Job-Seeker Data Exposed in Monster File Leak

The job website says it cannot notify users since the exposure occurred on a third-party organization's servers.



An unprotected Web server has been offering information on Monster.com users for some time — and neither Monster nor the third party it says purchased the data has notified the victims.

According to reports, private information on job seekers using the site from 2014 through 2017 exposed includes phone numbers, home addresses, email addresses, and prior work experience. No financial information was included.

"The personally identifiable information typically found on a résumé can lead to account hijacking and highly targeted phishing attacks if it falls into the wrong hands," Vinay Sridhara, CTO of Balbix, told SiliconANGLE. "In fact, a threat actor can have password reset codes sent to a compromised phone number or email for far more sensitive accounts – both personal and professional."

Monster has said it cannot notify users since the exposure occurred on a third-party organization's servers — an unnamed third party with which Monster says it no longer does business. According to Monster, the server was secured after it was notified of the situation.

Read more here and here.

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "8 Ways To Spot an Insider Threat."

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Email This  | 
Print  | 
RSS
More Insights
Copyright © 2019 UBM Electronics, A UBM company, All rights reserved. Privacy Policy | Terms of Service