Menu
Hacker steals Bitdefender customer log-in credentials, attempts blackmail

Hacker steals Bitdefender customer log-in credentials, attempts blackmail

The hacker exploited a vulnerability in an outdated software component to extract information from a single server

Digital key

Digital key

A hacker extracted customer log-in credentials from a server owned by Bitdefender that hosted the cloud-based management dashboards for its small and medium-size business clients.

The antivirus firm confirmed the security breach, but said in an emailed statement that the attack affected less than 1 percent of its SMB customers, whose passwords have since been reset. Consumer and enterprise customers were not affected, the company said.

The hacker, who uses the online alias DetoxRansome, first bragged about the breach on Twitter Saturday and later messaged Bitdefender threatening to release the company's "customer base" unless he was paid US$15,000.

To prove his point, the next day he published the email addresses and passwords for two Bitdefender customer accounts and one for an account operated by the company itself.

Travis Doering and Dan McPeake claimed in a blog post that they contacted the hacker, who offered to sell the data to them.

The hacker provided a list of user names and matching passwords for over 250 Bitdefender accounts, some of which were confirmed to be active, the two wrote Wednesday.

Doering and McPeake said that they shared the information with Bitdefender

According to them, when they asked DetoxRansome how he obtained the log-in credentials, he replied that he was "sniffing" one of Bitdefender's "major servers."

Bitdefender confirmed that the attack did not exploit a zero-day vulnerability -- a vulnerability that is previously unknown.

The issue was the result of human error: During an infrastructure increase, a single server was deployed with an outdated software package that had a known flaw, enabling the extraction of information, but not a full system compromise, said Catalin Cosoi, chief security strategist at Bitdefender.

He declined to name the vulnerable package.

The issue was resolved and additional security measures have been put in place to prevent its reoccurrence, the company said in its statement. "Our investigation revealed no other server or services were impacted."

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags intrusionsecuritydata breachbitdefender

Slideshows

Top 50 defining moments of the New Zealand channel in 2016

Top 50 defining moments of the New Zealand channel in 2016

Reseller News looks back on a tumultuous 12 months for the New Zealand channel, assessing the fallout from a year of sizeable industry change. Whether it be local or global mergers and acquisitions, distribution deals or job changes, the channel that started the year differs somewhat to the one set to finish it - Reseller News assesses the key moments that made 2016.​

Top 50 defining moments of the New Zealand channel in 2016
​Hewlett Packard Enterprise honours high achieving NZ channel

​Hewlett Packard Enterprise honours high achieving NZ channel

Hewlett Packard Enterprise honoured its top performing Kiwi partners at the second running of its HPE Partner Awards in New Zealand, held at a glitzy ceremony in Auckland. Recognising excellence across eight categories - from distributors to resellers - the tech giant celebrated its first year as a standalone company, following its official split from HP in 2015.

​Hewlett Packard Enterprise honours high achieving NZ channel
Nutanix treats channel partners to Christmas cruise

Nutanix treats channel partners to Christmas cruise

Nutanix recently took to the seas for a Christmas Cruise around Sydney Harbour with its Australia and New Zealand staff, customers and partners to celebrate a stellar year for the vendor. With the sun out, they were all smiles and mingled over drinks and food.

Nutanix treats channel partners to Christmas cruise
Show Comments