Articles Uncategorized Hacker steals data from hundreds of Verizon employees

Hacker steals data from hundreds of Verizon employees


The media reported that a hacker had accessed a database that contained the full names, email addresses, corporate IDs and phone numbers of hundreds of Verizon employees.

Journalists from the Vice Motherboard write that last week an anonymous hacker contacted the editorial office, claiming to have compromised Verizon. He claimed to have gained access to the above data by tricking an employee into giving him remote access to his corporate computer. After that, the attacker was able to use Verizon’s internal tool, which shows information about employees, and wrote a script to collect information from the database.

It is not yet clear whether all the data stolen by the criminal is accurate and up-to-date. By calling several numbers, the journalists managed to confirm that some of the information in the database is true. So, four people verified their full names and email addresses and said they worked for Verizon. Another person reported that the data is correct, but he worked for the company before.

“Their employees are idiots who will let you connect to your PC under the guise of an internal support specialist,” the hacker said.

The attacker also stated that he would like to receive a reward of $ 250,000 from Verizon for this “security check”. The company confirmed to reporters that the hacker contacted them.

“We were recently contacted by a scammer who threatened to reveal employee information in exchange for a ransom from Verizon. We do not believe that the scammer has any confidential information and do not plan to interact with this person, ”a company representative said.

While the database does not seem to contain information such as social security numbers, passwords, or bank card numbers, stolen data can still pose a threat, the newspaper notes. For example, this information can be useful to criminals who decide to attack company employees or impersonate a Verizon employee in order to gain access to internal tools.

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat

Eleven vulnerabilities, combined under the name Urgent / 11,...

Why Is It Important To Have Intrusion Detection And Prevention ?

This article describes why detection and prevention of burglaries...

The risk is real: attacks on OT infrastructure

Previously, many believed that attacks on an isolated OT...

Gitpaste-12: Linux bot armed with a dozen exploits

Researchers at Juniper Networks have discovered a Linux scripting...

Saferwall : Open Source Malware Analysis

Saferwall is an open source malware analysis platform. It...

Network Vulnerability Assessment ? Why Should Every Company Do it at least once a Year !

Network vulnerability assessment analyzes a variety of network issues,...

Artificial Intelligence and Cyber Security

As artificial intelligence intrudes into the world of cybersecurity,...

You might also likeRELATED
Recommended to you