Article Details
Scrape Timestamp (UTC): 2023-10-17 18:51:01.662
Original Article Text
Click to Toggle View
D-Link confirms data breach after employee phishing attack. Taiwanese networking equipment manufacturer D-Link confirmed a data breach linked to information stolen from its network and put up for sale on BreachForums earlier this month. The attacker claims to have stolen source code for D-Link's D-View network management software, along with millions of entries containing personal information of customers and employees, including details on the company's CEO. The stolen data allegedly includes names, emails, addresses, phone numbers, account registration dates, and the users' last sign-in dates. The threat actor provided samples of 45 stolen records with timestamps between 2012 and 2013, which prompted another participant in the thread to comment on the fact that the data looked very old. "I have breached the internal network of D-Link in Taiwan, I have 3 million lines of customer information, as well as source code to D-View extracted from system," the attacker said. "This does include the information of MANY government officials in Taiwan, as well as the CEOs and employees of the company." The data has been available for purchase on the hacking forum since October 1st, with the threat actor demanding $500 for the stolen customer information and the alleged D-View source code. Data stolen from a "test lab" system D-Link said the security breach occurred due to an employee falling victim to a phishing attack, granting the attacker access to the company's network. In response to the breach, the company immediately shut down potentially impacted servers and disabled all but two user accounts used during the investigation. While it confirmed the breach, D-Link specified that the intruder accessed a product registration system within what it described as a "test lab environment," operating on an outdated D-View 6 system that reached the end of life in 2015. The reason why an end-of-life server was still operational on D-Link’s network, potentially remaining exposed to Internet access for seven years, remains unclear. Contrary to the attacker's claim of stealing millions of users' data, D-Link said the compromised system contained roughly 700 records, with info on accounts that have been for at least seven years. "Based on the investigations, however, it only contained approximately 700 outdated and fragmented records that had been inactive for at least seven years," D-Link said. "These records originated from a product registration system that reached its end of life in 2015. Furthermore, the majority of the data consisted of low-sensitivity and semi-public information." D-Link also suspects the threat actor deliberately tampered with the recent login timestamps to create the illusion of a more recent data theft. Additionally, the company stated that most of its existing customers are unlikely to be impacted by this incident.
Daily Brief Summary
Taiwanese networking equipment manufacturer, D-Link, confirmed a data breach earlier this month. Reportedly, an employee fell prey to a phishing attack, allowing an attacker to access the company's network.
The attacker claims to have stolen source code for D-Link's network management software, D-View, along with millions of entries containing customers' and employees' personal information, including names, emails, addresses, phone numbers, account registration dates, and last sign-in dates; records span from 2012 to 2013.
Despite the attacker’s claim of three million breached lines of information, D-Link stated that the compromised system only contained about 700 inactive, outdated, and fragmented records.
According to D-Link, the server infiltrated was an out-of-date "test lab environment" running an end-of-life D-View 6 system. However, reasons for its ongoing operation, potentially granting internet access despite being decommissioned in 2015, remain unknown.
D-Link speculates that the attacker intentionally tampered with login timestamps, creating an illusion of more recent data theft. However, it assured that the majority of its present customers are unlikely to be impacted by this incident.