Monday, January 6, 2025
HomeData Breach12,000 Social Media Famous Influencers Personal Data Leaked Online

12,000 Social Media Famous Influencers Personal Data Leaked Online

Published on

Another data leak due to misconfiguration in octoly owned Amazon Web Services S3 cloud storage bucket. Around 12,000 Social Media Influencers accounts that belongs to Instagram, Twitter, and YouTube personalities Sensitive personal data leaked online from octoly’s Amazon Web Services S3 bucket.

Octoly is an influencers marketplace where brands and creators collaborate to make branded video content and reviews.

Due to Misconfiguration in octoly owned Amazon Web Services S3 bucket repository, they left an Exposed backup of their enterprise IT operations and sensitive information.

- Advertisement - SIEM as a Service

Revealed information about 12,000 personalities most sensitive information which was registered by thousands of firm.

Exposed details contains influencers real names, addresses, phone numbers, email addresses which including those specified for use with PayPal – and birth dates for these creators.

Also Read Hacking Group Spies on and Steal Data from Android Users Posing Actress Nude Photos

Also, octoly revealed hashed passwords that can be decrypted and use it for password reuse attack against various online accounts belonging to creators.

How does this Data Leak Occured

On January 4th, 2018, octoly subdomain based Amazon Web Services S3 cloud storage bucket has been discovered by UpGuard Director of Cyber Risk Research Chris Vickery.

The discovered file belongs to octoly  internal files that related to critical operations including a backup of Octoly’s operational database, “octoly_production.sql.”

The database contains a detailed information that about inner workings of Octoly’s Europe and North America based digital brand marketing operations.

According to UpGuard  The exposed data reveals details about three categories of affected entities and individuals. The first, “users,” refers to Octoly employees.
The second, “clients,” is comprised of enterprises that employ Octoly as a partner, typically for the purpose of connecting these brands to the twelve thousand exposed members of the third category, “creators.”

Also, Beyond the potential damage to Octoly’s business reputation through the leak of privileged internal data, the exposure of information involving the firm’s enterprise customers illustrates how one breach can implicate many more entities.UpGuard said.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Malicious EditThisCookie Extension Attacking Chrome Users to Steal Data

The popular cookie management extension EditThisCookie has been the target of a malicious impersonation....

WordPress Plugin Vulnerability Exposes 3 Million Websites to Injection Attacks

A critical vulnerability has been identified in the popular UpdraftPlus: WP Backup & Migration...

iPhone Sharing the Photos by Default to Apple

A recent blog post by developer Jeff Johnson has brought to light a new...

Stealthy Steganography Backdoor Attacks Target Android Apps

BARWM, a novel backdoor attack approach for real-world deep learning (DL) models deployed on...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

US Treasury Department Breach, Hackers Accessed Workstations

The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury...

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a...

Indonesia Government Data Breach – Hackers Leaked 82 GB of Sensitive Data Online

Hackers have reportedly infiltrated and extracted a vast 82 GB of sensitive data from...