DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Update to the Tic Hosting Solutions data incident

Posted on February 19, 2024 by Dissent

On April 30, 2023, DataBreaches reported an alleged data breach involving TorchByte (formerly known as Tic Hosting Solutions). At the time, DataBreaches had been unable to reach the firm, and the Romanian data protection authority informed DataBreaches that they had received no report from them of any  breach. But the screenshots provided to this site by a third party seemed to suggest that something had happened, although what happened seemed to be in dispute.

DataBreaches reported again on February 6 after the same source for the original story contacted this site again. This time, with the help of Daniel-Alexandru Munteanu, we were able to get a response from TorchByte, who claimed they never got our original inquiries and apologized for the delay in responding.  The following is a statement sent to DataBreaches by Stefan Straton in response to the allegations covered in the two articles:

First of all, the vulnerability was a misconfigured PHP server that leaked database credentials for our beta VPS management platform, which were then used to extract a copy of said database. Thankfully, the threat actors were not able to use the authentication tokens for the virtualization nodes present in the database because our firewall rejected external traffic. Also, as soon as we received a copy of our database from, possibly, one of the attackers on Discord, we sent a notice to DNSC (Romanian national cyber security and incident response team) via email and we confirmed that the personal data included in the leak was nothing more than 45 email addresses and usernames of people that participated in the beta.

In follow-up correspondence, Stefan Straton added that they had notified DNSC one or two days after the database was posted on a public forum and they discovered the post’s URL. Straton says that the firm never received any reply from DNSC, and at that time did not think they should have reported the same incident to multiple authorities.

Straton also provided more details to explain what had been submitted to DataBreaches:

The explanation we were able to find for the screenshot of the administrative panel is that the threat actors using a browser extension as ModResponse [1] (URL attached) to spoof HTTP responses from our API using the extracted database, as there were no unusual logins into any of the administrator accounts.

Access to the database was gained a few weeks before our UPS failed and corrupted our disks. It seems that the attackers waited for the right time to announce their presence, making it look like they were the ones to damage our systems. The UPS that failed that day was known to cause problems, as it would also cause some of our servers to restart when under higher loads and a UPS replacement was meant to be done by our colocation provider. Unfortunately, the replacement was not done soon enough.

The vulnerability was fixed before we got the management platform back up.

In  response to the third party’s comment that the vulnerability was still not fully resolved, Straton wrote:

We confirm that there were many attempts to use the same vulnerability since then, but they were not successful and the IP addresses where the HTTP requests originated from were reported to their ISP.

Data recovery was done for 75-80% of the affected services thanks to the off-site backup being recent enough for our customers to be willing to restore it. Customers who were not happy with the backups available / newer customers that have not been through a backup at that time (back then, these off-site backups were done weekly) were helped by us to recreate their lost data (such as websites and plugins for game servers). Nonetheless, all services offered by us were extended by 14 days free of charge.

Also, we have never asked our customers to leave fake, positive reviews on our Trustpilot page. In the screenshot presented on your website, we were offering all reviewers (positive and negative) a reward for their time. We understand that this was wrong and may have influenced opinions when writing reviews and will refrain from doing similar things in the future.

DataBreaches asked Straton whether they thought the third party who was contacting this site was a competitor or someone with a grudge. He declined to speculate.

 

Category: Breach IncidentsOther

Post navigation

← Updating: Prince George’s County Public Schools breach affected almost 100,000
Developing: LockBit disrupted by law enforcement →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Massachusetts hacker to plead guilty to PowerSchool data breach
  • Cyberattack brings down Kettering Health phone lines, MyChart patient portal access (1)
  • Gujarat ATS arrests 18-year-old for cyberattacks during Operation Sindoor
  • Hackers Nab 15 Years of UK Legal Aid Applicant Data
  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand
  • UK: Post Office to compensate hundreds of data leak victims
  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.