DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Hacker claims Comcast breach linked to unpatched Zimbra vulnerability noted by NullCrew

Posted on November 12, 2015 by Dissent

There’s a new claim in the Comcast breach first reported by Steve Ragan. Darren Pauli reports that a hacker claiming responsibility for the breach notes that it was NullCrew’s hack and taunting of Comcast in 2014 that set the stage for the theft of hundreds of thousands of users’ information. Well, that and Comcast’s failure to have patched promptly when a fix for the vulnerability had been issued prior to the hack.  And of course, storing passwords in plain text didn’t help.

The hacker, using the handle “Orion,” reportedly told The Register:

“So in 2013 December the f****s at NullCrew came across an exploit for Zimbra which Comcast used at this domain *****.comcast.net ,” Orion says.

“NullCrew only got [about] 27k emails with no passwords lol while I got 800k with only 590k users with plaintext passwords.”

The Zimbra vulnerability that NullCrew allegedly exploited, CVE-2013-70911, had been disclosed in December, 2013, and a fix was already available prior to the hack.

The Comcast hack was first disclosed on Twitter in February, 2014, as I had reported here. At the time, Comcast did not seem to respond immediately to the claimed hack, and Violet Blue noted that the lack of immediate response might have consequences:

During that 24 hours, Comcast stayed silent, and the veritable “keys to the kingdom” sat out in the open internet, ripe for the taking by any malicious entity with a little know-how around mail servers and selling or exploiting customer data.

Comcast customers have not been not told to reset their passwords. But they should.

Violet Blue’s comments seem spot on, as Orion claims to have taken advantage during the period that Comcast did not respond to the February 6 announcement by NullCrew. And unlike NullCrew, who seemed more interested in embarrassing companies and making a point instead of actually stealing tons of data and misusing it for commercial gain, Orion may have had a different intent.

Whether “Orion’s” disclosure and claims pose additional problems for Timothy French, now in federal prison awaiting trial for his hacking activities with NullCrew, remains to be seen, but the claims call into question Comcast’s statement that they were not responsible for the breach and that perhaps their customers had downloaded malware from somewhere. If Orion’s claims are accurate, Comcast would appear more responsible for failure to fix the Zimbra vulnerability and failure to respond faster when NullCrew taunted them and then started posting some data to show that they had access.

So yes, Comcast may not have had a recent hack/breach of their system that accounts for a lot of the stale data for sale, but they may have been more responsible than they have acknowledged so far.

Category: Business Sector

Post navigation

← Oz railway lets newspaper photograph train keys
Q3 2015 Data Breach QuickView Report – A Record Breaking Year in the Making →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Major trial underway for data leak that left 72,000 victims in France
  • Anubis: A Closer Look at an Emerging Ransomware with Built-in Wiper
  • HealthEC Agrees to $5.48 Million Settlement to End Data Breach Lawsuit
  • US offering $10 million for info on Iranian hackers behind IOControl malware
  • Sompo Japan Insurance submits improvement plan after info leakage
  • Moreno Valley, Calif., Schools Report Data Breach
  • The Growing Cyber Risks from AI — and How Organizations Can Fight Back
  • Credit Control Corporation data allegedly from 9.1 million consumers listed for sale on forum
  • Copilot AI Bug Could Leak Sensitive Data via Email Prompts
  • FTC Provides Guidance on Updated Safeguards Rule

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Your household smart products must respect your privacy – including your air fryer
  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation
  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.
Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report