Security Breach – 26th April 2022

Bad actors don’t always come from outside an organisation.

Security Breach – 26th April 2022

User credentials are the key that unlocks the door to your systems and data. Unfortunately, it’s far too easy for bad actors to get a copy of that key.

  • An estimated 15 billion unique logins are circulating on the dark web right now.
  • The average organisation is now likely to have 17 sets of login details exposed on the dark web.
  • A 429% increase in the number of corporate login details with plaintext passwords exposed on the dark web since 2020.


Bad actors don’t always come from outside an organisation. Keeping an eye out for users selling their credentials in the booming dark web markets is a power move for reducing insider risk.

  • An average legitimate corporate network credential sells for around $3,000.
  • Legitimate privileged user credentials can go for as much as $120,000.
  • Malicious insider actions like selling credentials result in an estimated 25% of data breaches.


Recent Breaches

Canada – Panasonic – Electronics Manufacturer

Exploit: Ransomware

Risk to Business: Severe: The Conti ransomware group has claimed responsibility for an attack on Panasonic’s Canadian operations in February 2022. Panasonic confirmed that it had been the victim of a ransomware attack that impacted its systems, processes and networks. The company says that it has contracted with outside experts to investigate the attack as well as clean and restore servers and rebuild applications. No word was available about what if any data was stolen by the attackers. Panasonic says that relevant authorities have been informed.

Risk to Exploited Individuals: No information about consumer/employee PII, PHI or financial data exposure was available at press time.

Customers Impacted: Manufacturers and industrial targets have been high on the cybercriminal hit list for months.

UK – CitySprint – Courier

Exploit: Hacking

Risk to Business: Severe: UK same-day delivery company CitySprint has informed its drivers of a data breach that may have exposed their personal information. The company says that an unauthorised party gained access to its iFleet internal management and routing system. While CitySprint says that it doesn’t think that drivers’ personal data was compromised, it can’t be sure.

Risk to Exploited Individuals: Drivers may have had information exposed including photos of their driving license, vehicle pictures, and records of their weekly earnings.

Customers Impacted:  Unknown

Talk to a TCT team member today about implementing cyber security and phishing training plan for your staff.

Robert Brown

Follow us on LinkedIn:

Related Articles:
What type of hacker is endangering your business data?
Failproof Strategies for Better Cybersecurity