Research / Anatomy of a Breach (4)

The Daniel's Hosting Hack and Dark Web Security

The hack of Daniel’s Hosting has put the anonymous nature of the DarkNet and Tor into question by revealing that there are no official backups of the sites hosted on it, which has raised a lot of questions for the internet community. First Published 23rd November 2018 Deutschland and …

Read Story

The HSBC Breach and Data Classes

Personal data such as customers' names, addresses, social security numbers, date of birth, and account numbers along with other non-financial information is believed to have been accessed during the breach period. First Published 9th November 2018 The world's local bank make news head …

Read Story

Facebook's 'View As' Breach

In extreme cases, an attacker could use this access to take over the accounts of the people they are spying on - read their private messages, post things on their behalf, and play havoc with their digital lives. First Published 1st October 2018 Access tokens - kinda important to get r …

Read Story

An Update to the Ticketmaster Breach

The malicious script was inserted into the Ticketmaster website via a third-party chat widget called Chatters City created by software developer Inbenta Technologies. First Published 13th July 2018 "Buy the ticket. Take the ride." - Hunter S. Thompson. 4 min read | Reflare Research Te …

Read Story

A Look at the Vevo Hack

A Look at the Vevo Hack

Unidentified attackers appear to have gained access to an account used to manage Vevo YouTube channels. However, it is reasonable to assert that the attackers weren't prepared for their attack to succeed in the first place. First Published 13th April 2018 Sympathy for the record indus …

Read Story

Delta, Sears and 3rd Party Risks

Delta, Sears and 3rd Party Risks

The attack allowed hackers to access thousands of customer support chat transcripts, internal documents and support system configuration files, as well as logs of their external communications. First Published 6th April 2018 "All your data are belong to us." 4 min read | Reflare Resea …

Read Story

How Small Issues Escalate - An Update on the German Governmental Hack

How Small Issues Escalate - An Update on the German Governmental Hack

A cached version of the installation of the ILIAS e-learning system might have allowed hackers access to sensitive information and allowed them to impersonate staff members and perform actions on their behalf. First Published 9th March 2018 From little things, big things wachsen. 4 mi …

Read Story

Cyber-Attacks hit German Governmental Network

Cyber-Attacks hit German Governmental Network

German officials have confirmed a major security breach at a government network, but they are not revealing any additional information or the nature of the attack, even though different media agencies are reporting wildly different versions of what happened. First Published 2nd March …

Read Story

Attackers are Humans Too - On Stealing $24

What do you do when you successfully attack a service designed to help the vision impaired interact with over 5,000 websites? Mine $24 worth of Monero, of course (duh!) First Published 16th February 2018 "Now that I've finally managed to break in, I'll just take this." 4 min read | Re …

Read Story

NiceHash Hack

NiceHash, a Slovenian company that allows users to mine virtual currencies for themselves or for others suffered a hack which led to tens of millions of dollars worth of Bitcoin being stolen. First Published 8th December 2017 While demand continues to grow, crypto platforms are strugg …

Read Story

Subscribe by email