Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Anonymous Claims Attack on IP Surveillance Firm Brickcom, Leaks Customer Data

Brickcom Corporation, an IP surveillance company headquartered in Taiwan with offices in Dallas, Texas, has suffered an alleged data breach at the hands of Anonymous supporters, who claim to have leaked a customer database.

Brickcom Corporation, an IP surveillance company headquartered in Taiwan with offices in Dallas, Texas, has suffered an alleged data breach at the hands of Anonymous supporters, who claim to have leaked a customer database.

Brickcom has gained granular notoriety in the surveillance space due to their affordable high-resolution (high mega-pixel) equipment, which is used by corporations and law enforcement. Primarily, their core business is in Asia, but they have partnerships in Europe and the U.K., and are making inroads stateside as well.

HackersIn a statement accompanying the alleged leak, Anonymous accuses the company of hubris for statements made in their marketing materials, and said the firm was targeted “solely for the greater glory of Anonymous, the battle for anonymity and against indiscriminate state and corporate surveillance of the public.”

“This leak is a dedication to those who have given up their liberty for the ideals of free speech, and a surveillance free internet. This leak is also dedicated to those who continue to risk their freedom and refuse to be paralyzed by the ever rising levels of paranoia we all feel as we read the news daily.”  

With that said, Anonymous posted 3,400 records, containing what are claimed to be customer email addresses, names, usernames, and passwords. Some of the data points to Brickcom staffers and testing accounts, a few of the records are clearly spam. However, there are some that seem to be legit.

The source of the data appears to be the Brickcom registration form

When asked, the source of the leak would only confirm that there was an issue with the web server’s configuration, and nothing more. “All data that was present on their webserver has been downloaded,” the source said.

Excluding the possibility of SQL Injection vulnerabilities, a configuration issue could be anything from open directories and traversal vulnerabilities, to something more sinister such as Remote File Inclusion, which enables an attacker to upload shell scripts, completely compromising the system.

SecurityWeek has been in touch with Brickcom and will update this story if we get additional information.

Written By

Click to comment

Expert Insights

Related Content

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Cybercrime

Video games developer Riot Games says source code was stolen from its development environment in a ransomware attack

Cybercrime

Artificial intelligence is competing in another endeavor once limited to humans — creating propaganda and disinformation.

Cybercrime

CISA, NSA, and MS-ISAC issued an alert on the malicious use of RMM software to steal money from bank accounts.

Cybercrime

Chinese threat actor DragonSpark has been using the SparkRAT open source backdoor in attacks targeting East Asian organizations.