Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Tech Giants Among Those Affected By Breach At PDF Signature Software Maker Nitro

Tech Giants Among Those Affected By Breach At PDF Signature Software Maker Nitro

UPDATED A data breach at PDF services firm Nitro Software may have affected millions of users including workers at Microsoft, Google, and Chase Bank.

Nitro’s software is used to create, edit, or sign PDFs or other digital documents.

Last week Nitro issued a statement admitting it had suffered a data breach while playing down its significance. The statement referred to an unauthorized third party gaining “limited access to a Nitro database”.

The database was said to relate primarily to Nitro’s free online products and not to contain either user or customer documents.

The incident, however, may be more significant that Nitro’s initial statement implies.

According to threat intelligence firm Cyble, a threat actor is reportedly selling user and document databases, as well as 1TB of documents, stolen from Niro’s cloud service.

There are said to be 70 million user records containing email addresses, full names, company names, password hashes, IP addresses, and other system-related data up for auction.

Also Read: What is Pentest Report? Here’s A Walk-through

Business customers heavily affected

Cyble has added data pertaining to the breach to its AMIBreached.com service. Many of the records on the compromised database relate to Fortune 500 companies, including tech giants Google and Apple.

Nitro has more than 10.500 business customers and 1.8m licensed users worldwide, though how many of them use Nitro Cloud rather than its Nitro Productivity Suite or other offerings remains unclear.

“From the samples of the database shared with BleepingComputer, the document titles alone disclose a great deal of information about financial reports, M&A activities, NDAs, or product releases,” Bleeping Computer reports.

Cyble told The Daily Swig: “Considering the scale and extent of the breach, this is one of the worst breaches Cyble has seen in the last few years. The cybercriminals were not only able to access sensitive account details on millions of users, but also the information related to shared documents as well. Almost all Fortune 500 organizations are affected by this breach.”

The Daily Swig asked Nitro to comment on reports that the scope of its recent breach might be greater than initially seemed the case.

Nitro initially responded with a statement reiterating what it said last week before offering an updated and expanded comment (extract below) on the incident on Wednesday:

Nitro continues to investigate an isolated security incident involving limited access to a Nitro database by an unauthorised third party.

The incident database does not contain any user or customer documents, which are hosted in a separate database in a different location.

The incident database is primarily used for service logging purposes related to Nitro’s popular free online document conversion services.

There is currently no established evidence that any sensitive or financial data relating to customers has been compromised. There is no impact to Nitro Pro or Nitro Analytics.

Nitro’s environment was fully secured immediately after the incident was identified. While the incident database does not contain sensitive or financial information, and passwords are highly encrypted, we are communicating with customers and have implemented a password reset as a precautionary measure.

Further information and updates are available through its website, the software developer added.

In an accompanying statement, Sam Chandler, Nitro Founder and CEO, criticised media reports that suggesting the compromised database housed copies of customer documents.

Also Read: The PDPA Data Breach August 2020: A Recap of 8 Alarming Cases

“Several media articles published in the past 24 hours contain a number of factual inaccuracies regarding this incident,” Chandler said. “The relevant database does not contain copies of user or customer documents. Documents are stored in a separate database in a different location. There is currently no established evidence that this separate database has been compromised. We are providing updates on the incident on our security page.”

The Daily Swig relayed Nitro’s updated statement to Cyble, which told us it was sticking to its warning that documents may have been exposed.

“We have credible intelligence that the documents may have been dumped as part of the cyberattack,” Cyble’s Beenu Arora told The Daily Swig. “While the perpetrators have claimed to gain significant access to the victim’s cloud Infrastructure, the validity of the claims, and the extent of it needs to be investigated.”

“The metadata in the document database (i.e. name field) could give cybercriminals insights on ‘who’ might have access to sensitive documents in an organization (through the ID field in the databases) such as M&A related,” he added.

This story has been updated to add Nitro’s updated statement on the incident and Cyble’s reaction

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us