Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 30 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

HipChat hacked, users' account information potentially compromised

by The Gurus
April 26, 2017
in Editor's News
data breach
Share on FacebookShare on Twitter

Atlassian’s group chat platform for business was hacked over the weekend. The service, HipChat, has reset all of it’s users’ passwords after a security incident was flagged due to a vulnerability in a third-party library used by HipChat.com.
A security notice was released on Monday (24 April), with the company saying hackers could potentially have accessed a significant amount of personal data. Users’ account information such as names, email addresses, hashed passwords as well as the room metadata are thought to have been accessed in the breach.
The attack is thought to have affected less than 0.05% where hackers may have infiltrated private messages and content within rooms on one of the servers on the HipChat Cloud web tier.
Although Atlassian have claimed they have isolated the incident and that was no evidence that the breach impacted other Atlassian systems, the breach of personal information is of extreme significance and concern, which was highlighted by Robert Capps, VP of business development at NuData Security. He says “With just a name and email address, there is an outsized risk to consumers from targeted phishing and malware attacks. Stolen consumer data can be combined with other personally identifiable information (PII) from other hacks and breaches, to amass even more detailed profiles of users that are traded and sold to other hackers and fraudsters. These bundles of data contain much more complete information about specific individuals providing greater opportunities for fraud to take place.”
Many infosecurity experts were quick to praise HipChat’s rapid and efficient response to the breach. Javvad Malik, Security Advocate at AlienVault said “they have done a good job of communicating the breach to customers in a timely manner, indicating that they had monitoring controls in place to look for breaches. The company also provided reassurance on the security of its systems with passwords being hashed with bcrypt. It also followed up with the good step and advice to customers to reset their passwords.
Javvid also advised that “customers should also be sure to change their passwords on other systems if they were reusing the same one. “While HipChat has apparently covered all the bases and should be commended for their swift and appropriate response. There is the small issue of other data that could have been potentially accessed by attackers.”
Paul Edon, Director at Tripwire noted that the leaked data was “hashed and salted”, making it difficult to crack adding “it sounds as though HipChat take their cyber security seriously.” Paul did, however, have one concern regarding whether the breach came from a known vulnerability. “If “unknown” well done HipChat for the speed at which they identified the breach and took the necessary action to remediate further loss or damage. However, if the vulnerability was “known” then this is another case where security best practise – vulnerability and patch management would have almost certainly prevented the breach.”
As a precaution, HipChat have invalidated passwords on all potentially affected HipChat-connected user accounts and sent those users instructions on how to reset their passwords. In response to the attack, the company are also preparing a server update.
ESET IT security specialist, Mark James also noted to how quick HipChat were to reacting saying “password resets are good and notifying affected users quickly is a major plus. We often hear about these types of breaches months if not years after they have happened, but in this case we have seen a good description of events with plenty of information about who, what and when.”
 

FacebookTweetLinkedIn
Tags: BreachCyberdatasecurityTechnology
ShareTweetShare
Previous Post

77% Of All Ransomware Detected in 4 Industries

Next Post

Why sharing is not always caring in the public sector

Recent News

cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023
Outside of cinema with advertising

Back and Bigger Than Ever! The Inside Man Season 5 Takes a Stab at Power Hungry Adversaries

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information