As part of a regular Deepweb and Darkweb monitoring activity, researchers at threat intelligence firm Cyble identified a credible threat actor who was selling the database of COVID-19 patients of Indonesia.
The threat actor is offering around 230,000+ patients’ records in one of the dark web markets.
The leaked dump includes name, address, present address, telephone number, citizenship, diagnosis date, result, result date, and many more.
Cyble has analyzed the data and confirmed its authenticity, it also indexed the record in its data breach monitoring and notification service AmiBreached.com.
“Cyble has acquired, validated and, indexed the leak on their data breach monitoring and notification platform, AmiBreached.com – people who’re concerned about their information exposure can register on the platform to ascertain the risks.” reads the post published by Cyble.
The company recommends people to:
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, Indonesian COVID-19 patients)
[adrotate banner=”5″]
[adrotate banner=”13″]
Two vulnerabilities in SinoTrack GPS devices can allow remote vehicle control and location tracking by…
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Wazuh, and WebDAV flaws to its Known…
Over 40,000 internet-exposed security cameras worldwide are vulnerable to remote hacking, posing serious privacy and…
INTERPOL announced that a joint operation code-named Operation Secure took down 20,000+ malicious IPs/domains tied…
A critical remote code execution (RCE) vulnerability in Roundcube was exploited days after patch, impacting…
A vulnerability could allow recovery of the phone number associated with a Google account by…
This website uses cookies.