DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Dell notifies customers of breach; seller “Menelik” is ShinyHunters (2)

Posted on May 10, 2024 by Dissent

On April 28, a new forum user on BreachForums called “Menelik” claimed to have 49 million Dell Technologies customer records for sale.

The Daily Dark Web provided a screencap and details from the listing.  The customer data purportedly includes data between 2017 and 2024, with “full names, addresses, cities, provinces, postal codes, countries, unique 7-digit service tags of systems, system shipment dates (warranty start), warranty plans, serial numbers (for monitors), Dell customer numbers, and Dell order numbers.”

Yesterday, Dell notified customers of the incident (see screencap).

Menelik updated their listing by using Dell’s notification as confirmation of their claims and reiterated their claims about the data, specifying data types and adding:

Top 5 countries with most systems:

  1. United States
  2. China
  3. India
  4. Australia
  5. Canada
  • About 7 Million rows of the data are individuals/personal purchases
  • 11 Million are consumer segment companies
  • Rest is enterprise clients, partners, educational institutions and others that I could not identify easily

They also explain the disappearance of the original thread from the forum:

My old thread was removed by Breached mods (due to expired sample link) so some people thought this data was sold.

But no, I am still the sole owner of this data. I am planning to sell it to 1 individual only.

I don’t have email/phone number for this 49 million but I do have email & phone number of some several thousand customers. All recent.

Dell’s notice (see screencap) suggests that there is little risk to customers, but recognizes that the data might be used as part of phone scams or other schemes.  Dell declined Bleeping Computer’s request for more details about the incident and the number affected, telling them they “are not disclosing this specific information from our ongoing investigation.”

“Menelik” is “ShinyHunters”

The name “Menelik” may not be familiar to most people, but DataBreaches can reveal that this attack was the work of ShinyHunters. They informed DataBreaches about it at the time after being unable to get Dell to respond to them via multiple contact attempts and email addresses.

DataBreaches emailed Dell last night to ask about their policy concerning contacts by threat actors — whether they read communications but don’t respond or whether they don’t even read communications from what might be individuals who have hacked them.  In that email, DataBreaches also noted that ShinyHunters informed this site that they found a second vulnerability and claimed they had already started exploiting it to exfiltrate data. They did not provide any proof of claim at this time. DataBreaches asked Dell whether if ShinyHunters contacts Dell again, Dell would read the communications.

No reply has been received by publication.


Updates:  Post-publication, Dell responded:

Our program includes prompt assessment and response to identified threats and risks. We are not disclosing any information that could compromise the integrity of our ongoing investigation or any investigations by law enforcement.

Update 2: Bleeping Computer published more details about the attack and Shiny Hunters’ attempts to get Dell to respond prior to putting the data up for sale.

Category: Business SectorHackU.S.

Post navigation

← TCS Employee Suspended After Reporting a Security Incident, Reddit Post Goes Viral
Au: Shock for customers as personal details leaked in worrying breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hack of Opexus Was at Root of Massive Federal Data Breach
  • ‘Deep concern’ for domestic abuse survivors as cybercriminals expected to publish confidential abuse survivors’ addresses
  • Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms
  • Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • Privilege Under Fire: Protecting Forensic Reports in the Wake of a Data Breach
  • Hacker who breached communications app used by Trump aide stole data from across US government
  • Massachusetts hacker to plead guilty to PowerSchool data breach (1)
  • Cyberattack brings down Kettering Health phone lines, MyChart patient portal access (1)
  • Gujarat ATS arrests 18-year-old for cyberattacks during Operation Sindoor

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.