<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Dark Web Archives - ShadowMap</title>
	<atom:link href="https://shadowmap.com/tag/dark-web/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Digital Risk Management - Asset Inventory &#38; Cyber Threat Intelligence - ShadowMap</description>
	<lastBuildDate>Mon, 10 Aug 2020 10:31:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>

<image>
	<url>https://shadowmap.com/wp-content/uploads/2019/07/favicon-50x50.png</url>
	<title>Dark Web Archives - ShadowMap</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Zoosk Data Breach Published on Darkweb Forum &#8211; 29 Million Users Impacted</title>
		<link>https://shadowmap.com/threat-intelligence/zoosk-data-breach-published-on-darkweb-forum/</link>
					<comments>https://shadowmap.com/threat-intelligence/zoosk-data-breach-published-on-darkweb-forum/#respond</comments>
		
		<dc:creator><![CDATA[Yash Kadakia]]></dc:creator>
		<pubDate>Wed, 05 Aug 2020 08:08:10 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Zoosk]]></category>
		<guid isPermaLink="false">https://shadowmap.com/?p=1691</guid>

					<description><![CDATA[<p>ShadowMap’s AI &#038; ML based digital risk management platform has discovered a new data breach on the darkweb that impacts 29 million users of the online dating website, Zoosk. </p>
<p>The post <a href="https://shadowmap.com/threat-intelligence/zoosk-data-breach-published-on-darkweb-forum/">Zoosk Data Breach Published on Darkweb Forum &#8211; 29 Million Users Impacted</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>ShadowMap&#8217;s AI &amp; ML based <a href="https://shadowmap.com/">digital risk management platform </a>has discovered a new <a href="https://shadowmap.com/monitoring-dark-web-forums-data-breaches/">data breach on the darkweb</a> that impacts 29 million users of the online dating website, <a href="https://www.zoosk.com/">Zoosk</a>. Zoosk is an online dating service available in 25 languages and in more than 80 countries and is part of the Spark Networks SE which includes SilverSingles, EliteSingles, Jdate, Christian Mingle, eDarling, JSwipe, AdventistSingles, LDSSingles, and Attractive World.</p>
<h2><a href="https://shadowmap.com/monitoring-dark-web-forums-data-breaches/">Monitoring The Dark Web &amp; Discovering The Breach</a></h2>
<p>As part of our continuous monitoring of 4000+ Surface, Deep &amp; Dark Web Forums for data breaches, we discovered this data being traded early last week, while it has been openly published for public consumption on the 5th of August 2020.</p>
<p>The data contains 29,186,600 rows of user data and the hacker has suggested that the initial breach took place in January 2020.</p>
<div id="attachment_1694" style="width: 1034px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-1694" class="wp-image-1694 size-large" src="https://shadowmap.com/wp-content/uploads/2020/08/Zoosk-Data-Breach-Dark-Web-Forum-1024x257.png" alt="Zoosk Data Breach Published on Dark Web Forums" width="1024" height="257" srcset="https://shadowmap.com/wp-content/uploads/2020/08/Zoosk-Data-Breach-Dark-Web-Forum-980x246.png 980w, https://shadowmap.com/wp-content/uploads/2020/08/Zoosk-Data-Breach-Dark-Web-Forum-480x121.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /><p id="caption-attachment-1694" class="wp-caption-text">Zoosk Data Breach Published on Dark Web Forums</p></div>
<h2></h2>
<h2>Inside The Zoosk Data Breach</h2>
<p>The data contains two tables:</p>
<p><strong>User Table</strong><code><br />
id, first_name, last_name, user_nicename, user_email, email_status, user_status, widget_guid, sex, interested_in, relationship, birthday, location_id, latitude, longitude, zipcode, country, discoverable, user_activation_key, media_request_id, user_registered, last_login, lastdailable_flatched migrated, height, ethnicity, education, religion, politics, children, smoking, drinking, bodytype, income, pets, settings, currency_id, balance, provider_map, photo_source, photo_count, locale_id, timezone_id, source, is_remarketed_to, dscore, rscore, sscore</code></p>
<p><strong>Tig Users Table</strong><br />
<code>uid, user_id, sha1_user_id, user_pw, last_login, last_logout, online_status, failed_logins, account_status</code></p>
<h2></h2>
<h2>General Recommendations</h2>
<p>Even though passwords were not leaked, threat actors can use the email addresses to send spam, phishing emails, and launch other online scams.</p>
<p>So, as a rule of thumb:</p>
<ul>
<li>Use strong passwords.</li>
<li>Enable multi-factor authentication for all your online accounts.</li>
<li>Don’t open unsolicited email attachments and links, especially from senders you don’t recognise.</li>
<li>Don’t share OTPs with third-parties.</li>
<li>Review online accounts and financial statements periodically.</li>
<li>Regularly update your apps and any other software you use.</li>
</ul>
<p>The post <a href="https://shadowmap.com/threat-intelligence/zoosk-data-breach-published-on-darkweb-forum/">Zoosk Data Breach Published on Darkweb Forum &#8211; 29 Million Users Impacted</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://shadowmap.com/threat-intelligence/zoosk-data-breach-published-on-darkweb-forum/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hackers Publish 1800 Vulnerable Pulse VPN Servers &#8211; Includes MCX India, ICRA &#038; Panasonic</title>
		<link>https://shadowmap.com/threat-intelligence/hackers-publish-1800-vulnerable-pulse-vpn-servers/</link>
					<comments>https://shadowmap.com/threat-intelligence/hackers-publish-1800-vulnerable-pulse-vpn-servers/#respond</comments>
		
		<dc:creator><![CDATA[Yash Kadakia]]></dc:creator>
		<pubDate>Tue, 04 Aug 2020 11:26:17 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[Data Leak]]></category>
		<category><![CDATA[Pulse Secure]]></category>
		<guid isPermaLink="false">https://shadowmap.com/?p=1789</guid>

					<description><![CDATA[<p>ShadowMap has picked up on new threat intelligence showing that hackers have released the details from 1800 vulnerable pulse VPN servers including those belonging to MCX India, ICRA &#038; Panasonic.</p>
<p>The post <a href="https://shadowmap.com/threat-intelligence/hackers-publish-1800-vulnerable-pulse-vpn-servers/">Hackers Publish 1800 Vulnerable Pulse VPN Servers &#8211; Includes MCX India, ICRA &#038; Panasonic</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>ShadowMap&#8217;s AI &amp; ML based <a href="https://shadowmap.com/">digital risk management platform </a>has picked up on new <a href="https://shadowmap.com/cyber-threat-intelligence/">threat intelligence</a> showing that hackers have released the details from 1800 vulnerable pulse VPN servers onto various deep &amp; dark web forums. The list of 1800 servers contain several Indian entities including the <a href="https://www.mcxindia.com/">Multi Commodity Exchange (MCX India)</a>, <a href="https://www.icra.in/">ICRA</a> &amp; <a href="https://lsin.panasonic.com/">Panasonic owned Anchor Electricals</a>.</p>
<h2>About the CVE-2019-11510 Pulse VPN Server Vulnerability</h2>
<p>The critical vulnerability (<a href="https://www.cvedetails.com/cve/CVE-2019-11510/">CVE-2019-11510</a>) in Pulse Secure Pulse Connect Secure, allows an unauthenticated remote attacker to arbitrary read files stored on the PCS device. The vulnerability affects versions 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4 of the platform.</p>
<p>ShadowMap&#8217;s <a href="https://shadowmap.com/cyber-threat-intelligence/">Cyber Threat Intelligence</a> modules have checks integrated for this vulnerability since May 2019 and will have corresponding alerts for any vulnerable servers.</p>
<h3><strong>Timeline</strong></h3>
<ul>
<li>April 24, 2019 – Pulse Secure releases initial advisory and software updates addressing multiple vulnerabilities.</li>
<li>May 28, 2019 – Large commercial vendors get reports of vulnerable VPN through HackerOne.</li>
<li>July 31, 2019 – Full use of exploit demonstrated using the admin session hash to get complete shell.</li>
<li>August 8, 2019 – Meh Chang and Orange Tsai demonstrate the VPN issues across multiple vendors (Pulse Secure) with detailed attack on active VPN exploitation.</li>
<li>August 24, 2019 – Bad Packets identifies over 14,500 vulnerable VPN servers globally still unpatched and in need of an upgrade.</li>
<li>October 7, 2019 – The National Security Agency (NSA) produces a Cybersecurity Advisory on Pulse Secure and other VPN products being targeted actively by advanced persistent threat actors.</li>
<li>October 16, 2019 – The CERT Coordination Center (CERT/CC) releases Vulnerability Note VU#927237: Pulse Secure VPN contains multiple vulnerabilities.</li>
<li>January 2020 – Media reports cybercriminals now targeting unpatched Pulse Secure VPN servers to install REvil (Sodinokibi) ransomware.</li>
</ul>
<p>&nbsp;</p>
<h2><a href="https://shadowmap.com/monitoring-dark-web-forums-data-breaches/">Monitoring The Dark Web &amp; Discovering The Breach</a></h2>
<p>The initial disclosure of the breach was made by Pulse Secure through an advisory in April 2019. This vulnerability was found to be mass exploited over the last 8-9 months with a large number of vulnerable servers found to be publicly open. As part of our continuous monitoring of 4000+ Surface, Deep &amp; Dark Web Forums, around the 4th of August, we picked up posts on various Deep &amp; Dark Web forums where attackers had published a dump of 1800 vulnerable servers along with several sensitive details.</p>
<h2>Inside The 1800 Vulnerable Pulse VPN Servers</h2>
<p>On analysing the data set, we found that the leak includes the following details for each of the 1800 IP addresses listed:</p>
<ul>
<li>IP addresses of Pulse Secure VPN servers</li>
<li>Pulse Secure VPN server firmware version</li>
<li>SSH keys for each server</li>
<li>A list of all local users and their password hashes</li>
<li>Admin account details</li>
<li>Last VPN logins (including usernames and cleartext passwords)</li>
<li>VPN session cookies</li>
</ul>
<p>On further analysis, we found several Indian entities that were a part of this breach.</p>
<h3>Multi Commodity Exchange (MCX India)</h3>
<p>The compromised VPN server was running the vulnerable firmware version 8.3.3.59199  included 8 internal users and 6 active sessions at the time of the breach.</p>
<div id="attachment_1796" style="width: 1034px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1796" class="wp-image-1796 size-large" src="https://shadowmap.com/wp-content/uploads/2020/08/MCX-India-Data-Leak-Vulnerable-Pulse-VPN-Servers-1024x426.png" alt="MCX India Data Leak Vulnerable Pulse VPN Servers" width="1024" height="426" srcset="https://shadowmap.com/wp-content/uploads/2020/08/MCX-India-Data-Leak-Vulnerable-Pulse-VPN-Servers-980x407.png 980w, https://shadowmap.com/wp-content/uploads/2020/08/MCX-India-Data-Leak-Vulnerable-Pulse-VPN-Servers-480x200.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /><p id="caption-attachment-1796" class="wp-caption-text">MCX India Data Leak Vulnerable Pulse VPN Servers</p></div>
<p>&nbsp;</p>
<h3>ICRA</h3>
<p>The compromised VPN server was running the vulnerable firmware version 9.0.3.64015 and included 4 internal users and 6 active sessions at the time of the breach.</p>
<div id="attachment_1795" style="width: 1034px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1795" class="wp-image-1795 size-large" src="https://shadowmap.com/wp-content/uploads/2020/08/ICRA-Data-Leak-Vulnerable-Pulse-VPN-Servers-1024x288.png" alt="ICRA Data Leak Vulnerable Pulse VPN Servers" width="1024" height="288" srcset="https://shadowmap.com/wp-content/uploads/2020/08/ICRA-Data-Leak-Vulnerable-Pulse-VPN-Servers-980x275.png 980w, https://shadowmap.com/wp-content/uploads/2020/08/ICRA-Data-Leak-Vulnerable-Pulse-VPN-Servers-480x135.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /><p id="caption-attachment-1795" class="wp-caption-text">ICRA Data Leak Vulnerable Pulse VPN Servers</p></div>
<p>&nbsp;</p>
<h3>Panasonic owned Anchor Electricals</h3>
<p>The compromised VPN server was running the vulnerable firmware version 8.3.7.65013 and included 665 internal users and 374 active sessions including both internal users and several third party consultants as well.</p>
<div id="attachment_1794" style="width: 1034px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1794" class="wp-image-1794 size-large" src="https://shadowmap.com/wp-content/uploads/2020/08/Anchor-Panasonic-Data-Leak-Vulnerable-Pulse-VPN-Servers-1024x517.png" alt="Anchor Panasonic Data Leak Vulnerable Pulse VPN Servers" width="1024" height="517" srcset="https://shadowmap.com/wp-content/uploads/2020/08/Anchor-Panasonic-Data-Leak-Vulnerable-Pulse-VPN-Servers-980x494.png 980w, https://shadowmap.com/wp-content/uploads/2020/08/Anchor-Panasonic-Data-Leak-Vulnerable-Pulse-VPN-Servers-480x242.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /><p id="caption-attachment-1794" class="wp-caption-text">Anchor Panasonic Data Leak Vulnerable Pulse VPN Servers</p></div>
<p>&nbsp;</p>
<h2>General Recommendations</h2>
<ul>
<li>Apply the patch as recommended by Pulse Secure.</li>
<li>Review your patch management process to identify &amp; address gaps</li>
<li>Implement a hardware token, OTP or certificate based authentication to add a second factor check</li>
<li>If you are a ShadowMap customer, review your <a href="https://shadowmap.com/cyber-threat-intelligence/">Threat Intelligence</a> alerts to identify all currently open vulnerabilities that need to be mitigated.</li>
</ul>
<p>The post <a href="https://shadowmap.com/threat-intelligence/hackers-publish-1800-vulnerable-pulse-vpn-servers/">Hackers Publish 1800 Vulnerable Pulse VPN Servers &#8211; Includes MCX India, ICRA &#038; Panasonic</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://shadowmap.com/threat-intelligence/hackers-publish-1800-vulnerable-pulse-vpn-servers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Dunzo Data Breach Published on DarkWeb Forum &#8211; 6 Million Users Impacted</title>
		<link>https://shadowmap.com/threat-intelligence/dunzo-data-breach-published-on-darkweb-forum-6-million-users-impacted/</link>
					<comments>https://shadowmap.com/threat-intelligence/dunzo-data-breach-published-on-darkweb-forum-6-million-users-impacted/#respond</comments>
		
		<dc:creator><![CDATA[Yash Kadakia]]></dc:creator>
		<pubDate>Fri, 17 Jul 2020 12:55:23 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Dunzo]]></category>
		<guid isPermaLink="false">https://shadowmap.com/?p=1772</guid>

					<description><![CDATA[<p>ShadowMap’s AI &#038; ML based digital risk management platform has discovered a new data breach on the darkweb that impacts 6 million users of the online delivery service, Dunzo. </p>
<p>The post <a href="https://shadowmap.com/threat-intelligence/dunzo-data-breach-published-on-darkweb-forum-6-million-users-impacted/">Dunzo Data Breach Published on DarkWeb Forum &#8211; 6 Million Users Impacted</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>ShadowMap&#8217;s AI &amp; ML based <a href="https://shadowmap.com/">digital risk management platform </a>has discovered a new <a href="https://shadowmap.com/monitoring-dark-web-forums-data-breaches/">data breach on the darkweb</a> that impacts 6 million users of the online delivery service, <a href="https://www.dunzo.com/">Dunzo</a>. Dunzo is an Indian company that provides delivery services in Bengaluru, Delhi, Gurugram, Pune, Chennai, Jaipur, Mumbai and Hyderabad. The company also operates a Bike Taxi service in Gurugram. It is headquartered in Bengaluru, India. In 2017, it was funded by Google.</p>
<h2><a href="https://shadowmap.com/monitoring-dark-web-forums-data-breaches/">Monitoring The Dark Web &amp; Discovering The Breach</a></h2>
<p>The initial disclosure of the breach was made by Dunzo it self on the 11th of July 2020. As part of our continuous monitoring of 4000+ Surface, Deep &amp; Dark Web Forums for data breaches, we discovered this database being sold on DarkWeb forums around the first week of July 2020.</p>
<p>The forum post claims that the data contains 8,493,681 rows of user data and the hacker has suggested that the initial breach took place in June 2020. On analysing the breach data, we found there were 5,969,986 rows of data published as part of this leak and the breach itself took place around the 20th of June 2020.</p>
<div id="attachment_1775" style="width: 1034px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1775" class="wp-image-1775 size-large" src="https://shadowmap.com/wp-content/uploads/2020/08/Dunzo-Data-Breach-Dark-Web-Forum-1024x313.png" alt="Dunzo Data Breach Published on Dark Web Forums" width="1024" height="313" srcset="https://shadowmap.com/wp-content/uploads/2020/08/Dunzo-Data-Breach-Dark-Web-Forum-980x299.png 980w, https://shadowmap.com/wp-content/uploads/2020/08/Dunzo-Data-Breach-Dark-Web-Forum-480x147.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /><p id="caption-attachment-1775" class="wp-caption-text">Dunzo Data Breach Published on Dark Web Forums</p></div>
<h2>Inside The Dunzo Data Breach</h2>
<p>The database contains a single table: <strong>Users_DunzoUser</strong></p>
<p><code>id, password, last_login, is_superuser, uuid, first_name, last_name, email, phone, country_code, type, status, device_token, phone_type, phone_make, date_joined, last_updated, secret_key, app_version, registered_on, registered_platform character, send_logistics_pricing, send_logistics_pricing_image_format, last_pricing_version_shared, preferred_mode_of_payment, credit_amount, credit_score, maximum_retries_count, profile_data_updated_on_firebase, merchant_id, permission_role, user_status, flow_version, extra_data_json, city_id, current_runner_task_id, source, first_known_location, last_known_location, referral_code, referred_by_code, advertising_id, device_id, bucket_id</code></p>
<p>The passwords in the database seem to be stored using Django Password Hashes (Salted SHA 256 hash with 20000 iterations), while some users don&#8217;t have a password string in the database since they are most likely using social or OTP based login. In-addition to the email addresses, mobile numbers, IP addresses &amp; password hashes the GPS locations of the users while they installed and last used the application along with details about their phone devices are also available.</p>
<div id="attachment_1818" style="width: 1034px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1818" class="wp-image-1818 size-large" src="https://shadowmap.com/wp-content/uploads/2020/07/dunzo-data-breach-1024x586.png" alt="Dunzo Data Breach" width="1024" height="586" srcset="https://shadowmap.com/wp-content/uploads/2020/07/dunzo-data-breach-980x561.png 980w, https://shadowmap.com/wp-content/uploads/2020/07/dunzo-data-breach-480x275.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /><p id="caption-attachment-1818" class="wp-caption-text">Dunzo Data Breach</p></div>
<h2>General Recommendations</h2>
<p>Since the password hashes have been leaked, there is a significantly likelihood of password stuffing attacks taking place against various platforms where the same email / mobile and password are being used. In-addition to this, threat actors can use the email addresses to send spam, phishing emails, and launch other online scams.</p>
<p>So, as a rule of thumb:</p>
<ul>
<li>Use strong passwords.</li>
<li>Enable multi-factor authentication for all your online accounts.</li>
<li>Don’t open unsolicited email attachments and links, especially from senders you don’t recognise.</li>
<li>Don’t share OTPs with third-parties.</li>
<li>Review online accounts and financial statements periodically.</li>
<li>Regularly update your apps and any other software you use.</li>
</ul>
<p>The post <a href="https://shadowmap.com/threat-intelligence/dunzo-data-breach-published-on-darkweb-forum-6-million-users-impacted/">Dunzo Data Breach Published on DarkWeb Forum &#8211; 6 Million Users Impacted</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://shadowmap.com/threat-intelligence/dunzo-data-breach-published-on-darkweb-forum-6-million-users-impacted/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
