Vulnerabilities / Threats

9/16/2017
08:30 AM
50%
50%

OurMine Claims Vevo Hack, Releases 3.12TB of Data

Group known for claiming responsibility for hacking Mark Zuckerberg's Twitter account and the WikiLeaks' DNS attack says it's behind the Vevo breach.

A massive security breach hit entertainment company Vevo, with approximately 3.12TB of its documents and files pilfered and posted online, according to Gizmodo.

Vevo, a joint-venture comprised of Universal Music Group, Alphabet, Sony Music Entertainment, Abu Dhabi Media, and Warner Music Group, confirmed the breach and attributed it to a LinkedIn-related phishing scam, Gizmodo says.

OurMine, which claimed responsibility for hacking Mark Zuckerberg's Twitter account and other notable hacks, says it is also responsible for the Vevo hack.

The released documents include promotional materials, videos, weekly music charts, and office documents as well as sensitive material like instructions for setting the alarm at a Vevo facility, the report says.

Read more about the Vevo hack here.

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Damien-metlife
50%
50%
Damien-metlife,
User Rank: Apprentice
9/20/2017 | 5:44:52 AM
Re: End the Risk and Repercussions of Hacks
This leak is very impressive ! 
ASD459
50%
50%
ASD459,
User Rank: Apprentice
9/19/2017 | 5:05:23 PM
More hacking, eh?
Its amazing how even powerful and wealthy people are so powerless against these hackers. I actually had to change my messenger app so make sure the data i was transferring b/w me and my wife was secure. Follow these Peerio guys, they might be the next big thing in security. Facebook should invest in security.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
9/19/2017 | 8:01:59 AM
Phishing
Just shows you how powerful phishing can be; leveraging the human element to subvert security safeguards. I wonder what Vevo's network segmentation looked like?
mjohnson681
50%
50%
mjohnson681,
User Rank: Apprentice
9/18/2017 | 8:24:27 PM
End the Risk and Repercussions of Hacks
Make the data people want to steal worthless by implementing proper controls, devaluing the data to criminals.

https://www.linkedin.com/pulse/give-up-cybersecurity-programs-matthew-r-johnson-cpa-cisa 
6 Ways Greed Has a Negative Effect on Cybersecurity
Joshua Goldfarb, Co-founder & Chief Product Officer, IDRRA ,  6/11/2018
Weaponizing IPv6 to Bypass IPv4 Security
John Anderson, Principal Security Consultant, Trustwave Spiderlabs,  6/12/2018
'Shift Left' & the Connected Car
Rohit Sethi, COO of Security Compass,  6/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12026
PUBLISHED: 2018-06-17
During the spawning of a malicious Passenger-managed application, SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows such applications to replace key files or directories in the spawning communication directory with symlinks. This then could result in arbitrary reads and writes, which in tur...
CVE-2018-12027
PUBLISHED: 2018-06-17
An Insecure Permissions vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 causes information disclosure in the following situation: given a Passenger-spawned application process that reports that it listens on a certain Unix domain socket, if any of the parent directories of said ...
CVE-2018-12028
PUBLISHED: 2018-06-17
An Incorrect Access Control vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows a Passenger-managed malicious application, upon spawning a child process, to report an arbitrary different PID back to Passenger's process manager. If the malicious application then generates an e...
CVE-2018-12029
PUBLISHED: 2018-06-17
A race condition in the nginx module in Phusion Passenger 3.x through 5.x before 5.3.2 allows local escalation of privileges when a non-standard passenger_instance_registry_dir with insufficiently strict permissions is configured. Replacing a file with a symlink after the file was created, but befor...
CVE-2018-12071
PUBLISHED: 2018-06-17
A Session Fixation issue exists in CodeIgniter before 3.1.9 because session.use_strict_mode in the Session Library was mishandled.