for SQL injection vulnerabilities.

On April 5, a hacker who tweets as “Jabb” (@Versifyings on Twitter) dumped hundreds of records of WAYEB members on Pastebin. The records, from what appears to be a backup database,  included 237 members’ e-mail addresses, clear text passwords, and phone number(s). An additional 240 records included e-mail addresses, usernames, and once again, clear text passwords.

No financial information was dumped.

This was not the first time wayeb.org was hacked and data dumped, as DataBreaches.net pointed out to WAYEB in a notification alert last night.

WAYEB did not acknowledge or respond to the e-mail notification, but I see that all of the pastes that had been specifically mentioned in the e-mail notification have been removed overnight, so they likely did receive the alert. Whether they intend to notify all those whose email addresses, usernames, and clear-text passwords were exposed is unknown to DataBreaches.net, but it would be prudent to do so as people continue to re-use passwords across sites, despite repeated warnings to the contrary. DataBreaches.net does not know whether WAYEB also intends to report the breach to any EU data protection authorities.

In the meantime, when was the last time you checked to see if your organization’s information or records had been dumped on Pastebin or if they show up in a Google search for your domain? Even if you don’t collect or store financial data, think of what’s involved in notifying everyone whose personal information has been publicly dumped. And think of what data protection regulators might put you through.

Isn’t it worth checking regularly?

Update: Chris Walshman reminds me that haveibeenpwned.com is also a great site to check.

Related posts:

  • Forbes Breach Email Statistics
  • TeamGhostShell posts “master list” of 548 leaks (so far)
  • Operation Islam v Operation Israel Results
  • 236,351 Accounts From Polish Forum Gram24
Category: Commentaries and AnalysesHackMiscellaneousNon-U.S.

Post navigation

← French media groups hold emergency meeting in wake of ISIS hacking attack
CareerSource South Florida employee stole and sold identity info on public benefits applicants →

1 thought on “Have you googled your site to see if you’ve been hacked?”

  1. Chris says:
    April 9, 2015 at 11:58 am

    One means folks can use to assist this process a bit comes courtesy of Troy Hunt (@troyhunt), who created https://haveibeenpwned.com/

    You can see if your individual credentials have been exposed, and with appropriate verification can also see if any creds from your domain have. It’s well thought out (IMO), and maintained diligently.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Mississippi Law Firm Sues Cyber Insurer Over Coverage for Scam
  • Ukrainian Hackers Wipe 47TB of Data from Top Russian Military Drone Supplier
  • Computer Whiz Gets Suspended Sentence over 2019 Revenue Agency Data Breach
  • Ministry of Defence data breach timeline
  • Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years
  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The patient data appears fake. (2)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The EU’s Plan To Ban Private Messaging Could Have a Global Impact (Plus: What To Do About It)
  • A Balancing Act: Privacy Issues And Responding to A Federal Subpoena Investigating Transgender Care
  • Here’s What a Reproductive Police State Looks Like
  • Meta investors, Zuckerberg to square off at $8 billion trial over alleged privacy violations
  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.