![]() ![]() Vickery, who posted a screenshot of the folder structure (below), said on Reddit that the server was completely unprotected. The data was accessed by white-hat researcher Chris Vickery, who previously exposed data breaches at MLB, ATP, Slipknot and a network of charter K-12 schools in California … ![]() ![]() I have recently downloaded over 13 million sensitive account details related to MacKeeper, Zeobit, and/or Kromtech stuff like names, email addresses, usernames, password hashes, computer name, ip address, software license and activation codes, type of hardware (ex: “macbook pro”), type of subscriptions, phone numbers and computer serial numbers. “The only customer information we retain are name, products ordered, license information, public ip address and their user credentials such as product specific usernames, password hashes for the customer’s web admin account where they can manage subscriptions, support, and product licenses.”Īs if conning people out of money for a piece of scamware that does nothing useful weren’t bad enough, a security researcher claims that extremely poor security has allowed him to access sensitive data for more than 13M MacKeeper accounts. Update: Kromtech has acknowledged the breach, stating that “analysis of our data storage system shows only one individual gained access performed by the security researcher himself.” It says that payment information is processed by a third-party company and is not stored by the company. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |