<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Archives - ShadowMap</title>
	<atom:link href="https://shadowmap.com/tag/data-breach/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Digital Risk Management - Asset Inventory &#38; Cyber Threat Intelligence - ShadowMap</description>
	<lastBuildDate>Fri, 07 Aug 2020 11:24:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>

<image>
	<url>https://shadowmap.com/wp-content/uploads/2019/07/favicon-50x50.png</url>
	<title>Data Breach Archives - ShadowMap</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Zoosk Data Breach Published on Darkweb Forum &#8211; 29 Million Users Impacted</title>
		<link>https://shadowmap.com/threat-intelligence/zoosk-data-breach-published-on-darkweb-forum/</link>
					<comments>https://shadowmap.com/threat-intelligence/zoosk-data-breach-published-on-darkweb-forum/#respond</comments>
		
		<dc:creator><![CDATA[Yash Kadakia]]></dc:creator>
		<pubDate>Wed, 05 Aug 2020 08:08:10 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Zoosk]]></category>
		<guid isPermaLink="false">https://shadowmap.com/?p=1691</guid>

					<description><![CDATA[<p>ShadowMap’s AI &#038; ML based digital risk management platform has discovered a new data breach on the darkweb that impacts 29 million users of the online dating website, Zoosk. </p>
<p>The post <a href="https://shadowmap.com/threat-intelligence/zoosk-data-breach-published-on-darkweb-forum/">Zoosk Data Breach Published on Darkweb Forum &#8211; 29 Million Users Impacted</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>ShadowMap&#8217;s AI &amp; ML based <a href="https://shadowmap.com/">digital risk management platform </a>has discovered a new <a href="https://shadowmap.com/monitoring-dark-web-forums-data-breaches/">data breach on the darkweb</a> that impacts 29 million users of the online dating website, <a href="https://www.zoosk.com/">Zoosk</a>. Zoosk is an online dating service available in 25 languages and in more than 80 countries and is part of the Spark Networks SE which includes SilverSingles, EliteSingles, Jdate, Christian Mingle, eDarling, JSwipe, AdventistSingles, LDSSingles, and Attractive World.</p>
<h2><a href="https://shadowmap.com/monitoring-dark-web-forums-data-breaches/">Monitoring The Dark Web &amp; Discovering The Breach</a></h2>
<p>As part of our continuous monitoring of 4000+ Surface, Deep &amp; Dark Web Forums for data breaches, we discovered this data being traded early last week, while it has been openly published for public consumption on the 5th of August 2020.</p>
<p>The data contains 29,186,600 rows of user data and the hacker has suggested that the initial breach took place in January 2020.</p>
<div id="attachment_1694" style="width: 1034px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-1694" class="wp-image-1694 size-large" src="https://shadowmap.com/wp-content/uploads/2020/08/Zoosk-Data-Breach-Dark-Web-Forum-1024x257.png" alt="Zoosk Data Breach Published on Dark Web Forums" width="1024" height="257" srcset="https://shadowmap.com/wp-content/uploads/2020/08/Zoosk-Data-Breach-Dark-Web-Forum-980x246.png 980w, https://shadowmap.com/wp-content/uploads/2020/08/Zoosk-Data-Breach-Dark-Web-Forum-480x121.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /><p id="caption-attachment-1694" class="wp-caption-text">Zoosk Data Breach Published on Dark Web Forums</p></div>
<h2></h2>
<h2>Inside The Zoosk Data Breach</h2>
<p>The data contains two tables:</p>
<p><strong>User Table</strong><code><br />
id, first_name, last_name, user_nicename, user_email, email_status, user_status, widget_guid, sex, interested_in, relationship, birthday, location_id, latitude, longitude, zipcode, country, discoverable, user_activation_key, media_request_id, user_registered, last_login, lastdailable_flatched migrated, height, ethnicity, education, religion, politics, children, smoking, drinking, bodytype, income, pets, settings, currency_id, balance, provider_map, photo_source, photo_count, locale_id, timezone_id, source, is_remarketed_to, dscore, rscore, sscore</code></p>
<p><strong>Tig Users Table</strong><br />
<code>uid, user_id, sha1_user_id, user_pw, last_login, last_logout, online_status, failed_logins, account_status</code></p>
<h2></h2>
<h2>General Recommendations</h2>
<p>Even though passwords were not leaked, threat actors can use the email addresses to send spam, phishing emails, and launch other online scams.</p>
<p>So, as a rule of thumb:</p>
<ul>
<li>Use strong passwords.</li>
<li>Enable multi-factor authentication for all your online accounts.</li>
<li>Don’t open unsolicited email attachments and links, especially from senders you don’t recognise.</li>
<li>Don’t share OTPs with third-parties.</li>
<li>Review online accounts and financial statements periodically.</li>
<li>Regularly update your apps and any other software you use.</li>
</ul>
<p>The post <a href="https://shadowmap.com/threat-intelligence/zoosk-data-breach-published-on-darkweb-forum/">Zoosk Data Breach Published on Darkweb Forum &#8211; 29 Million Users Impacted</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://shadowmap.com/threat-intelligence/zoosk-data-breach-published-on-darkweb-forum/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Dunzo Data Breach Published on DarkWeb Forum &#8211; 6 Million Users Impacted</title>
		<link>https://shadowmap.com/threat-intelligence/dunzo-data-breach-published-on-darkweb-forum-6-million-users-impacted/</link>
					<comments>https://shadowmap.com/threat-intelligence/dunzo-data-breach-published-on-darkweb-forum-6-million-users-impacted/#respond</comments>
		
		<dc:creator><![CDATA[Yash Kadakia]]></dc:creator>
		<pubDate>Fri, 17 Jul 2020 12:55:23 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Dunzo]]></category>
		<guid isPermaLink="false">https://shadowmap.com/?p=1772</guid>

					<description><![CDATA[<p>ShadowMap’s AI &#038; ML based digital risk management platform has discovered a new data breach on the darkweb that impacts 6 million users of the online delivery service, Dunzo. </p>
<p>The post <a href="https://shadowmap.com/threat-intelligence/dunzo-data-breach-published-on-darkweb-forum-6-million-users-impacted/">Dunzo Data Breach Published on DarkWeb Forum &#8211; 6 Million Users Impacted</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>ShadowMap&#8217;s AI &amp; ML based <a href="https://shadowmap.com/">digital risk management platform </a>has discovered a new <a href="https://shadowmap.com/monitoring-dark-web-forums-data-breaches/">data breach on the darkweb</a> that impacts 6 million users of the online delivery service, <a href="https://www.dunzo.com/">Dunzo</a>. Dunzo is an Indian company that provides delivery services in Bengaluru, Delhi, Gurugram, Pune, Chennai, Jaipur, Mumbai and Hyderabad. The company also operates a Bike Taxi service in Gurugram. It is headquartered in Bengaluru, India. In 2017, it was funded by Google.</p>
<h2><a href="https://shadowmap.com/monitoring-dark-web-forums-data-breaches/">Monitoring The Dark Web &amp; Discovering The Breach</a></h2>
<p>The initial disclosure of the breach was made by Dunzo it self on the 11th of July 2020. As part of our continuous monitoring of 4000+ Surface, Deep &amp; Dark Web Forums for data breaches, we discovered this database being sold on DarkWeb forums around the first week of July 2020.</p>
<p>The forum post claims that the data contains 8,493,681 rows of user data and the hacker has suggested that the initial breach took place in June 2020. On analysing the breach data, we found there were 5,969,986 rows of data published as part of this leak and the breach itself took place around the 20th of June 2020.</p>
<div id="attachment_1775" style="width: 1034px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1775" class="wp-image-1775 size-large" src="https://shadowmap.com/wp-content/uploads/2020/08/Dunzo-Data-Breach-Dark-Web-Forum-1024x313.png" alt="Dunzo Data Breach Published on Dark Web Forums" width="1024" height="313" srcset="https://shadowmap.com/wp-content/uploads/2020/08/Dunzo-Data-Breach-Dark-Web-Forum-980x299.png 980w, https://shadowmap.com/wp-content/uploads/2020/08/Dunzo-Data-Breach-Dark-Web-Forum-480x147.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /><p id="caption-attachment-1775" class="wp-caption-text">Dunzo Data Breach Published on Dark Web Forums</p></div>
<h2>Inside The Dunzo Data Breach</h2>
<p>The database contains a single table: <strong>Users_DunzoUser</strong></p>
<p><code>id, password, last_login, is_superuser, uuid, first_name, last_name, email, phone, country_code, type, status, device_token, phone_type, phone_make, date_joined, last_updated, secret_key, app_version, registered_on, registered_platform character, send_logistics_pricing, send_logistics_pricing_image_format, last_pricing_version_shared, preferred_mode_of_payment, credit_amount, credit_score, maximum_retries_count, profile_data_updated_on_firebase, merchant_id, permission_role, user_status, flow_version, extra_data_json, city_id, current_runner_task_id, source, first_known_location, last_known_location, referral_code, referred_by_code, advertising_id, device_id, bucket_id</code></p>
<p>The passwords in the database seem to be stored using Django Password Hashes (Salted SHA 256 hash with 20000 iterations), while some users don&#8217;t have a password string in the database since they are most likely using social or OTP based login. In-addition to the email addresses, mobile numbers, IP addresses &amp; password hashes the GPS locations of the users while they installed and last used the application along with details about their phone devices are also available.</p>
<div id="attachment_1818" style="width: 1034px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1818" class="wp-image-1818 size-large" src="https://shadowmap.com/wp-content/uploads/2020/07/dunzo-data-breach-1024x586.png" alt="Dunzo Data Breach" width="1024" height="586" srcset="https://shadowmap.com/wp-content/uploads/2020/07/dunzo-data-breach-980x561.png 980w, https://shadowmap.com/wp-content/uploads/2020/07/dunzo-data-breach-480x275.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /><p id="caption-attachment-1818" class="wp-caption-text">Dunzo Data Breach</p></div>
<h2>General Recommendations</h2>
<p>Since the password hashes have been leaked, there is a significantly likelihood of password stuffing attacks taking place against various platforms where the same email / mobile and password are being used. In-addition to this, threat actors can use the email addresses to send spam, phishing emails, and launch other online scams.</p>
<p>So, as a rule of thumb:</p>
<ul>
<li>Use strong passwords.</li>
<li>Enable multi-factor authentication for all your online accounts.</li>
<li>Don’t open unsolicited email attachments and links, especially from senders you don’t recognise.</li>
<li>Don’t share OTPs with third-parties.</li>
<li>Review online accounts and financial statements periodically.</li>
<li>Regularly update your apps and any other software you use.</li>
</ul>
<p>The post <a href="https://shadowmap.com/threat-intelligence/dunzo-data-breach-published-on-darkweb-forum-6-million-users-impacted/">Dunzo Data Breach Published on DarkWeb Forum &#8211; 6 Million Users Impacted</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://shadowmap.com/threat-intelligence/dunzo-data-breach-published-on-darkweb-forum-6-million-users-impacted/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
