MyHeritage Data Breach of 92M Accounts Raises Many Questions

  /     /     /  
Publicated : 22/11/2024   Category : security


MyHeritage Data Breach of 92M Accounts Raises Many Questions


After being contacted by a security researcher, MyHeritage announced that as many as 92 million of its accounts may have been compromised. However, there are more questions that need to be asked about this data breach.



MyHeritage is the latest enterprise facing security repercussions after the company announced this week that as many as 92 million user accounts may have been exposed during a recent data breach.
In an announcement posted on June 4
, the genealogy and DNA testing service site revealed that a security researcher approached its security team on Monday to alert them that customer email addresses and hashed passwords were found on a server outside the business network.
The breach appears to have happened around Oct. 26. Overall, 92,283,889 email address might have been exposed during this time.
Immediately upon receipt of the file, MyHeritages Information Security Team analyzed the file and began an investigation to determine how its contents were obtained and to identify any potential exploitation of the MyHeritage system, according to the companys statement.
(Source:
Wikimedia
)
It does not appear that anyone actually used the compromised data, and MyHeritage has hired a third-party security firm to help investigate.
The saving grace for MyHeritage is that the company did not store the password itself and the passwords were protected using a one-way hash that creates a unique cryptographic key for each customer account.
Now entering its fifth year, the
2020 Vision Executive Summit
is an exclusive meeting of global CSP executives focused on navigating the disruptive forces at work in telecom today. Join us in Lisbon on December 4-6 to meet with fellow experts as we define the future of next-gen communications and how to make it profitable.
In addition, payment information, such as credit card data, is handled by a third party and the most sensitive data -- the genealogical information that users send in to have their DNA tested -- is stored a segregated server that is removed from the systems that store the email addresses.
MyHeritage announced the breach shortly after implementation of the European Unions General Data Protection Regulation (GDPR), which went into effect on May 25. (See
GDPR: SecurityNows Need-to-Know Guide
.)
However, there are serious security questions that a breach of this sizes raises.
Mukul Kumar, the CISO and vice president of Cyber Practices at security firm
Cavirin
, wrote in an email to Security Now that this latest breach shows not only how weak current password techniques are, but the danger of uploading data to the cloud without a better plan to protect it.
A top priority must be to use unique passwords, but even when browsers recommend this, the reality is very different. How many of you reuse the same password across two or more sites? Kumar asked.
The second question is, from where was this data obtained? Kumar added. Does MyHeritage leverage the public cloud? If so, were they following best practices to ensure their cloud security posture, or does this breach follow so many others were cloud storage resources were left unsecured and unencrypted?
MyHeritage is taking additional security steps, such as building in two-factor authentication for customer account, but the company also needs to dig deeper into the enterprise-level security practices.
It appears that good cryptographic practices were in place, such as unique salts. However, the organization fell short in detecting the intrusion and data breach, as evidenced by the seven- month delay, and the fact they were notified by a third party, Rick Moy, the CMO at
Acalvio
, which provides advanced threat detection and defense tools, wrote in an email.
Related posts:
Security Pros Have Double Standards When It Comes to Breaches
Kaspersky: Data Breaches Cost Enterprises $1.23M
TeenSafe Data Leak Shows Cloud Security Weaknesses
Equifax Filing Sheds Light on 2017 Data Breach Carnage
— Scott Ferguson is the managing editor of Light Reading and the editor of
Security Now
. Follow him on Twitter
@sferguson_LR
.

Last News

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
MyHeritage Data Breach of 92M Accounts Raises Many Questions