CyberInsecure.com

Daily cyber threats and internet security news: network security, online safety and latest security alerts
May 6th, 2008

Stolen Business And Personal Data Found On Open Botnet Server

Net security firm Finjan recently discovered a server with 5,388 compromised unique log files containing both email communications and web-related data. Information on the server included business and customer data from 40 top-tier global businesses, including healthcare providers. It reckons the data was amassed in less than a month.

The hacker-controlled server was running a botnet command and control application. In addition, the compromised system was used as a “drop site” for private information. Compromised information included patient data, business email and bank customer data. The compromised data and the Command and Control applications were detected by Finjan using its code inspection technology.

The compromised data was left in plain view on the hacker-controlled server, without any access restrictions or encryption. Thus the sensitive information was available to anyone who came across the server, not just the hackers who controlled it.

Finjan notified the affected financial institutions, located in the US, Europe and India, and law enforcement agencies prior to issuing an alert on the attack on Tuesday.

Share this item with others:

More on CyberInsecure:
  • Facebook Is Used As Command And Control Channel For Crimeware Distributors
  • Antioch University Personal Database Stolen
  • Preventing Email Vulnerabilities In The Business World
  • Personal Information Sent To An Analysis Firm Stolen From State Street Corporation
  • Jobs.ie Hacked And Customers CV Data Stolen

  • If you found this information useful, consider linking to it from your own website.
    Just copy and paste the code below into your website (Ctrl+C to copy)
    It will look like this: Stolen Business And Personal Data Found On Open Botnet Server

    Leave a Reply

    Comments with unsolicited links to other resources will be marked as spam. DO NOT leave links in comments. Please leave your real email, it wont be published.

    *
    To prove you’re a person (not a spam script), type the security word shown in the picture. Click on the picture to hear an audio file of the word.