<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ShadowMap</title>
	<atom:link href="https://shadowmap.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://shadowmap.com/</link>
	<description>Digital Risk Management - Asset Inventory &#38; Cyber Threat Intelligence - ShadowMap</description>
	<lastBuildDate>Mon, 03 Oct 2022 19:58:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>

<image>
	<url>https://shadowmap.com/wp-content/uploads/2019/07/favicon-50x50.png</url>
	<title>ShadowMap</title>
	<link>https://shadowmap.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Tracking SSO Integrations Across The Organization</title>
		<link>https://shadowmap.com/features/tracking-sso-integrations/</link>
					<comments>https://shadowmap.com/features/tracking-sso-integrations/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 03 Oct 2022 19:58:59 +0000</pubDate>
				<category><![CDATA[Attack Surface Management]]></category>
		<category><![CDATA[Features]]></category>
		<guid isPermaLink="false">https://shadowmap.com/?p=4307</guid>

					<description><![CDATA[<p>ShadowMap&#8217;s Attack Surface Management Product creates a real-time tracker of all SSO (Single Sign-On) Integrations across your organisations public footprint. A threat analysis report is generated to raise alerts for unauthorised shadow accounts and non-compliance with implementation best practices. Key Features of ShadowMap &#8211; Tracking SSO Integrations &#38; Threat Analysis Report Compatibility with: Google Workspace, Azure [&#8230;]</p>
<p>The post <a href="https://shadowmap.com/features/tracking-sso-integrations/">Tracking SSO Integrations Across The Organization</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://shadowmap.com/attack-surface-management/">ShadowMap&#8217;s Attack Surface Management Product</a> creates a real-time tracker of all SSO (Single Sign-On) Integrations across your organisations public footprint. A threat analysis report is generated to raise alerts for unauthorised shadow accounts and non-compliance with implementation best practices.</p>
<div id="attachment_4266" style="width: 1034px" class="wp-caption aligncenter"><a href="https://shadowmap.com/wp-content/uploads/2022/10/shadowmap-executive-cyber-protection-demo.jpeg"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-4266" class="wp-image-4266 size-large" src="https://shadowmap.com/wp-content/uploads/2022/10/shadowmap-executive-cyber-protection-demo-1024x649.jpeg" alt="ShadowMap Executive Cyber Protection Demo" width="1024" height="649" srcset="https://shadowmap.com/wp-content/uploads/2022/10/shadowmap-executive-cyber-protection-demo-980x621.jpeg 980w, https://shadowmap.com/wp-content/uploads/2022/10/shadowmap-executive-cyber-protection-demo-480x304.jpeg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /></a><p id="caption-attachment-4266" class="wp-caption-text">ShadowMap &#8211; Tracking SSO Integrations</p></div>
<h3>Key Features of ShadowMap &#8211; Tracking SSO Integrations &amp; Threat Analysis Report</h3>
<ul>
<li>Compatibility with: Google Workspace, Azure AD, Office 365, Okta, Cloudflare Access, Duo Security, Auth0, Amazon Cognito, Idento IAM along with internal SAML / OAuth implementations.</li>
<li>Track account information behind each SSO Integration &amp; Raise alerts for unauthorised shadow accounts.</li>
<li>Automated best-practice checks of the SSO implementations to raise alerts for any privacy or security issues.</li>
<li><a href="https://shadowmap.com/dark-web-monitoring-data-breaches/">Track Credentials Leaked on the Internet, Deep-Web &amp; Dark-Web</a> related to your SSO implementations.</li>
<li>Have our <a href="https://shadowmap.com/features/cyber-threat-police-services/">Cyber Threat Police Experts</a> available on-demand to investigate, analyse and mitigate these critical risks.</li>
</ul>
<h3>Importance of Ensuring Secure SSO (Single Sign-On) Implementation</h3>
<p>A recent study on risks associated with SSO (Single Sign-On) implementations found:</p>
<ul>
<li>25% of the S&amp;P 500 and half of the top 20 most valuable public U.S companies have had at least one SSO credential for sale on the dark web in 2022.</li>
<li>Shared credentials were the most common attack vector used by hackers and responsible for nearly 50% of all cyber attacks.</li>
<li>Logon credentials are a major focus for external attackers (61% of data breaches involve credential data).</li>
<li>With the average enterprise using over 250 cloud apps, the prospect of employees remembering unique, strong passwords for each of them is simply impractical.</li>
<li>Brute force attacks accounted for 31% of all cyberattacks in 2021 and 89% of the organisations interviewed experienced phishing attacks over the past year.</li>
</ul>
<h3>Common Security Vulnerabilities in SSO (Single Sign-On) Implementations</h3>
<ul>
<li>XML injection Attacks</li>
<li>Timing or Expiration Based Attacks</li>
<li>Signature Spoofing and Exclusion Attacks</li>
<li>XXE and XSLT Attacks</li>
<li>SSO Implementation Bypass / Authentication Bypass Attacks</li>
<li>Access Token Misuse or Replay Attacks</li>
<li>Credential Leakage via Referrer Header</li>
<li>Client Secret Leakage</li>
<li>Credential Leakage via Page Content</li>
</ul>
<p>The post <a href="https://shadowmap.com/features/tracking-sso-integrations/">Tracking SSO Integrations Across The Organization</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://shadowmap.com/features/tracking-sso-integrations/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyber Threat Police Services</title>
		<link>https://shadowmap.com/features/cyber-threat-police-services/</link>
					<comments>https://shadowmap.com/features/cyber-threat-police-services/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 03 Oct 2022 15:04:20 +0000</pubDate>
				<category><![CDATA[Features]]></category>
		<category><![CDATA[Managed Services]]></category>
		<guid isPermaLink="false">https://shadowmap.com/?p=4272</guid>

					<description><![CDATA[<p>The post <a href="https://shadowmap.com/features/cyber-threat-police-services/">Cyber Threat Police Services</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The post <a href="https://shadowmap.com/features/cyber-threat-police-services/">Cyber Threat Police Services</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://shadowmap.com/features/cyber-threat-police-services/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Executive Cyber Protection</title>
		<link>https://shadowmap.com/features/executive-cyber-protection/</link>
					<comments>https://shadowmap.com/features/executive-cyber-protection/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 03 Oct 2022 13:15:31 +0000</pubDate>
				<category><![CDATA[Brand Protection]]></category>
		<category><![CDATA[Features]]></category>
		<guid isPermaLink="false">https://shadowmap.com/?p=4236</guid>

					<description><![CDATA[<p>Executive Cyber Protection is a part of ShadowMap&#8217;s Brand Protection &#38; Takedowns Product. It helps put a spotlight on any data breaches, accidental data leaks that may impact top management and leadership teams. It triggers an early warning and an automated response to prevent reputational damage to your leadership. Key Features of Executive Cyber Protection [&#8230;]</p>
<p>The post <a href="https://shadowmap.com/features/executive-cyber-protection/">Executive Cyber Protection</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Executive Cyber Protection is a part of <a href="https://shadowmap.com/brand-protection-takedowns/">ShadowMap&#8217;s Brand Protection &amp; Takedowns Product</a>. It helps put a spotlight on any data breaches, accidental data leaks that may impact top management and leadership teams. It triggers an early warning and an automated response to prevent reputational damage to your leadership.</p>
<div id="attachment_4266" style="width: 1034px" class="wp-caption aligncenter"><a href="https://shadowmap.com/wp-content/uploads/2022/10/shadowmap-executive-cyber-protection-demo.jpeg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-4266" class="wp-image-4266 size-large" src="https://shadowmap.com/wp-content/uploads/2022/10/shadowmap-executive-cyber-protection-demo-1024x649.jpeg" alt="ShadowMap Executive Cyber Protection Demo" width="1024" height="649" srcset="https://shadowmap.com/wp-content/uploads/2022/10/shadowmap-executive-cyber-protection-demo-980x621.jpeg 980w, https://shadowmap.com/wp-content/uploads/2022/10/shadowmap-executive-cyber-protection-demo-480x304.jpeg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /></a><p id="caption-attachment-4266" class="wp-caption-text">ShadowMap Executive Cyber Protection Demo</p></div>
<h3>Key Features of Executive Cyber Protection</h3>
<ul>
<li>Protect your Executive&#8217;s personal, corporate and family accounts from targetted data breaches.</li>
<li>Get notified for any executives impacted by: third-party data breaches, data leaks, dark web mentions, news mentions, social media mentions, etc.</li>
<li>Monitor the dark web, ransomware groups, social media for any chatter related to their emails, phone numbers, usernames, computer names, IP addresses.</li>
<li>Receive a high priority alert as soon as one of your executives is part of a data breach or attack.</li>
<li>Have our <a href="https://shadowmap.com/features/cyber-threat-police-services/">Cyber Threat Police Experts</a> available on-demand to investigate, analyse and mitigate these critical risks.</li>
</ul>
<h3>Targetted Attacks Against Your CXO Executives?</h3>
<p>A recent study on Data Brokers and Data Breaches found:</p>
<ul>
<li>99% of our executives have their personal information available on more than three dozen online data broker websites, with a large percentage listed on more than 100.</li>
<li>70% of executive profiles found on data broker websites contained personal social media information and photos, most commonly from LinkedIn and Facebook.</li>
<li>40% of online data brokers had the IP address of an executive’s home network.</li>
<li>95% of executive profiles contained personal and confidential information about their family, relatives, and neighbours.</li>
<li>On average, online data brokers maintained more than three personal email addresses for every executive record.</li>
</ul>
<h3>How to enable Executive Cyber Protection In your Dashboard?</h3>
<p>Step 1: Add Executives To Your Dashboard</p>
<div id="attachment_4275" style="width: 1034px" class="wp-caption aligncenter"><a href="https://shadowmap.com/wp-content/uploads/2022/10/Add-Executive-Executive-Cyber-Protection.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-4275" class="wp-image-4275 size-large" src="https://shadowmap.com/wp-content/uploads/2022/10/Add-Executive-Executive-Cyber-Protection-1024x542.png" alt="Add A New Executive" width="1024" height="542" srcset="https://shadowmap.com/wp-content/uploads/2022/10/Add-Executive-Executive-Cyber-Protection-980x519.png 980w, https://shadowmap.com/wp-content/uploads/2022/10/Add-Executive-Executive-Cyber-Protection-480x254.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /></a><p id="caption-attachment-4275" class="wp-caption-text">Add A New Executive</p></div>
<p>Step 2: Add Any Number of Monitoring Fields For Your Executives</p>
<div id="attachment_4281" style="width: 1034px" class="wp-caption aligncenter"><a href="https://shadowmap.com/wp-content/uploads/2022/10/Add-Monitoring-Fields-For-Executives.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-4281" class="wp-image-4281 size-large" src="https://shadowmap.com/wp-content/uploads/2022/10/Add-Monitoring-Fields-For-Executives-1024x590.png" alt="Add Monitoring Fields For Executives" width="1024" height="590" srcset="https://shadowmap.com/wp-content/uploads/2022/10/Add-Monitoring-Fields-For-Executives-980x565.png 980w, https://shadowmap.com/wp-content/uploads/2022/10/Add-Monitoring-Fields-For-Executives-480x277.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /></a><p id="caption-attachment-4281" class="wp-caption-text">Add Monitoring Fields For Executives</p></div>
<p>Step 3: In a few minutes, data will start getting populated for the executives and alerts will start triggering!</p>
<p>The post <a href="https://shadowmap.com/features/executive-cyber-protection/">Executive Cyber Protection</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://shadowmap.com/features/executive-cyber-protection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Investigating Chinese Intelligence Firm Zhenhua Data</title>
		<link>https://shadowmap.com/security-research/investigating-chinese-intelligence-firm-zhenhua-data/</link>
					<comments>https://shadowmap.com/security-research/investigating-chinese-intelligence-firm-zhenhua-data/#respond</comments>
		
		<dc:creator><![CDATA[Yash Kadakia]]></dc:creator>
		<pubDate>Thu, 17 Sep 2020 03:01:34 +0000</pubDate>
				<category><![CDATA[Security Research]]></category>
		<category><![CDATA[Big Brother]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chinese Intelligence]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Juwei Hezhi]]></category>
		<category><![CDATA[SocialDataMax]]></category>
		<category><![CDATA[Weiju]]></category>
		<category><![CDATA[Zhenhua]]></category>
		<category><![CDATA[Zhenhua Data]]></category>
		<guid isPermaLink="false">https://shadowmap.com/?p=2133</guid>

					<description><![CDATA[<p>Our investigation of Zhenhua Data with a detailed look at their operation and how the Chinese Intelligence Firm leverages public and private data sources to create actionable intelligence about a wide range of targets.</p>
<p>The post <a href="https://shadowmap.com/security-research/investigating-chinese-intelligence-firm-zhenhua-data/">Investigating Chinese Intelligence Firm Zhenhua Data</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Stories of Chinese Intelligence Firms leveraging <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3691999">Big Data Analysis</a>, <a href="https://www.theatlantic.com/politics/archive/2019/08/inside-us-china-espionage-war/595747/">Social Media Platforms</a>, <a href="https://www.bbc.com/news/world-asia-53544505">LinkedIn, </a><a href="https://www.theatlantic.com/magazine/archive/2020/09/china-ai-surveillance/614197/">Mobile Devices</a>, <a href="https://www.uscc.gov/sites/default/files/2019-11/Chapter%202,%20Section%203%20-%20China's%20Intelligence%20Services%20and%20Espionage%20Threats%20to%20the%20United%20States.pdf">SIGINT, </a>etc are all over the internet.  However the recent stories about the Zhenhua Data Leak in the <a href="https://indianexpress.com/article/express-exclusive/china-watching-big-data-president-kovind-pm-narendra-modi-opposition-leaders-chief-justice-of-india-zhenhua-data-information-technology-6594861/">Indian Express</a> caught our attention and we decided to leverage our ShadowMap platform to get some more insight on the Zhenhua Data operation.</p>
<p>After spending several days deep into this rabbit hole of vague corporations, a wide range of collection systems, some really interesting correlation use-cases &#8211; we&#8217;ve been able to put together a fairly comprehensive image of the Zhenhua Data operation.</p>
<p>While on the surface Zhenhua Data seems to be &#8220;just another&#8221; firm capturing, processing and selling publicly available information, the story changes rapidly once you look beyond the surface.</p>
<p>This blog post covers four key sections: <strong>Data Collection</strong>, <strong>Data Correlation</strong>, <strong>Identified</strong> <strong>Targets</strong>, <strong>Conclusion.</strong></p>
<h3>Zhenhua Data &amp; Affiliates</h3>
<p>According to the Zhenhua Data website (which has been taken offline, but is still accessible via ShadowMap) &#8211; &#8220;Zhenhua Data focuses on integrating overseas data and information to provide services for domestic institutions&#8221;. In-addition to Shenzhen Zhenhua Data Information Technology Co., Ltd. (china-revival.com) that has already received wide-spread coverage, we also found the involvement of Weiju (aggso.com) &amp; SocialDataMax (socialdatamax.com).</p>
<p>Weiju, started out as a &#8220;location-based, instant messaging application that enables users to chat with nearby strangers.&#8221;, however the last update on its website (in 2015) mentions &#8220;Public opinion monitoring and early warning&#8221;, &#8220;Communication analysis statistics&#8221;, etc.</p>
<p>There are also several mentions of the underlying platforms being developed by &#8220;Beijing Juwei Hezhi Information Technology Co., Ltd.&#8221;, which has a very limited public presence but is listed online as &#8220;Juwei Hezhi is a company that analyzes social media big data&#8221;.</p>
<h3>Data Collection</h3>
<p>Zhenhua Data has a large number of platforms that are used for data collection. These include platforms monitoring your standard social media platforms such as Twitter, LinkedIn, Facebook, TikTok, VK, Instagram etc. They also monitor a wide range of media outlets, news websites, news aggregators such as Reddit, etc.</p>
<p>In-addition to this, they also seem to have private sources of data such as near real-time movement of warships, satellite tracking, troop movements, etc. More so we were able to find references to private feeds that have access to data from &#8220;affiliate apps &amp; websites&#8221;, but have not been able to discover or access these portals directly.</p>
<p>Some examples of the public data collection systems that are publicly accessible:</p>
<p><b>LinkedIn &#8211; </b>This particular system is configured to continuously search LinkedIn for a range of keywords and then downloads the matching profiles, photos, etc.</p>
<div id="attachment_2138" style="width: 1034px" class="wp-caption aligncenter"><a href="https://shadowmap.com/wp-content/uploads/2020/09/Downloading-LinkedIn-Profiles-By-Keywords.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-2138" class="size-large wp-image-2138" src="https://shadowmap.com/wp-content/uploads/2020/09/Downloading-LinkedIn-Profiles-By-Keywords-1024x551.png" alt="Downloading LinkedIn Profiles By Keywords" width="1024" height="551" srcset="https://shadowmap.com/wp-content/uploads/2020/09/Downloading-LinkedIn-Profiles-By-Keywords-980x527.png 980w, https://shadowmap.com/wp-content/uploads/2020/09/Downloading-LinkedIn-Profiles-By-Keywords-480x258.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /></a><p id="caption-attachment-2138" class="wp-caption-text">Downloading LinkedIn Profiles By Keywords</p></div>
<p><b>TikTok &#8211; </b>This particular system is configured to monitor specific target accounts and download all videos, comments, user relationships, etc in near real time. Another interesting note here, a lot of the accounts being monitored are related to US Army recruitment and active duty forces.</p>
<div id="attachment_2139" style="width: 1034px" class="wp-caption aligncenter"><a href="https://shadowmap.com/wp-content/uploads/2020/09/Monitoring-TikTok-Videos-Comments-for-Target-Accounts.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-2139" class="size-large wp-image-2139" src="https://shadowmap.com/wp-content/uploads/2020/09/Monitoring-TikTok-Videos-Comments-for-Target-Accounts-1024x550.png" alt="" width="1024" height="550" srcset="https://shadowmap.com/wp-content/uploads/2020/09/Monitoring-TikTok-Videos-Comments-for-Target-Accounts-980x527.png 980w, https://shadowmap.com/wp-content/uploads/2020/09/Monitoring-TikTok-Videos-Comments-for-Target-Accounts-480x258.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /></a><p id="caption-attachment-2139" class="wp-caption-text">Monitoring TikTok Videos and Comments for Target Accounts</p></div>
<p><b>Reddit &#8211; </b>This particular system is configured to monitor specific subreddits such as /r/politics to continuously track news stories, upvotes, users, etc.</p>
<div id="attachment_2140" style="width: 1034px" class="wp-caption aligncenter"><a href="https://shadowmap.com/wp-content/uploads/2020/09/Reddit-News-Politics-Monitoring.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-2140" class="size-large wp-image-2140" src="https://shadowmap.com/wp-content/uploads/2020/09/Reddit-News-Politics-Monitoring-1024x549.png" alt="Reddit News Politics Monitoring" width="1024" height="549" srcset="https://shadowmap.com/wp-content/uploads/2020/09/Reddit-News-Politics-Monitoring-980x525.png 980w, https://shadowmap.com/wp-content/uploads/2020/09/Reddit-News-Politics-Monitoring-480x257.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /></a><p id="caption-attachment-2140" class="wp-caption-text">Reddit News Politics Monitoring</p></div>
<p><b>Forum Discussions &#8211; </b>This particular system is configured to monitor a wide range of internet forum discussions, actively scraping all posts being made, data about users along with the sentiment of the post.</p>
<div id="attachment_2141" style="width: 1034px" class="wp-caption aligncenter"><a href="https://shadowmap.com/wp-content/uploads/2020/09/Forums-BBS-Monitoring.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-2141" class="size-large wp-image-2141" src="https://shadowmap.com/wp-content/uploads/2020/09/Forums-BBS-Monitoring-1024x525.png" alt="Forum &amp; BBS Monitoring" width="1024" height="525" srcset="https://shadowmap.com/wp-content/uploads/2020/09/Forums-BBS-Monitoring-980x502.png 980w, https://shadowmap.com/wp-content/uploads/2020/09/Forums-BBS-Monitoring-480x246.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /></a><p id="caption-attachment-2141" class="wp-caption-text">Forum &amp; BBS Monitoring</p></div>
<p><b>Databases of Key Individuals &amp; Organisations &#8211; </b>This particular system maintains a real-time list of key Mobile Applications, Media Organisations, Think Tanks, Social Media accounts, etc.</p>
<div id="attachment_2170" style="width: 1034px" class="wp-caption aligncenter"><a href="https://shadowmap.com/wp-content/uploads/2020/09/Zenhua-Data-Databases.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-2170" class="size-large wp-image-2170" src="https://shadowmap.com/wp-content/uploads/2020/09/Zenhua-Data-Databases-1024x584.png" alt="Zenhua Data - Database of Key Targets" width="1024" height="584" srcset="https://shadowmap.com/wp-content/uploads/2020/09/Zenhua-Data-Databases-980x559.png 980w, https://shadowmap.com/wp-content/uploads/2020/09/Zenhua-Data-Databases-480x274.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /></a><p id="caption-attachment-2170" class="wp-caption-text">Zenhua Data &#8211; Database of Key Targets</p></div>
<p><strong>Tracking Global Risk Events &#8211; </strong>This particular system is configured to track a number of global risk events such as Weapons of Mass Destruction, Extreme weather events, Climate change mitigation and response, Network Attack, etc.</p>
<div id="attachment_2156" style="width: 1034px" class="wp-caption aligncenter"><a href="https://shadowmap.com/wp-content/uploads/2020/09/Global-Risk-Event-Data-Center.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-2156" class="size-large wp-image-2156" src="https://shadowmap.com/wp-content/uploads/2020/09/Global-Risk-Event-Data-Center-1024x551.png" alt="Global Risk Event Data Center" width="1024" height="551" srcset="https://shadowmap.com/wp-content/uploads/2020/09/Global-Risk-Event-Data-Center-980x528.png 980w, https://shadowmap.com/wp-content/uploads/2020/09/Global-Risk-Event-Data-Center-480x258.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /></a><p id="caption-attachment-2156" class="wp-caption-text">Global Risk Event Data Center</p></div>
<h3><strong>Data Correlation</strong></h3>
<p>While some of the Data Collection systems may seem like they would be part of the scope of any average social media big data company, the use-cases and correlations that we have been able to discover are where it really gets interesting.</p>
<p><strong>Internet Big Data Military Intelligence System</strong></p>
<p>One of the early systems that our platform discovered that is directly linked to Zhenhua Data. This platform certainly tells a different story from the &#8220;social media monitoring&#8221; cover that has been used. The platform seems to have 4 modules: <strong>Internet Information Collection System</strong>, <strong>Big Data Cleaning &amp; Processing System</strong>, <strong>Foreign Army Internet Intelligence System</strong> &amp; <strong>Key Group Monitoring and Analysis System</strong>.</p>
<div id="attachment_2137" style="width: 1034px" class="wp-caption aligncenter"><a href="https://shadowmap.com/wp-content/uploads/2020/09/Zhenhua-Data-Internet-Big-Data-Military-Intelligence-System.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-2137" class="size-large wp-image-2137" src="https://shadowmap.com/wp-content/uploads/2020/09/Zhenhua-Data-Internet-Big-Data-Military-Intelligence-System-1024x521.png" alt="Zhenhua Data Internet Big Data Military Intelligence System" width="1024" height="521" srcset="https://shadowmap.com/wp-content/uploads/2020/09/Zhenhua-Data-Internet-Big-Data-Military-Intelligence-System-980x499.png 980w, https://shadowmap.com/wp-content/uploads/2020/09/Zhenhua-Data-Internet-Big-Data-Military-Intelligence-System-480x244.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /></a><p id="caption-attachment-2137" class="wp-caption-text">Zhenhua Data Internet Big Data Military Intelligence System</p></div>
<p>On digging further, we discovered another platform that leverages several of the private and public data collection systems to create actionable military intelligence.</p>
<p><strong>Real-time War Ship Monitoring &amp; Correlation Platform</strong></p>
<p>This platform allows for tracking near real-time movements of both commercial and military naval ships. In-addition, it can correlate a wide range of information such as Social Media information of the crew on-board each vessel, photos and videos from individuals and official social media accounts, news stories, weapons manifests, historical location data, etc.</p>
<p>The strike chain functionality tracks key personnel as well, which are in-turn related with the much talked about OKIDB (Overseas Key Information Database), which allows you to get more relevant and correlated data about each individual target.</p>
<div id="attachment_2149" style="width: 1034px" class="wp-caption aligncenter"><a href="https://shadowmap.com/wp-content/uploads/2020/09/zenhua-data-warship-monitoring.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-2149" class="size-large wp-image-2149" src="https://shadowmap.com/wp-content/uploads/2020/09/zenhua-data-warship-monitoring-1024x515.png" alt="Zenhua Data Warship Monitoring" width="1024" height="515" srcset="https://shadowmap.com/wp-content/uploads/2020/09/zenhua-data-warship-monitoring-1024x515.png 1024w, https://shadowmap.com/wp-content/uploads/2020/09/zenhua-data-warship-monitoring-980x493.png 980w, https://shadowmap.com/wp-content/uploads/2020/09/zenhua-data-warship-monitoring-480x242.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /></a><p id="caption-attachment-2149" class="wp-caption-text">Zenhua Data Warship Monitoring</p></div>
<p>&nbsp;</p>

<a href='https://shadowmap.com/wp-content/uploads/2020/09/Tracking-Weapons-Information-Naval-Warships.png'><img loading="lazy" decoding="async" width="300" height="187" src="https://shadowmap.com/wp-content/uploads/2020/09/Tracking-Weapons-Information-Naval-Warships-300x187.png" class="attachment-medium size-medium" alt="Tracking Weapons Information for Naval Warships" /></a>
<a href='https://shadowmap.com/wp-content/uploads/2020/09/Warship-Port-Information.png'><img loading="lazy" decoding="async" width="300" height="180" src="https://shadowmap.com/wp-content/uploads/2020/09/Warship-Port-Information-300x180.png" class="attachment-medium size-medium" alt="Warship Port Information" /></a>
<a href='https://shadowmap.com/wp-content/uploads/2020/09/Tracking-Naval-Officers-Social-Media.png'><img loading="lazy" decoding="async" width="300" height="188" src="https://shadowmap.com/wp-content/uploads/2020/09/Tracking-Naval-Officers-Social-Media-300x188.png" class="attachment-medium size-medium" alt="Tracking Naval Officers On-Board via Social Media" /></a>

<div id="attachment_2155" style="width: 1034px" class="wp-caption aligncenter"><a href="https://shadowmap.com/wp-content/uploads/2020/09/Strike-Chain-Key-Personnel.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-2155" class="wp-image-2155 size-large" src="https://shadowmap.com/wp-content/uploads/2020/09/Strike-Chain-Key-Personnel-e1600311890142-1024x520.png" alt="Strike Chain - Tracking Key Personnel" width="1024" height="520" srcset="https://shadowmap.com/wp-content/uploads/2020/09/Strike-Chain-Key-Personnel-e1600311890142-980x498.png 980w, https://shadowmap.com/wp-content/uploads/2020/09/Strike-Chain-Key-Personnel-e1600311890142-480x244.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /></a><p id="caption-attachment-2155" class="wp-caption-text">Strike Chain &#8211; Tracking Key Personnel</p></div>
<p><strong>Correlating Social Media Data with OKIDB</strong></p>
<p>Zenhua Data also has Social Media Relationship Query tools available to analyse target social media accounts, their relationships with other individuals and further allows you to access additional data stored about each individual in the OKIDB.</p>
<p>Each of the millions of members (a sample shown in the excel), have a &#8220;Character ID&#8221; and have a page in the OKIDB that contains more details about themselves, their social media accounts, their families, their businesses, their relationships, etc. The OKIDB contains data about politicians, royalty, business leaders, journalists, members of think tanks, research scientists, etc.</p>
<div id="attachment_2157" style="width: 1034px" class="wp-caption aligncenter"><a href="https://shadowmap.com/wp-content/uploads/2020/09/Zhenhua-Data-PMO-India-Social-Relationship-Query-Tool.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-2157" class="size-large wp-image-2157" src="https://shadowmap.com/wp-content/uploads/2020/09/Zhenhua-Data-PMO-India-Social-Relationship-Query-Tool-1024x199.png" alt="Zhenhua Data PMO India Social Media Relationship Query Tool" width="1024" height="199" srcset="https://shadowmap.com/wp-content/uploads/2020/09/Zhenhua-Data-PMO-India-Social-Relationship-Query-Tool-980x190.png 980w, https://shadowmap.com/wp-content/uploads/2020/09/Zhenhua-Data-PMO-India-Social-Relationship-Query-Tool-480x93.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /></a><p id="caption-attachment-2157" class="wp-caption-text">Zhenhua Data PMO India Social Media Relationship Query Tool</p></div>
<div id="attachment_2158" style="width: 1034px" class="wp-caption aligncenter"><a href="https://shadowmap.com/wp-content/uploads/2020/09/Zenhua-Data-OKIDB-User-Data.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-2158" class="size-large wp-image-2158" src="https://shadowmap.com/wp-content/uploads/2020/09/Zenhua-Data-OKIDB-User-Data-1024x514.png" alt="Zenhua Data OKIDB User Data" width="1024" height="514" srcset="https://shadowmap.com/wp-content/uploads/2020/09/Zenhua-Data-OKIDB-User-Data-980x492.png 980w, https://shadowmap.com/wp-content/uploads/2020/09/Zenhua-Data-OKIDB-User-Data-480x241.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /></a><p id="caption-attachment-2158" class="wp-caption-text">Zenhua Data OKIDB User Data</p></div>
<p>In-addition to these systems, there are hundreds of other such systems online that are secured behind login pages or have been taken offline since the media attention started and as such have not been accessed by ShadowMap.</p>
<p><b>Some of the other systems which are online but not accessible since they are behind login pages:</b></p>

<a href='https://shadowmap.com/wp-content/uploads/2020/09/Customer-Data-Collection-Center.png'><img loading="lazy" decoding="async" width="150" height="150" src="https://shadowmap.com/wp-content/uploads/2020/09/Customer-Data-Collection-Center-150x150.png" class="attachment-thumbnail size-thumbnail" alt="Customer Data Collection Center" /></a>
<a href='https://shadowmap.com/wp-content/uploads/2020/09/Global-Public-Opinion-Monitoring-System.png'><img loading="lazy" decoding="async" width="150" height="150" src="https://shadowmap.com/wp-content/uploads/2020/09/Global-Public-Opinion-Monitoring-System-150x150.png" class="attachment-thumbnail size-thumbnail" alt="Global Public Opinion Monitoring System" /></a>
<a href='https://shadowmap.com/wp-content/uploads/2020/09/Crowdsourcing-Platform.png'><img loading="lazy" decoding="async" width="150" height="150" src="https://shadowmap.com/wp-content/uploads/2020/09/Crowdsourcing-Platform-150x150.png" class="attachment-thumbnail size-thumbnail" alt="Crowdsourcing Platform" /></a>
<a href='https://shadowmap.com/wp-content/uploads/2020/09/Think-Tank-System.png'><img loading="lazy" decoding="async" width="150" height="150" src="https://shadowmap.com/wp-content/uploads/2020/09/Think-Tank-System-150x150.png" class="attachment-thumbnail size-thumbnail" alt="Think Tank System" /></a>
<a href='https://shadowmap.com/wp-content/uploads/2020/09/resource-download-system.png'><img loading="lazy" decoding="async" width="150" height="150" src="https://shadowmap.com/wp-content/uploads/2020/09/resource-download-system-150x150.png" class="attachment-thumbnail size-thumbnail" alt="Resource Download System" /></a>

<h3><strong>Identified</strong> <strong>Targets</strong></h3>
<p>The OKIDB has been covered in-depth by <a href="https://indianexpress.com/article/express-exclusive/china-watching-indian-politicians-big-data-hybrid-cyber-warfare-shenzhen-information-technology-6594805/">several</a> <a href="https://www.washingtonpost.com/world/asia_pacific/chinese-firm-harvests-social-media-posts-data-of-prominent-americans-and-military/2020/09/14/b1f697ce-f311-11ea-8025-5d3489768ac8_story.html">media</a> <a href="https://www.theguardian.com/world/2020/sep/14/zhenhua-data-full-list-leak-database-personal-details-millions-china-tech-company">organisations</a> that have dissected the list of targets in detail. Generally speaking the OKIDB seems to contain information about anybody that has any level of influence or is affiliated with any such person. The influence is determined on the basis of social media relationships, news mentions, face recognition in public photographs, etc.</p>
<p>We also found several target keyword lists that are actively being used as part of the data collection platforms and seem to be focusing on a wide range of keywords related to Hong Kong. These include key events such as &#8220;2019 Prince Edward station attack&#8221;, famous protestors such as &#8220;Black super brother&#8221;, phrases such as &#8220;Trying to decrypt&#8221; and hundreds of political individuals on both sides.</p>

<a href='https://shadowmap.com/wp-content/uploads/2020/09/Hong-Kong-Keywords-Targeted-1.png'><img loading="lazy" decoding="async" width="520" height="1024" src="https://shadowmap.com/wp-content/uploads/2020/09/Hong-Kong-Keywords-Targeted-1-520x1024.png" class="attachment-large size-large" alt="Hong Kong Keywords Targeted" srcset="https://shadowmap.com/wp-content/uploads/2020/09/Hong-Kong-Keywords-Targeted-1-520x1024.png 520w, https://shadowmap.com/wp-content/uploads/2020/09/Hong-Kong-Keywords-Targeted-1-480x946.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 520px, 100vw" /></a>
<a href='https://shadowmap.com/wp-content/uploads/2020/09/Hong-Kong-Keywords-Targeted-3.png'><img loading="lazy" decoding="async" width="499" height="1024" src="https://shadowmap.com/wp-content/uploads/2020/09/Hong-Kong-Keywords-Targeted-3-499x1024.png" class="attachment-large size-large" alt="Hong Kong Keywords Targeted" srcset="https://shadowmap.com/wp-content/uploads/2020/09/Hong-Kong-Keywords-Targeted-3-499x1024.png 499w, https://shadowmap.com/wp-content/uploads/2020/09/Hong-Kong-Keywords-Targeted-3-480x986.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 499px, 100vw" /></a>
<a href='https://shadowmap.com/wp-content/uploads/2020/09/Hong-Kong-Keywords-Targeted-2.png'><img loading="lazy" decoding="async" width="505" height="1024" src="https://shadowmap.com/wp-content/uploads/2020/09/Hong-Kong-Keywords-Targeted-2-505x1024.png" class="attachment-large size-large" alt="Hong Kong Keywords Targeted" srcset="https://shadowmap.com/wp-content/uploads/2020/09/Hong-Kong-Keywords-Targeted-2-505x1024.png 505w, https://shadowmap.com/wp-content/uploads/2020/09/Hong-Kong-Keywords-Targeted-2-480x973.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 505px, 100vw" /></a>

<h3><b>Conclusion to the Zhenhua Data Story</b></h3>
<p>After studying the ShadowMap reports for Zhenhua Data, we are reasonably certain that everything we have seen so far is only scratching the surface of the Data Collection and Internet Intelligence Systems in place.</p>
<p>While most folks brush off concerns around social media monitoring, as the &#8220;price of admission&#8221;, privacy and security professionals understand the true risks and have been raising warnings for years. From something as simple as when <a href="https://www.theguardian.com/world/2018/jan/28/fitness-tracking-app-gives-away-location-of-secret-us-army-bases">Fitbit tracking app Strava disclosed the location of secret US army bases</a>, to modernising and automating the process of gaining &#8220;kompromat&#8221; on a target.</p>
<p>The technology and capabilities we have seen with Zhenhua Data show us that the dystopian future that George Orwell&#8217;s 1984 warned us about, is here to stay. From silencing political opponents, quashing protests, spreading misinformation to influence elections or attacking enemy militaries &#8211; Big Data Surveillance systems will continue to have a significant role to play in geo-politics.</p>
<p>The post <a href="https://shadowmap.com/security-research/investigating-chinese-intelligence-firm-zhenhua-data/">Investigating Chinese Intelligence Firm Zhenhua Data</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://shadowmap.com/security-research/investigating-chinese-intelligence-firm-zhenhua-data/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Update on Our Aarogya Setu Blog Post</title>
		<link>https://shadowmap.com/security-research/inside-aarogya-setu/</link>
					<comments>https://shadowmap.com/security-research/inside-aarogya-setu/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 13 Aug 2020 16:36:15 +0000</pubDate>
				<category><![CDATA[Security Research]]></category>
		<category><![CDATA[Aarogya Setu]]></category>
		<guid isPermaLink="false">https://shadowmap.com/?p=2024</guid>

					<description><![CDATA[<p>In-regards to the &#8220;Inside Aarogya Setu&#8221; blog post that was published by our team on the 12th of August 2020. After consultation with relevant stake holders, we have the following updates that we would like to share: As stated to us, the code that was published on Github was a test backend code and not [&#8230;]</p>
<p>The post <a href="https://shadowmap.com/security-research/inside-aarogya-setu/">Update on Our Aarogya Setu Blog Post</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In-regards to the &#8220;Inside Aarogya Setu&#8221; blog post that was published by our team on the 12th of August 2020. After consultation with relevant stake holders, we have the following updates that we would like to share:</p>
<ul>
<li>As stated to us, the code that was published on Github was a test backend code and not the production code.</li>
<li>As mentioned in our original post, we flagged the issue on June 23rd and the NIC and NIC CERT teams were able to fix the issues promptly in under 24 hours. This in itself is commendable and is significantly better than the industry average of 36 days to fix reported issues.</li>
<li>As mentioned in our original post, we had taken great care to ensure that absolutely no data was accessed as part of this process. Further, since the code was not the production code, it was not possible to access any user data or backend services. We can unequivocally state that no data was breached nor could it have been.</li>
<li>As a final note, we have been reassured that the data of citizens inside the Aarogya Setu application is safe and the platform continues to be safe and secure.</li>
</ul>
<p>Our intent has always been and always will be to help safeguard our national interests.</p>
<p>The post <a href="https://shadowmap.com/security-research/inside-aarogya-setu/">Update on Our Aarogya Setu Blog Post</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://shadowmap.com/security-research/inside-aarogya-setu/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Zoosk Data Breach Published on Darkweb Forum &#8211; 29 Million Users Impacted</title>
		<link>https://shadowmap.com/threat-intelligence/zoosk-data-breach-published-on-darkweb-forum/</link>
					<comments>https://shadowmap.com/threat-intelligence/zoosk-data-breach-published-on-darkweb-forum/#respond</comments>
		
		<dc:creator><![CDATA[Yash Kadakia]]></dc:creator>
		<pubDate>Wed, 05 Aug 2020 08:08:10 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Zoosk]]></category>
		<guid isPermaLink="false">https://shadowmap.com/?p=1691</guid>

					<description><![CDATA[<p>ShadowMap’s AI &#038; ML based digital risk management platform has discovered a new data breach on the darkweb that impacts 29 million users of the online dating website, Zoosk. </p>
<p>The post <a href="https://shadowmap.com/threat-intelligence/zoosk-data-breach-published-on-darkweb-forum/">Zoosk Data Breach Published on Darkweb Forum &#8211; 29 Million Users Impacted</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>ShadowMap&#8217;s AI &amp; ML based <a href="https://shadowmap.com/">digital risk management platform </a>has discovered a new <a href="https://shadowmap.com/monitoring-dark-web-forums-data-breaches/">data breach on the darkweb</a> that impacts 29 million users of the online dating website, <a href="https://www.zoosk.com/">Zoosk</a>. Zoosk is an online dating service available in 25 languages and in more than 80 countries and is part of the Spark Networks SE which includes SilverSingles, EliteSingles, Jdate, Christian Mingle, eDarling, JSwipe, AdventistSingles, LDSSingles, and Attractive World.</p>
<h2><a href="https://shadowmap.com/monitoring-dark-web-forums-data-breaches/">Monitoring The Dark Web &amp; Discovering The Breach</a></h2>
<p>As part of our continuous monitoring of 4000+ Surface, Deep &amp; Dark Web Forums for data breaches, we discovered this data being traded early last week, while it has been openly published for public consumption on the 5th of August 2020.</p>
<p>The data contains 29,186,600 rows of user data and the hacker has suggested that the initial breach took place in January 2020.</p>
<div id="attachment_1694" style="width: 1034px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1694" class="wp-image-1694 size-large" src="https://shadowmap.com/wp-content/uploads/2020/08/Zoosk-Data-Breach-Dark-Web-Forum-1024x257.png" alt="Zoosk Data Breach Published on Dark Web Forums" width="1024" height="257" srcset="https://shadowmap.com/wp-content/uploads/2020/08/Zoosk-Data-Breach-Dark-Web-Forum-980x246.png 980w, https://shadowmap.com/wp-content/uploads/2020/08/Zoosk-Data-Breach-Dark-Web-Forum-480x121.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /><p id="caption-attachment-1694" class="wp-caption-text">Zoosk Data Breach Published on Dark Web Forums</p></div>
<h2></h2>
<h2>Inside The Zoosk Data Breach</h2>
<p>The data contains two tables:</p>
<p><strong>User Table</strong><code><br />
id, first_name, last_name, user_nicename, user_email, email_status, user_status, widget_guid, sex, interested_in, relationship, birthday, location_id, latitude, longitude, zipcode, country, discoverable, user_activation_key, media_request_id, user_registered, last_login, lastdailable_flatched migrated, height, ethnicity, education, religion, politics, children, smoking, drinking, bodytype, income, pets, settings, currency_id, balance, provider_map, photo_source, photo_count, locale_id, timezone_id, source, is_remarketed_to, dscore, rscore, sscore</code></p>
<p><strong>Tig Users Table</strong><br />
<code>uid, user_id, sha1_user_id, user_pw, last_login, last_logout, online_status, failed_logins, account_status</code></p>
<h2></h2>
<h2>General Recommendations</h2>
<p>Even though passwords were not leaked, threat actors can use the email addresses to send spam, phishing emails, and launch other online scams.</p>
<p>So, as a rule of thumb:</p>
<ul>
<li>Use strong passwords.</li>
<li>Enable multi-factor authentication for all your online accounts.</li>
<li>Don’t open unsolicited email attachments and links, especially from senders you don’t recognise.</li>
<li>Don’t share OTPs with third-parties.</li>
<li>Review online accounts and financial statements periodically.</li>
<li>Regularly update your apps and any other software you use.</li>
</ul>
<p>The post <a href="https://shadowmap.com/threat-intelligence/zoosk-data-breach-published-on-darkweb-forum/">Zoosk Data Breach Published on Darkweb Forum &#8211; 29 Million Users Impacted</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://shadowmap.com/threat-intelligence/zoosk-data-breach-published-on-darkweb-forum/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hackers Publish 1800 Vulnerable Pulse VPN Servers &#8211; Includes MCX India, ICRA &#038; Panasonic</title>
		<link>https://shadowmap.com/threat-intelligence/hackers-publish-1800-vulnerable-pulse-vpn-servers/</link>
					<comments>https://shadowmap.com/threat-intelligence/hackers-publish-1800-vulnerable-pulse-vpn-servers/#respond</comments>
		
		<dc:creator><![CDATA[Yash Kadakia]]></dc:creator>
		<pubDate>Tue, 04 Aug 2020 11:26:17 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[Data Leak]]></category>
		<category><![CDATA[Pulse Secure]]></category>
		<guid isPermaLink="false">https://shadowmap.com/?p=1789</guid>

					<description><![CDATA[<p>ShadowMap has picked up on new threat intelligence showing that hackers have released the details from 1800 vulnerable pulse VPN servers including those belonging to MCX India, ICRA &#038; Panasonic.</p>
<p>The post <a href="https://shadowmap.com/threat-intelligence/hackers-publish-1800-vulnerable-pulse-vpn-servers/">Hackers Publish 1800 Vulnerable Pulse VPN Servers &#8211; Includes MCX India, ICRA &#038; Panasonic</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>ShadowMap&#8217;s AI &amp; ML based <a href="https://shadowmap.com/">digital risk management platform </a>has picked up on new <a href="https://shadowmap.com/cyber-threat-intelligence/">threat intelligence</a> showing that hackers have released the details from 1800 vulnerable pulse VPN servers onto various deep &amp; dark web forums. The list of 1800 servers contain several Indian entities including the <a href="https://www.mcxindia.com/">Multi Commodity Exchange (MCX India)</a>, <a href="https://www.icra.in/">ICRA</a> &amp; <a href="https://lsin.panasonic.com/">Panasonic owned Anchor Electricals</a>.</p>
<h2>About the CVE-2019-11510 Pulse VPN Server Vulnerability</h2>
<p>The critical vulnerability (<a href="https://www.cvedetails.com/cve/CVE-2019-11510/">CVE-2019-11510</a>) in Pulse Secure Pulse Connect Secure, allows an unauthenticated remote attacker to arbitrary read files stored on the PCS device. The vulnerability affects versions 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4 of the platform.</p>
<p>ShadowMap&#8217;s <a href="https://shadowmap.com/cyber-threat-intelligence/">Cyber Threat Intelligence</a> modules have checks integrated for this vulnerability since May 2019 and will have corresponding alerts for any vulnerable servers.</p>
<h3><strong>Timeline</strong></h3>
<ul>
<li>April 24, 2019 – Pulse Secure releases initial advisory and software updates addressing multiple vulnerabilities.</li>
<li>May 28, 2019 – Large commercial vendors get reports of vulnerable VPN through HackerOne.</li>
<li>July 31, 2019 – Full use of exploit demonstrated using the admin session hash to get complete shell.</li>
<li>August 8, 2019 – Meh Chang and Orange Tsai demonstrate the VPN issues across multiple vendors (Pulse Secure) with detailed attack on active VPN exploitation.</li>
<li>August 24, 2019 – Bad Packets identifies over 14,500 vulnerable VPN servers globally still unpatched and in need of an upgrade.</li>
<li>October 7, 2019 – The National Security Agency (NSA) produces a Cybersecurity Advisory on Pulse Secure and other VPN products being targeted actively by advanced persistent threat actors.</li>
<li>October 16, 2019 – The CERT Coordination Center (CERT/CC) releases Vulnerability Note VU#927237: Pulse Secure VPN contains multiple vulnerabilities.</li>
<li>January 2020 – Media reports cybercriminals now targeting unpatched Pulse Secure VPN servers to install REvil (Sodinokibi) ransomware.</li>
</ul>
<p>&nbsp;</p>
<h2><a href="https://shadowmap.com/monitoring-dark-web-forums-data-breaches/">Monitoring The Dark Web &amp; Discovering The Breach</a></h2>
<p>The initial disclosure of the breach was made by Pulse Secure through an advisory in April 2019. This vulnerability was found to be mass exploited over the last 8-9 months with a large number of vulnerable servers found to be publicly open. As part of our continuous monitoring of 4000+ Surface, Deep &amp; Dark Web Forums, around the 4th of August, we picked up posts on various Deep &amp; Dark Web forums where attackers had published a dump of 1800 vulnerable servers along with several sensitive details.</p>
<h2>Inside The 1800 Vulnerable Pulse VPN Servers</h2>
<p>On analysing the data set, we found that the leak includes the following details for each of the 1800 IP addresses listed:</p>
<ul>
<li>IP addresses of Pulse Secure VPN servers</li>
<li>Pulse Secure VPN server firmware version</li>
<li>SSH keys for each server</li>
<li>A list of all local users and their password hashes</li>
<li>Admin account details</li>
<li>Last VPN logins (including usernames and cleartext passwords)</li>
<li>VPN session cookies</li>
</ul>
<p>On further analysis, we found several Indian entities that were a part of this breach.</p>
<h3>Multi Commodity Exchange (MCX India)</h3>
<p>The compromised VPN server was running the vulnerable firmware version 8.3.3.59199  included 8 internal users and 6 active sessions at the time of the breach.</p>
<div id="attachment_1796" style="width: 1034px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1796" class="wp-image-1796 size-large" src="https://shadowmap.com/wp-content/uploads/2020/08/MCX-India-Data-Leak-Vulnerable-Pulse-VPN-Servers-1024x426.png" alt="MCX India Data Leak Vulnerable Pulse VPN Servers" width="1024" height="426" srcset="https://shadowmap.com/wp-content/uploads/2020/08/MCX-India-Data-Leak-Vulnerable-Pulse-VPN-Servers-980x407.png 980w, https://shadowmap.com/wp-content/uploads/2020/08/MCX-India-Data-Leak-Vulnerable-Pulse-VPN-Servers-480x200.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /><p id="caption-attachment-1796" class="wp-caption-text">MCX India Data Leak Vulnerable Pulse VPN Servers</p></div>
<p>&nbsp;</p>
<h3>ICRA</h3>
<p>The compromised VPN server was running the vulnerable firmware version 9.0.3.64015 and included 4 internal users and 6 active sessions at the time of the breach.</p>
<div id="attachment_1795" style="width: 1034px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1795" class="wp-image-1795 size-large" src="https://shadowmap.com/wp-content/uploads/2020/08/ICRA-Data-Leak-Vulnerable-Pulse-VPN-Servers-1024x288.png" alt="ICRA Data Leak Vulnerable Pulse VPN Servers" width="1024" height="288" srcset="https://shadowmap.com/wp-content/uploads/2020/08/ICRA-Data-Leak-Vulnerable-Pulse-VPN-Servers-980x275.png 980w, https://shadowmap.com/wp-content/uploads/2020/08/ICRA-Data-Leak-Vulnerable-Pulse-VPN-Servers-480x135.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /><p id="caption-attachment-1795" class="wp-caption-text">ICRA Data Leak Vulnerable Pulse VPN Servers</p></div>
<p>&nbsp;</p>
<h3>Panasonic owned Anchor Electricals</h3>
<p>The compromised VPN server was running the vulnerable firmware version 8.3.7.65013 and included 665 internal users and 374 active sessions including both internal users and several third party consultants as well.</p>
<div id="attachment_1794" style="width: 1034px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1794" class="wp-image-1794 size-large" src="https://shadowmap.com/wp-content/uploads/2020/08/Anchor-Panasonic-Data-Leak-Vulnerable-Pulse-VPN-Servers-1024x517.png" alt="Anchor Panasonic Data Leak Vulnerable Pulse VPN Servers" width="1024" height="517" srcset="https://shadowmap.com/wp-content/uploads/2020/08/Anchor-Panasonic-Data-Leak-Vulnerable-Pulse-VPN-Servers-980x494.png 980w, https://shadowmap.com/wp-content/uploads/2020/08/Anchor-Panasonic-Data-Leak-Vulnerable-Pulse-VPN-Servers-480x242.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /><p id="caption-attachment-1794" class="wp-caption-text">Anchor Panasonic Data Leak Vulnerable Pulse VPN Servers</p></div>
<p>&nbsp;</p>
<h2>General Recommendations</h2>
<ul>
<li>Apply the patch as recommended by Pulse Secure.</li>
<li>Review your patch management process to identify &amp; address gaps</li>
<li>Implement a hardware token, OTP or certificate based authentication to add a second factor check</li>
<li>If you are a ShadowMap customer, review your <a href="https://shadowmap.com/cyber-threat-intelligence/">Threat Intelligence</a> alerts to identify all currently open vulnerabilities that need to be mitigated.</li>
</ul>
<p>The post <a href="https://shadowmap.com/threat-intelligence/hackers-publish-1800-vulnerable-pulse-vpn-servers/">Hackers Publish 1800 Vulnerable Pulse VPN Servers &#8211; Includes MCX India, ICRA &#038; Panasonic</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://shadowmap.com/threat-intelligence/hackers-publish-1800-vulnerable-pulse-vpn-servers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Dunzo Data Breach Published on DarkWeb Forum &#8211; 6 Million Users Impacted</title>
		<link>https://shadowmap.com/threat-intelligence/dunzo-data-breach-published-on-darkweb-forum-6-million-users-impacted/</link>
					<comments>https://shadowmap.com/threat-intelligence/dunzo-data-breach-published-on-darkweb-forum-6-million-users-impacted/#respond</comments>
		
		<dc:creator><![CDATA[Yash Kadakia]]></dc:creator>
		<pubDate>Fri, 17 Jul 2020 12:55:23 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Dunzo]]></category>
		<guid isPermaLink="false">https://shadowmap.com/?p=1772</guid>

					<description><![CDATA[<p>ShadowMap’s AI &#038; ML based digital risk management platform has discovered a new data breach on the darkweb that impacts 6 million users of the online delivery service, Dunzo. </p>
<p>The post <a href="https://shadowmap.com/threat-intelligence/dunzo-data-breach-published-on-darkweb-forum-6-million-users-impacted/">Dunzo Data Breach Published on DarkWeb Forum &#8211; 6 Million Users Impacted</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>ShadowMap&#8217;s AI &amp; ML based <a href="https://shadowmap.com/">digital risk management platform </a>has discovered a new <a href="https://shadowmap.com/monitoring-dark-web-forums-data-breaches/">data breach on the darkweb</a> that impacts 6 million users of the online delivery service, <a href="https://www.dunzo.com/">Dunzo</a>. Dunzo is an Indian company that provides delivery services in Bengaluru, Delhi, Gurugram, Pune, Chennai, Jaipur, Mumbai and Hyderabad. The company also operates a Bike Taxi service in Gurugram. It is headquartered in Bengaluru, India. In 2017, it was funded by Google.</p>
<h2><a href="https://shadowmap.com/monitoring-dark-web-forums-data-breaches/">Monitoring The Dark Web &amp; Discovering The Breach</a></h2>
<p>The initial disclosure of the breach was made by Dunzo it self on the 11th of July 2020. As part of our continuous monitoring of 4000+ Surface, Deep &amp; Dark Web Forums for data breaches, we discovered this database being sold on DarkWeb forums around the first week of July 2020.</p>
<p>The forum post claims that the data contains 8,493,681 rows of user data and the hacker has suggested that the initial breach took place in June 2020. On analysing the breach data, we found there were 5,969,986 rows of data published as part of this leak and the breach itself took place around the 20th of June 2020.</p>
<div id="attachment_1775" style="width: 1034px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1775" class="wp-image-1775 size-large" src="https://shadowmap.com/wp-content/uploads/2020/08/Dunzo-Data-Breach-Dark-Web-Forum-1024x313.png" alt="Dunzo Data Breach Published on Dark Web Forums" width="1024" height="313" srcset="https://shadowmap.com/wp-content/uploads/2020/08/Dunzo-Data-Breach-Dark-Web-Forum-980x299.png 980w, https://shadowmap.com/wp-content/uploads/2020/08/Dunzo-Data-Breach-Dark-Web-Forum-480x147.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /><p id="caption-attachment-1775" class="wp-caption-text">Dunzo Data Breach Published on Dark Web Forums</p></div>
<h2>Inside The Dunzo Data Breach</h2>
<p>The database contains a single table: <strong>Users_DunzoUser</strong></p>
<p><code>id, password, last_login, is_superuser, uuid, first_name, last_name, email, phone, country_code, type, status, device_token, phone_type, phone_make, date_joined, last_updated, secret_key, app_version, registered_on, registered_platform character, send_logistics_pricing, send_logistics_pricing_image_format, last_pricing_version_shared, preferred_mode_of_payment, credit_amount, credit_score, maximum_retries_count, profile_data_updated_on_firebase, merchant_id, permission_role, user_status, flow_version, extra_data_json, city_id, current_runner_task_id, source, first_known_location, last_known_location, referral_code, referred_by_code, advertising_id, device_id, bucket_id</code></p>
<p>The passwords in the database seem to be stored using Django Password Hashes (Salted SHA 256 hash with 20000 iterations), while some users don&#8217;t have a password string in the database since they are most likely using social or OTP based login. In-addition to the email addresses, mobile numbers, IP addresses &amp; password hashes the GPS locations of the users while they installed and last used the application along with details about their phone devices are also available.</p>
<div id="attachment_1818" style="width: 1034px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1818" class="wp-image-1818 size-large" src="https://shadowmap.com/wp-content/uploads/2020/07/dunzo-data-breach-1024x586.png" alt="Dunzo Data Breach" width="1024" height="586" srcset="https://shadowmap.com/wp-content/uploads/2020/07/dunzo-data-breach-980x561.png 980w, https://shadowmap.com/wp-content/uploads/2020/07/dunzo-data-breach-480x275.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /><p id="caption-attachment-1818" class="wp-caption-text">Dunzo Data Breach</p></div>
<h2>General Recommendations</h2>
<p>Since the password hashes have been leaked, there is a significantly likelihood of password stuffing attacks taking place against various platforms where the same email / mobile and password are being used. In-addition to this, threat actors can use the email addresses to send spam, phishing emails, and launch other online scams.</p>
<p>So, as a rule of thumb:</p>
<ul>
<li>Use strong passwords.</li>
<li>Enable multi-factor authentication for all your online accounts.</li>
<li>Don’t open unsolicited email attachments and links, especially from senders you don’t recognise.</li>
<li>Don’t share OTPs with third-parties.</li>
<li>Review online accounts and financial statements periodically.</li>
<li>Regularly update your apps and any other software you use.</li>
</ul>
<p>The post <a href="https://shadowmap.com/threat-intelligence/dunzo-data-breach-published-on-darkweb-forum-6-million-users-impacted/">Dunzo Data Breach Published on DarkWeb Forum &#8211; 6 Million Users Impacted</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://shadowmap.com/threat-intelligence/dunzo-data-breach-published-on-darkweb-forum-6-million-users-impacted/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Politco Europe: EU Parliament says sensitive data of 1,200 officials left exposed on web</title>
		<link>https://www.politico.eu/article/eu-parliament-says-sensitive-data-of-1200-officials-left-exposed-on-web/#new_tab</link>
					<comments>https://www.politico.eu/article/eu-parliament-says-sensitive-data-of-1200-officials-left-exposed-on-web/#new_tab#respond</comments>
		
		<dc:creator><![CDATA[Yash Kadakia]]></dc:creator>
		<pubDate>Thu, 16 Jul 2020 10:45:37 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://shadowmap.com/?p=1666</guid>

					<description><![CDATA[<p>The post <a href="https://www.politico.eu/article/eu-parliament-says-sensitive-data-of-1200-officials-left-exposed-on-web/#new_tab">Politco Europe: EU Parliament says sensitive data of 1,200 officials left exposed on web</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The post <a href="https://www.politico.eu/article/eu-parliament-says-sensitive-data-of-1200-officials-left-exposed-on-web/#new_tab">Politco Europe: EU Parliament says sensitive data of 1,200 officials left exposed on web</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.politico.eu/article/eu-parliament-says-sensitive-data-of-1200-officials-left-exposed-on-web/#new_tab/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyber Security Intelligence: EU Parliament Suffers A Major Attack</title>
		<link>https://www.cybersecurityintelligence.com/blog/eu-parliament-suffers-a-major-attack--4971.html#new_tab</link>
					<comments>https://www.cybersecurityintelligence.com/blog/eu-parliament-suffers-a-major-attack--4971.html#new_tab#respond</comments>
		
		<dc:creator><![CDATA[Yash Kadakia]]></dc:creator>
		<pubDate>Tue, 19 May 2020 10:31:29 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://shadowmap.com/?p=1652</guid>

					<description><![CDATA[<p>The post <a href="https://www.cybersecurityintelligence.com/blog/eu-parliament-suffers-a-major-attack--4971.html#new_tab">Cyber Security Intelligence: EU Parliament Suffers A Major Attack</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The post <a href="https://www.cybersecurityintelligence.com/blog/eu-parliament-suffers-a-major-attack--4971.html#new_tab">Cyber Security Intelligence: EU Parliament Suffers A Major Attack</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.cybersecurityintelligence.com/blog/eu-parliament-suffers-a-major-attack--4971.html#new_tab/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
