- Popular YouTube music channel gets income yanked for ‘repetitious’ content 2 Years Ago
- New website will endlessly generate fake faces thanks to AI 2 Years Ago
- Man fakes getting stood up at Outback Steakhouse Today 3:03 PM
- FCC looks to tackle robocalls and spoofed texts Today 2:57 PM
- How to protect yourself from the data breach that affected 744 million accounts Today 12:56 PM
- How to stream Rob Brant vs. Khasan Baysangurov online for free Today 12:21 PM
- No, Ocasio-Cortez doesn’t have her boyfriend on her payroll Today 12:20 PM
- Writers want this book canceled for misgendering its protagonist Today 12:15 PM
- Trump Jr’s meme about his dad’s border wall doesn’t get how Congress works Today 11:44 AM
- FBI reportedly looking into Ryan Adams’ communications with underage girl Today 11:25 AM
- Trump does Chinese accent, declares national emergency, bewilders the internet Today 11:21 AM
- Chrissy Teigen throws shade at Logan Paul-Kaitlin Bennett pairing Today 10:48 AM
- Trump says ‘I didn’t need to do this’ while declaring national emergency Today 10:48 AM
- Women sue border patrol for detaining them for speaking Spanish Today 10:20 AM
- Tana Mongeau’s switch to Twitch has not gone well Today 9:58 AM
Data breach at online trading firm exposed customer credit reports, Social Security numbers
Photo via Chomon/Shutterstock.com (Licensed)
The leak consisted of about 70GB of data at a firm reportedly doing about $50 million in business.
A data breach at an online futures trading brokerage left exposed thousands of files, including credit reports, passport scans, and customer chat logs.
The leak, now secured, was identified and reported by Chris Vickery of the Kromtech Security Research Team. It was caused by a misconfigured backup device managed by a third-party IT vendor.
The trading firm was identified as AMP, a company that offers numerous platforms for online futures trading. According to the Online Brokers Hub, the company is based in Chicago, Illinois.
While the issue with the backup system is not uncommon, the breach is notable for the amount of money that passes through AMP’s systems. “The files indicate that AMP has over $50 million on the books and additionally include the private details of over 10,000 account applicants,” Kromtech reports.
Vickery reported that about 70GB of data had been sitting on the open web, consisting of roughly 97,000 files.
“It includes credit reports, passport scans, internal company emails, customer chat logs, and basically everything an identity thief would need in order to mount a serious campaign,” Vickery said. “I was surprised at the number of plaintext customer passwords discussed in the chat logs (by staff and customers alike).”
Security researchers who report such breaches are often met with suspicion and even hostility by the companies whose data is at risk. But AMP responded comparatively well, according to Vickery:
“The head honcho over at AMP was surprised when I fully explained the situation to him over a phone call. He rightly wondered what AMP was paying its third-party IT company for. If a third party, which specializes in IT, can’t catch this kind of leakage themselves, there is some serious improvement to be done.
“AMP’s CEO was relieved to hear that I wasn’t trying to sell him anything or attempting any sort of blackmail or extortion, and I’m thankful he understood that I merely discovered the unsecured data rather than causing it to become unsecured. That’s a distinction many people fail to grasp, especially when their company is potentially in the hot seat.”
Vickery’s disclosure comes days after reporting a massive data breach at a U.S.-based data warehouse, Schoolzilla, which held personal information on more than a million American students (K-12). The breach reportedly contained a vast amount of test scores and social security numbers. The issue was fixed within 24 hours of Vickery’s report.
Dell Cameron was a reporter at the Daily Dot who covered security and politics. In 2015, he revealed the existence of an American hacker on the U.S. government's terrorist watchlist. He is a co-author of the Sabu Files, an award-nominated investigation into the FBI's use of cyber-informants. He became a staff writer at Gizmodo in 2017.