DriveSure, a company that helps car dealerships sell and maintain customers, got 3. two million customer records leaked out this month. Hackers illegally attained the data and posted this to multiple hacking message boards. The data was offered at no cost and included names, tackles, phone numbers and emails and also vehicle VIN numbers, service records and damage claims. The data included as well information right from large business accounts and military tackles.
The attackers released a 22GB folder that composed of the DriveSure MySQL sources, which subjected 91 hypersensitive databases. The database dump was accompanied by PII, damage cases, extended car information and supplier and warranty info and also 93, 500 http://vpnversed.com/data-room-software-for-creating-companies-wealth/ bcrypt hashed account details, Risk Centered Reliability said in a post on January 4. While security specialists consider bcrypt more secure than SHA1 or MD5, it can still be brute-forced with sufficient processing power.
The attackers posted the databases on Raidforums late last month beneath the username “pompompurin. ” They wrote a lengthy content to explain for what reason they were placing a comment the data, a behavior honestly, that is uncommon meant for hackers. Typically, they only share beneficial segments or perhaps trimmed down versions of user databases.