article thumbnail

The Unattributable "db8151dd" Data Breach

Troy Hunt

It's about a data breach with almost 90GB of personal information in it across tens of millions of records - including mine. Here's what I know: Back in Feb, Dehashed reached out to me with a massive trove of data that had been left exposed on a major cloud provider via a publicly accessible Elasticsearch instance.

article thumbnail

Data Breaches, Class Actions and Ambulance Chasing

Troy Hunt

This post has been brewing for a while, but the catalyst finally came after someone (I'll refer to him as Jimmy) recently emailed me regarding the LOQBOX data breach from 2020. A data breach made you sad and now you want money for being sad? If he's received more spam as a result of a breach, which breach was it?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Data Breach Disclosure Conundrum

Troy Hunt

As it relates to the UK GDPR, there are two essential concepts to understand, and they're the first two bulleted items in their personal data breaches guide : The UK GDPR introduces a duty on all organisations to report certain personal data breaches to the relevant supervisory authority.

article thumbnail

The Unattributable "Lead Hunter" Data Breach

Troy Hunt

Less than 3 weeks ago I wrote about The Unattributable "db8151dd" Data Breach which, after posting that blog post and a sample of my own data, the community quickly attributed to Covve. Many of the other records also contain WHOIS information, but then many others don't.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

The same principle should apply to your most precious data assets. You should restrict access to sensitive information and systems the same way you restrict access to your house. By only giving users access to what they need for their job, you reduce the risk of data breaches and unauthorized modifications.

article thumbnail

T-Mobile Data Breach

Schneier on Security

The trove includes not only names, phone numbers, and physical addresses but also more sensitive data like social security numbers , driver’s license information, and IMEI numbers , unique identifiers tied to each mobile device.

Mobile 362
article thumbnail

The Data Breach "Personal Stash" Ecosystem

Troy Hunt

That's the analogy I often use to describe the data breach "personal stash" ecosystem, but with one key difference: if you trade a baseball card then you no longer have the original card, but if you trade a data breach which is merely a digital file, it replicates.