On the other hand, on Raid Forums that happened to be a prominent hacker forum, a threat actor took credit for the leak and claimed they downloaded the data before it was wiped out by the meow attack. However, an Iranian Twitter user responded to the researcher with a screenshot apparently a tweet from the Raychat app stating there was no such data leak. The attack does not ensue any ransom notes or threats but just the word ‘meow’ along with a random set of numbers.ĭiachenko had also revealed that he did not receive any response from the company. According to the researcher, the database contained more than 267 million accounts with data like names, emails, passwords, metadata, encrypted chats, etc.ĭiachenko further added that the database was destroyed by a bot attack, referring to the meow attack, which appears to exist only to destroy databases that are misconfigured and exposed online to public access without any security authentication. SEE: Hacker dumps sensitive household records of 250M Americansįor your information, on January 31st, 2021, Diachenko tweeted that the Raychat app exposed its entire database on a misconfigured server. However, it is unclear whether the Raychat app had these records stolen from its servers or it was a result of a previous data leak that took place as a result of the misconfigured database identified by IT security researchers Bob Diachenko on January 31st, 2021. It is worth noting that the database first appeared on a popular Russian hacker forum around 7:20 AM, Monday, May 3, 2021. Screenshot from the leaked database (Image credit: ) Once upon a time in January 2021 The data leak which has been seen and analyzed by includes:Įmail addresses (The exact number leaked email address is yet unclear) Raychat app (Raychat.io), a popular Iranian social and business messaging platform has apparently suffered a data breach in which personal data and records of over 150 million users have been leaked online. The hacker behind the data leak claims they downloaded the Raychat app data when the company exposed its entire database online between December 2020 to January 2021.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |