Security Breach – 13 Aug 2020

Security Breach – 13 Aug 2020

COVID-19 has affected every corner of the world - including the Dark Web, spiking activity in more unauthorized breaches.The World Has Changed. So Has the Dark Web.

COVID-19 has affected every corner of the world – including the Dark Web, spiking activity in more unauthorized breaches.

Our partner, Dark Web ID monitors and analyses the Dark Web constantly and in 2020, they have discovered trends that point to today’s biggest cybersecurity threats and gained insight into the risks of tomorrow. They have just released State on the Dark Web eBook. This eBook gives points and tips of protecting the the business again unauthorized access.

Over 90% of data breaches start with a phishing attack, and everything a cybercriminal needs to mount an effective phishing attack against you is available on the Dark Web.

Prevent those attacks by educating your staff about clicking on links in an email and invest in an email filtering service that uses Sandbox technology like SonicWall Hosted Email Service.

Recent Breaches


United States – UberEats – App-Based Food Delivery Service

Exploit: Unauthorized Database Access

Risk to Small Business: Moderate: Security analysts doing routine Dark Web and Deep Web monitoring uncovered a data dump containing details about customers, delivery drivers, and delivery partners for UberEats. The 9 TXT files leaked by the threat actor include login credentials of 579 UberEATS customers and details of 100 delivery drivers. The data includes login credentials, full name, contact number, trip details, bank card details, and, account creation dates.

Risk to Exploited Individuals: Severe:  No details about how affected customers and drivers will be informed or any remediation offered have been released. UberEats customers, drivers, and partners should reset their account credentials and be alert for credit card fraud, spear phishing, and identity theft dangers.

Customers Impacted:  679

Australia – ProctorU – Online Test Monitoring Service

Exploit: Unauthorized Database Access

Risk to Small Business: Severe:  A number of Australian universities have been affected by a breach at testing services provider ProctorU. Hackers from the Shiny Hunters group published the stolen database from ProctorU online. The affected universities include the Group of Eight’s University of Sydney, University of NSW, University of Queensland, University of Melbourne, University of Western Australia, and the University of Adelaide, as well as Swinburne University, James Cook University, and Curtin University. The stolen data reportedly contains The data contains usernames, unencrypted passwords, legal names, and full residential addresses of students at the impacted schools.

Risk to Exploited Individuals: Moderate: No financial information was stolen, but student PII was impacted. Students should be cautious of spear phishing attempts using the stolen data

Customers Impacted:  444,267.

Ensure you’re protecting your data and systems from common sources of credential compromise and data loss by implementing a solid cybersecurity plan.

Talk to a TCT sales team member today and we can show you how.

Robert Brown

Follow us on LinkedIn:

Related Articles:
Using Dark Web Monitoring for your Business
Cyber Security and the Changing Threat Landscape


Log a Job: