HomeData BreachOn-line retailer PcComponentes says data breach claims are pretend

On-line retailer PcComponentes says data breach claims are pretend

PcComponentes, a serious know-how retailer in Spain, has denied claims of a data breach on its techniques impacting 16 million prospects, however confirmed it suffered a credential stuffing assault.

The Spanish e-commerce firm specializes within the sale of computer systems, laptops, peripherals, and {hardware}, and has an estimated 75 million distinctive market guests per 12 months.

Yesterday, a risk actor named ‘daghetiaw’ revealed what they claimed to be a buyer database stolen from PcComponentes, containing 16.3 million data. The risk actor leaked 500,000 data and supplied to promote the remaining to the best bidder.

Wiz

The leaked information incorporates order particulars, bodily addresses, full names, cellphone numbers, IP addresses, product wish-lists, and buyer assist messages exchanged with the agency through Zendesk.

PcComponents data leak on hacker forums
PcComponents information leak on hacker boards
Supply: BleepingComputer

In an announcement in the present day, PcComponents says that it investigated a potential breach of its techniques, however its security consultants discovered no proof of unauthorized entry.

“There was no illegitimate entry to our databases or inner techniques,” the corporate assures, including that “the determine of 16 million supposedly affected prospects is fake, because the variety of lively PcComponentes accounts is considerably decrease.”

See also  Insurance coverage admin Landmark says data breach impacts 800,000 folks

The corporate additionally underlined that no monetary particulars or buyer passwords are saved on its techniques.

Nonetheless, PcComponentes admitted that its investigation found proof of a credential stuffing assault on its platform. Because of this a risk actor tried e-mail addresses and passwords from different security breaches or leaked databases to seek out PcComponentes accounts.

Credential stuffing assaults are usually automated and depend on massive volumes of reused login credentials from different providers.

An investigation from risk intelligence firm Hudson Rock found that the attackers possible collected the login information from computer systems contaminated with info-stealing malware.

“Each single e-mail we checked from the risk actor’s pattern was present in present infostealer logs,” Hudson Rock says in a publish in the present day, including that among the logins had been as previous as 2020.

A screenshot that Hudson Rock revealed reveals a set of six e-mail addresses that had been verified and all of them had been marked as beforehand compromised in infostealer infections.

See also  AI reduces data breach lifecycles and prices

In response to PcComponentes’ announcement, the next information was uncovered for a small variety of compromised accounts:

  • First and final names
  • Nationwide ID quantity
  • Bodily addresses
  • IP addresses
  • E-mail addresses
  • Telephone numbers

In response to the incident, PcComponentes has applied a set of defenses that embody CAPTCHA on the login pages, necessary activation of two-factor authentication (2FA) for all accounts, and invalidation of all lively classes.

Because of this, prospects will probably be robotically logged out, and accounts with out two-factor authentication (2FA) will probably be required to allow it earlier than regaining entry.

PcComponentes additionally recommends that prospects use robust, distinctive passwords for every account, retailer their passwords in a password supervisor, and keep vigilant for potential phishing messages.

BleepingComputer has contacted PcComponentes to ask what number of prospects have been impacted exactly, however an announcement wasn’t instantly obtainable.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular