Article Details
Scrape Timestamp (UTC): 2023-10-18 14:48:17.083
Source: https://www.theregister.com/2023/10/18/dlink_debunks_overblown_data_breach/
Original Article Text
Click to Toggle View
D-Link clears up 'exaggerations' around data breach. Who knew 3 million actually means 700 in cybercrime forum lingo?. D-Link has confirmed suspicions that it was successfully targeted by cyber criminals, but is talking down the scale of the impact. On October 1, word of a data breach spread after a post on a hacking forum claimed to be selling 3 million lines of customer information as well as D-View source code for a one-time $500 fee. D-Link's public disclosure confirmed it became aware of the incident on October 2 and with the help of investigators called in from Trend Micro, the company determined the actual number of stolen records to be around the 700 mark – substantially off the previously advertised total. The business said "internal and external" probes had identified "numerous inaccuracies and exaggerations" in the hacking forum post's claim. It also said the data was not stolen from the cloud per some allegations, but instead originated from a test lab environment of an old D-View 6 system – a model that went EOL in 2015 – via a phishing attack on an employee. "The data was used for registration purposes back then. So far, no evidence suggests the archaic data contained any user IDs or financial information," it said. "However, some low-sensitivity and semi-public information, such as contact names or office email addresses, were indicated." D-Link also believes that some of the data included in the leak, such as last login timestamps, had been manipulated to make the records seem more recent than they actually were. What isn't addressed in D-Link's extensive disclosure is the allegations made by the cybercriminals that the stolen data included details on Taiwan government officials and D-Link staff. The Register contacted D-Link for clarification but it did not respond at the time of publication. The disclosure confirmed that most of the company's current users are thought to be unaffected by the incident. D-Link said that after becoming aware of a possible breach, it immediately shut down the servers believed to have been affected, blocked all accounts other than two used for the investigation, and took the test lab offline. It said that from now on, it would do regular audits of outdated data and delete it where necessary to prevent similar incidents. "Despite the company's systems meeting the information security standards of that era, it profoundly regrets this occurrence," it said. "D-Link is fully dedicated to addressing this incident and implementing measures to enhance the security of its business operations. After the incident, the company promptly terminated the services of the test lab and conducted a thorough review of the access control. Further steps will continue to be taken as necessary to safeguard the rights of all users in the future."
Daily Brief Summary
D-Link, the networking hardware manufacturer, has admitted to a data breach but disputes the reported scale of the intrusion.
An alert about the attack emerged on a hacking forum on October 1 where the attacker claimed to be selling 3 million lines of customer data along with D-View source code for $500.
D-Link disclosed on October 2 that it had indeed been targeted, but with the help of external investigators, the company concluded that the actual number of stolen records was about 700.
It also refuted claims that the data was stolen from the cloud and pointed out that the information had been obtained from a test lab environment of an old D-View 6 system through a phishing attack on an employee.
The company believes some of the leaked data, such as last login timestamps, may have been manipulated to appear more recent than they actually are.
D-Link did not comment on the hacker's claim that the stolen data included details on Taiwan government officials and D-Link staff.
Most of the company's current users are believed to be unaffected by the incident. After learning of the breach, the company immediately blocked all accounts and took the test lab offline. It is committing to regular audits of outdated data and will delete it where necessary to prevent similar incidents.