[BreachExchange] LAPSUS$ Claims to Have Breached IT Firm Globant; Leaks 70GB of Data
Terrell Byrd
terrell.byrd at riskbasedsecurity.com
Wed Mar 30 09:41:04 EDT 2022
https://thehackernews.com/2022/03/lapsus-claims-to-have-breached-it-firm.html
The LAPSUS$ data extortion gang announced their return on Telegram after a
week-long "vacation," leaking what they claim is data from software
services company Globant.
"We are officially back from a vacation," the group wrote on their Telegram
channel – which has nearly around 54,000 members as of writing – posting
images of extracted data and credentials belonging to the company's DevOps
infrastructure.
The screenshots depict a folder listing for what appears to be different
companies from across the world, including Arcserve, Banco Galicia, BNP
Paribas Cardif, Citibanamex, DHL, Facebook, Stifel, among others.
Also shared is a torrent file purported to contain around 70GB of Globant's
source code as well as administrator passwords associated with the firm's
Atlassian suite, including Confluence and Jira, and the Crucible code
review tool.
As malware research group VX-Underground points out, the passwords are not
only easily guessable, but they have also been reused multiple times,
prompting LAPSUS$ to call out the "poor security practices in use" at the
company. We have reached out to Globant for comment and we will update the
story if we hear back.
The LAPSUS$ extortion group, since their emergence in December 2021, have
been in the spotlight for their headline-grabbing hacks on Impresa, NVIDIA,
Samsung, Vodafone, Ubisoft, Microsoft, and Okta.
The latest data heist arrives as The City of London Police said it arrested
and released seven alleged operatives of the criminal cartel aged between
16 and 21 under investigation last week. But if the latest leak is any
indication, the law enforcement actions have not put a stop to their
operations.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.riskbasedsecurity.com/pipermail/breachexchange/attachments/20220330/b53fb63d/attachment.html>
More information about the BreachExchange
mailing list