icon

Digital safety starts here for both commercial and personal Use...

Defend Your Business Against the Latest WNY Cyber Threats We offer Safe, Secure and Affordable Solutions for your Business and Personal Networks and Devices.



WNYCyber is there to help you to choose the best service providers in Western New York... We DO NOT provide the services ourselves, as we are Internet Programmers who have to deak daily with Cyber Threats... (Ugghhh)... So we know what it's like and what it takes to protect OUR and OUR CUSTOMERS DATA... We built this Website to help steer you to those that can give you the best service at realistic and non-inflated prices. We do charge or collect any fees.

FBI Hacker USDOD Leaks Highly Sensitive TransUnion Data

Cyber Security Threat Summary:
Researchers at vx-underground have uncovered a major data breach involving the hacker known as "USDoD," who leaked highly sensitive data from TransUnion, a leading consumer credit reporting agency. The breach exposed personal information of 58,505 individuals globally, including names, passport details, financial data, and more, dating back to March 2022.

"USDoD" is a known cyber threat actor, linked to other high-profile breaches, including one at Airbus, where they compromised an employee's account to access sensitive information on thousands of Airbus vendors.

After the shutdown of the "Breached" forum, "USDoD" and others moved to "BreachForums." Here, they revealed their involvement with the ransomware group Ransomed and exposed Airbus vendor data. They also issued warnings that Lockheed Martin and Raytheon might be next.

In an unusual move, "USDoD" disclosed their intrusion technique, revealing that they gained access to Airbus data through a compromised Turkish airline employee's account, traced back to malware infection resulting from an attempt to download pirated software in August 2023” (SecurityAffairs, 2023).

Security Officer Comments:
Pirated software poses a significant problem because it typically involves unauthorized copies of software obtained from unverified sources. Such software may contain hidden malware or vulnerabilities that can compromise a user's device or network security. Additionally, using pirated software is illegal and can result in legal consequences for individuals and organizations. To ensure the safety and integrity of computer systems, it is essential to use legitimate, licensed software from reputable sources and maintain regular software updates and security patches.

Suggested Correction(s):
Security controls to prevent the use of pirated software are vital because pirated software can contain malware, leading to cyberattacks and security risks. Using such software can also lead to legal and financial repercussions. Additionally, it undermines the software industry's security efforts and limits access to important updates. These controls are essential for protecting systems, ensuring legal compliance, and maintaining cybersecurity.

Link(s):
https://securityaffairs.com/150968/data-breach/transunion-data-leak.html