top of page

DemandScience Data Breach Exposes 122 Million Contacts: A Case Study on Decommissioned System Vulnerabilities

Updated: Dec 25, 2024

Image for post about Incident Analysis Report: DemandScience Data Breach

Executive Summary

A significant data breach at DemandScience resulted in the exposure of 132.8 million records, including 122 million unique business email addresses. The incident, first identified in February 2024, involved the unauthorized sale of data on BreachForums by a threat actor known as 'KryptonZambie'. The dataset was later leaked for free on August 15, 2024. The breach was confirmed by BleepingComputer and The Register on November 13, 2024, verifying the data's authenticity and its origins from DemandScience. The root cause was identified as an exposed system that had been decommissioned approximately two years prior. The leaked data comprised business contact information, including full names, physical addresses, email addresses, telephone numbers, job titles, and social media links. The incident highlights the vulnerabilities in data aggregation practices and the cyclical nature of data brokerage. Immediate implications include the notification of affected individuals via Have I Been Pwned, while long-term effects may involve increased scrutiny on data brokers. Industry-wide, this breach underscores the need for robust data management and decommissioning protocols.

Incident Overview

In February 2024, a threat actor named 'KryptonZambie' began selling 132.8 million records on BreachForums, claiming they were stolen from an exposed system belonging to DemandScience. On August 15, 2024, the dataset was made available for 8 credits, effectively leaking the data for free. The breach was reported by BleepingComputer and The Register on November 13, 2024, confirming the data's authenticity and its origins from DemandScience. The root cause was an exposed system that had been decommissioned approximately two years ago.

Technical Details

The leaked data includes business contact information such as full names, physical addresses, email addresses, telephone numbers, job titles, and social media links. DemandScience aggregates data from public sources and third parties, which was then exposed due to a decommissioned system. The data was added to Have I Been Pwned, and affected individuals were notified.

Impact Assessment

The breach exposed 122 million unique business email addresses. The data was added to Have I Been Pwned, and affected individuals were notified. The incident is part of a broader trend of data breaches affecting data brokers and aggregators, as seen in other cases reported by BleepingComputer and The Register.

Official Statements

DemandScience stated that the leaked data originated from a system decommissioned approximately two years ago and that no current operational systems were exploited. The company emphasized that they process publicly available business contact information and do not handle sensitive personal data.

Related Events

The incident is part of a broader trend of data breaches affecting data brokers and aggregators, as seen in other cases reported by BleepingComputer and The Register. Expert analysis by Troy Hunt confirmed the data's authenticity and noted that his own information was included in the leak. The Register highlighted the cyclical nature of data brokerage, where publicly available data is aggregated and then resold.

Recommendations

Critical: Implement robust data management and decommissioning protocols to prevent exposure of outdated systems.

High: Regularly audit data aggregation practices to ensure compliance with data protection regulations.

Medium: Enhance monitoring of data broker activities to identify potential vulnerabilities.

References

https://www.bleepingcomputer.com

https://www.theregister.com

https://www.malwarebytes.com




About Rescana

Rescana specializes in providing comprehensive incident analysis and security solutions tailored to the unique challenges of data breaches. Our expertise includes identifying vulnerabilities in legacy systems, implementing robust security measures, and ensuring compliance with global data protection standards.

17 views0 comments
bottom of page