Security

Cyber-crime

D-Link clears up 'exaggerations' around data breach

Who knew 3 million actually means 700 in cybercrime forum lingo?


D-Link has confirmed suspicions that it was successfully targeted by cyber criminals, but is talking down the scale of the impact.

On October 1, word of a data breach spread after a post on a hacking forum claimed to be selling 3 million lines of customer information as well as D-View source code for a one-time $500 fee.

D-Link's public disclosure confirmed it became aware of the incident on October 2 and with the help of investigators called in from Trend Micro, the company determined the actual number of stolen records to be around the 700 mark – substantially off the previously advertised total.

The business said "internal and external" probes had identified "numerous inaccuracies and exaggerations" in the hacking forum post's claim.

It also said the data was not stolen from the cloud per some allegations, but instead originated from a test lab environment of an old D-View 6 system – a model that went EOL in 2015 – via a phishing attack on an employee.

"The data was used for registration purposes back then. So far, no evidence suggests the archaic data contained any user IDs or financial information," it said.

"However, some low-sensitivity and semi-public information, such as contact names or office email addresses, were indicated."

D-Link also believes that some of the data included in the leak, such as last login timestamps, had been manipulated to make the records seem more recent than they actually were.

What isn't addressed in D-Link's extensive disclosure is the allegations made by the cybercriminals that the stolen data included details on Taiwan government officials and D-Link staff.

The Register contacted D-Link for clarification but it did not respond at the time of publication. 

The disclosure confirmed that most of the company's current users are thought to be unaffected by the incident.

D-Link said that after becoming aware of a possible breach, it immediately shut down the servers believed to have been affected, blocked all accounts other than two used for the investigation, and took the test lab offline. 

It said that from now on, it would do regular audits of outdated data and delete it where necessary to prevent similar incidents.

"Despite the company's systems meeting the information security standards of that era, it profoundly regrets this occurrence," it said. 

"D-Link is fully dedicated to addressing this incident and implementing measures to enhance the security of its business operations. After the incident, the company promptly terminated the services of the test lab and conducted a thorough review of the access control. Further steps will continue to be taken as necessary to safeguard the rights of all users in the future." ®

Send us news
5 Comments

Hershey phishes! Crooks snarf chocolate lovers' creds

Stealing Kit Kat maker's data?! Give me a break

Okta data breach dilemma dwarfs earlier estimates

All customer support users told their info was accessed after analysis oversight

23andMe responds to breach with new suit-limiting user terms

Also: 'well-known Bay Area tech' firm's laptops stolen and check out some critical vulns

Yet another UK public sector data blab, this time info of pregnant women, cancer patients

NHS Trust admits highly sensitive data left online for nearly three years

A year on, CISA realizes debunked vuln actually a dud and removes it from must-patch list

Apparently no one thought to check if this D-Link router 'issue' was actually exploitable

BlackCat ransomware crims threaten to directly extort victim's customers

Accounting software firm Tipalti says it’s investigating alleged break-in of its systems

EU lawmakers finalize cyber security rules that panicked open source devs

PLUS: Montana TikTok ban ruled unconstitutional; Dollar Tree employee data stolen; critical vulnerabilities

Regulator says stranger entered hospital, treated a patient, took a document ... then vanished

Scottish health group to tweak security checks, access authorization to avoid a repeat

Admin of $19M marketplace that sold social security numbers gets 8 years in jail

24 million Americans thought to have had their personal data stolen and sold for pennies

British Library begins contacting customers as Rhysida leaks data dump

CRM databases were accessed and library users are advised to change passwords

Ukraine cyber spies claim Putin's planes are in peril as sanctions bite

Aeroflot fleet still has a smoking section, but not for tobacco

US nuke reactor lab hit by 'gay furry hackers' demanding cat-human mutants

Staff records swiped, leaked by gang who probably read one too many comics, sorry, graphic novels