Hackers have swiped a database full of customer information from PR Newswire in an attack that may be related to the group behind the attacks on Adobe Systems and other companies.
The database was found on the same server as the stolen source code for numerous Adobe products, including Adobe Acrobat and ColdFusion, according to security firm Hold Security, which investigated the situation and believes the PR Newswire attack to be far from random.
“There is evidence, dated February 13, 2013, of a large-scale attack targeting PR Newswire’s multiple networks hitting over 2,000 IP addresses using ColdFusion exploits,” according to the Hold Security blog. “The attack was sourced from a different server also used by the same group of hackers. If this attack resulted in a breach, it is possible that the hackers had access to PR Newswire infrastructure longer than previously thought.”
The group behind the Adobe attacks was previously connected to the theft of information from several major data aggregators, including LexisNexis and Dun & Bradstreet. The attacks were uncovered after an investigation by security reporter Brian Krebs and Hold Security.
In response to the revelations, PR Newswire CEO Ninan Chacko blogged that the database in question primarily houses access credentials and contact information for some of the company’s customers in Europe, Africa, India and the Middle East.
“We are conducting an extensive investigation and have notified appropriate law enforcement authorities,” he wrote. “Based on our preliminary review, we believe that customer payment data were not compromised.”
“As a precautionary measure, we have implemented a mandatory password reset for all customers with accounts on this database,” he continued. “As a general practice, we recommend that our customers use strong passwords and regularly update them, not just on PR Newswire but on any website requiring login credentials. From an internal perspective, we continue to implement security improvements and additional protocols to help further protect user portals and customer and proprietary information.”
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- Skybox Security Raises $50M, Hires New CEO
- Spies, Hackers, Informants: How China Snoops on the US
- Australian Man Sentenced for Scam Related to Optus Hack
- Chrome 110 Patches 15 Vulnerabilities
- Application Security Protection for the Masses
- Tor Network Under DDoS Pressure for 7 Months
- Siemens License Manager Vulnerabilities Allow ICS Hacking
- UN Experts: North Korean Hackers Stole Record Virtual Assets
