DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

TIC Hosting Solutions customer data leaked? What, if anything, happened there? (1)

Posted on April 30, 2023 by Dissent

DataBreaches has received a tip that TIC Hosting Solutions in Romania had a recent data breach affecting customer data. The tipster provided an .SQL database called “Galactic” as an example of data being leaked. The users table included usernames and email addresses, including one for “tichhosting.”

This site was unable to reach TIC Hosting Solutions by email as all attempts to email them bounced back with a 550.5.1.2 error message: “Host unknown (Name server: _dc-mx.b987b9d71670.tichosting.ro.: non-recoverable error)

The firm’s status page also confirms that they are having some problems:

System status page has red alert symbol saying "Some services are down." Backup services are down while VPS Nodes and other services appear operational.
Status at 9:00 am Eastern on April 30 shows that some services are down. Image: DataBreaches.net.

But for how long has TIC Hosting Solutions been experiencing problems? Inspection of the database provided to DataBreaches shows the most recent time stamp was April 22. What occurred on or after that date?

DataBreaches is attempting to get more information and will update this post if more details are received. For now, however, it is important to note that the firm does not appear to have issued any statement confirming or denying any incident.


Update 1: The person who contacted DataBreaches states that the intervention (as they called it) occurred on the morning of April 23. Four servers were reportedly affected and all customers’ data  — approximately 4TB — and other databases and systems were reportedly taken.

When asked, the individual would not disclose the vulnerability they claim to have exploited, writing, “I can’t disclose it until they fix it and notify customers about it and also provide them with a full statement about the situation.”

According to this individual, TIC has not responded to the accusations about this incident. “They just said that it was a hardware issue and that they would restore the services in the following days but without the data,” the source wrote. They included a screencap from the firm’s Discord as well as screencaps of GalacTIC admin panels.

Announcement of hardware issue by TIC on April 23.

The Romanian notices on Discord did not translate particularly well, but they seemed to be reporting a “power shock” that affected storage devices. There did not seem to be any mention of it being a cyberattack. Nor was there any mention of data exfiltration.  And according to the source, there were no further notices about the problem and the chats were locked so that people could not respond.

Administrative panel for GalacTIC shows Hostname, Type, Owner, IP addres, UUID, and Status for three of 47 users. Redacted by DataBreaches.net
One of the screencaps provided to DataBreaches showed the administrative panel for GalacTIC with hostname, type, owner, IP address, UUID, and active status. Redacted by DataBreaches.net.

Because DataBreaches was unable to email TIC Hosting Solutions and unable to post on Discord, DataBreaches sent an email to the Gmail address of one of the administrators. The Gmail address had been listed in the GalacTIC users table. No reply was immediately received.

The source says there are over 300 affected customers.

DataBreaches will provide further updates if more information becomes available.

——–

See the update to this published on February 19, 2024.



			
Category: Business SectorNon-U.S.

Post navigation

← Amnesty International Australia Suffered a Data Breach in December, but Says Everything is Now Fine
Court records online include private information for thousands of Missouri residents →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide
  • Russian national and leader of Qakbot malware conspiracy indicted in long-running global ransomware scheme
  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach
  • ‘Deep concern’ for domestic abuse survivors as cybercriminals expected to publish confidential abuse survivors’ addresses
  • Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.