• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Up to 350,000 Spotify Users Targeted by Credential Stuffers

You are here: Home / General Cyber Security News / Up to 350,000 Spotify Users Targeted by Credential Stuffers

Security researchers have served Spotify tackle a most likely serious credential stuffing campaign right after spotting an unsecured cloud databases that contains hundreds of hundreds of thousands of user information.

The workforce at vpnMentor discovered the database, hosted on a fully unsecured Elasticsearch server, back on July 3.

The 72GB info trove contained above 380 million records, which includes email addresses, countries of residence and usernames and passwords for Spotify people. It claimed all-around 300,000-350,000 people were being impacted.

✔ Approved Seller by TheCyberSecurity.News From Our Partners
Bitdefender Internet Security 2021

Protect yourself against all threads using Bitderender. Get Bitdefender Internet Security with 68% discount from a bitdefender official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Spotify responded to vpnMentor’s outreach promptly, on July 9.

“The exposed database belonged to a 3rd party that was employing it to retailer Spotify login qualifications. These credentials were most probable attained illegally or most likely leaked from other resources that were repurposed for credential stuffing attacks from Spotify,” vpnMentor pointed out.

“In response to our inquiry, Spotify initiated a ‘rolling reset’ of passwords for all users impacted. As a end result, the facts on the databases would be voided and turn out to be useless.”

As well as use the breached qualifications to target other web-sites in credential stuffing strategies, any malicious actors that learned the databases could have sought to sell Spotify top quality account access, or launch comply with-on phishing and identity theft attempts making use of these details and person emails.

“Credentials are a individual area in which buyers are left exposed because they possibly decide on weak passwords, or reuse them across diverse web pages,” argued Javvad Malik, security recognition advocate at KnowBe4.

“It is why it is important that customers have an understanding of the importance of choosing one of a kind and solid passwords across their accounts and the place obtainable enable and use MFA. That way, even if an account is compromised, it is not possible for attackers to use people qualifications to breach other accounts.”


Some parts of this report are sourced from:
www.infosecurity-magazine.com

Previous Post: «Critical Unpatched Vmware Flaw Affects Multiple Corporates Products Critical Unpatched VMware Flaw Affects Multiple Corporates Products
Next Post: UK telcos could be fined £100,000 a day for Huawei ban breaches Uk Telcos Could Be Fined £100,000 A Day For Huawei»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Big Tech Bans Social Networking App
  • Lack of Funding Could Lead to “Lost Generation” of Cyber-Startups
  • Unveiled: SUNSPOT Malware Was Used to Inject SolarWinds Backdoor
  • ‘I’ll Teams you’: Employees assume security of links, file sharing via Microsoft comms platform
  • DarkSide decryptor unlocks systems without ransom payment – for now
  • Researchers see links between SolarWinds Sunburst malware and Russian Turla APT group
  • Millions of Social Profiles Leaked by Chinese Data-Scrapers
  • Feds will weigh whether cyber best practices were followed when assessing HIPAA fines
  • SolarWinds Hack Potentially Linked to Turla APT
  • 10 quick tips to identifying phishing emails

Copyright © TheCyberSecurity.News, All Rights Reserved.