Friday, April 18, 2025
HomeData BreachAdobe Most Secured Private PGP Key Leaked Online

Adobe Most Secured Private PGP Key Leaked Online

Published on

SIEM as a Service

Follow Us on Google News

Adobe suffered a lot on Friday when its Private PGP keys were inadvertently published on its Product Incident Security Response Team(Blog).

A pair of Public and Private keys were published together, Keys could either decrypt messages sent to Adobe Product Incident Security Response Team(PSIRT).

Researcher Juho Nurminen who works for Finnish security company 2NS (Second Nature Security) as a pen-tester said risk posed by this leak could be stealing private messages or Phishing attack is possible.

- Advertisement - Google News

Also Read Verizon Wireless Confidential Data Leaked Accidentally by Its Employee

The private key encrypted using a passphrase.Without knowing the passphrase, private Key is worthless.If the passphrase is weak, it can be brute-forced said researcher Juho Nurminen.

Since Adobe PSIRT don’t have direct contact with customers, therefore phishing on a wide scale is not a concern.

If Successfully decrypt the private key is not worth.Nurminen said “Decryption only comes into play if you’re able to intercept some encrypted messages first, which would be fairly difficult in general, and in this case, very unlikely to have ever happened.

If Successfully decrypt the private key is not worth.Nurminen said “Decryption only comes into play if you’re able to intercept some encrypted messages first, which would be fairly difficult in general, and in this case, very unlikely to have ever happened.

Nurminen said “Decryption only comes into play if you’re able to intercept some encrypted messages first, which would be fairly difficult in general, and in this case, very unlikely to have ever happened.

Threatpost said, A Report sent to Adobe on Saturday for comment but not returned in time for publication.Hours later Nurminen’s private disclosure, Then after Adobe took down the post and generated a new private Key.

Once the key had been taken down, Nurminen tweeted screenshots showing the public and private key as well as a third screenshot showing that the key had been created Sept. 18, four days before the researcher stumbled upon it.

Adobe key Leaked
Adobe key Leaked
Adobe key Leaked

Asymmetric cryptography uses a public-private key pair to decrypt messages. Public keys are generally generated by the owner in order to simplify secure communication between two endpoints. Only Adobe knows how the private key was published in a public forum.

Actual consequences in terms of data loss etc. are likely zero,” Nurminen said he found an issue in an Adobe product during a software audit he conducted for his client.“The PSIRT email address was listed on the Adobe website as it should be, along with a link to the blog page containing the PGP keys,” Nurminen said. “The page was obviously supposed to contain only the public key, but instead it contained both the public and the private key.”

Nurminen sent a Twitter direct message to Adobe, Adobe responded that the issue would be forwarded to the appropriate security Team.After some time Nurminen reported the issue to Adobe PSIRT through its HackerOne program.

Finally, Nurminen said. “They closed the [HackerOne] ticket as fixed. I only tweeted out the screenshots once I knew the key was no longer in use. I haven’t heard anything more from Adobe after they closed the [HackerOne] ticket.”

Latest articles

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...

Microsoft Vulnerabilities Reach Record High with Over 1,300 Reported in 2024

The 12th Edition of the Microsoft Vulnerabilities Report has revealed a significant surge in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

43% of Top 100 Enterprise Mobile Apps Expose Sensitive Data to Hackers

A comprehensive study by zLabs, the research team at Zimperium, has found that over...

Harvest Ransomware Attack: Stolen Data Now Publicly Disclosed

French fintech leader Harvest SAS has become the latest high-profile victim of a sophisticated ransomware attack,...

Hacker Leaks 33,000 Employee Records in Third-Party API Breach

A hacker has exposed the personal records of over 33,000 employees after discovering unrestricted...