I-SEC is one of the main providers in the field of aviation security checks according to §5 LuftSiG (German Aviation Security Law) in Frankfurt. Conti threat actors added I-SEC to their leak site and have provided some proof of claim. There is no notice on I-SEC’s website at the time of this publication. DataBreaches.net sent…
Category: Business Sector
Hackers breach MailChimp’s internal tools to target crypto customers
Lawrence Abrams reports: Email marketing firm MailChimp disclosed on Sunday that they had been hit by hackers who gained access to internal customer support and account management tools to steal audience data and conduct phishing attacks. Sunday morning, Twitter was abuzz with reports from owners of Trezor hardware cryptocurrency wallets who received phishing notifications claiming that the company suffered…
Ledger users file a class-action lawsuit against Shopify over a data breach
Ali Raza reports: Shopify, a leading global eCommerce platform, faces a class-action lawsuit filed by users of the Ledger hardware wallet. The lawsuit stems from a major data breach that happened in 2020. The class-action lawsuit was filed at the US District Court of Delaware on April 1. The lawsuit states that Shopify failed to protect the…
Food Delivery Leak Unmasks Russian Security Agents
Russian tech giant Yandex has blamed one of its employees for the hacking and subsequent leak of data from Yandex Food, a popular food delivery service in Russia. Aric Toler reports: Among the many users affected are serving agents of Russia’s security services and military, who in several cases even ordered food to their places of…
Emma Sleep Company admits checkout Magecart attack
Paul Kunert reports: Emma Sleep Company has confirmed to The Reg that it suffered a Magecart attack which enabled ne’er-do-wells to skim customers’ credit or debit card data from its website. Customers were informed of the breach by the mattress maker via email in the past week, with the business saying it was “subject to a cyber…
Fake Trezor data breach emails used to steal cryptocurrency wallets
Lawrence Abrams reports: A compromised Trezor hardware wallet mailing list was used to send fake data breach notifications to steal cryptocurrency wallets and the assets stored within them. Trezor is a hardware cryptocurrency wallet that allows you to store your crypto assets offline, rather than using cloud-based wallets or wallets stored on your PC that…