Wednesday, November 20, 2024
HomeCyber Security NewsFair Vote Canada Data Leak: 34k Email Addresses Leaked

Fair Vote Canada Data Leak: 34k Email Addresses Leaked

Published on

Fair Vote Canada has disclosed a data leak affecting approximately 34,000 email addresses.

While the organization assures that no financial information was compromised, the incident has raised concerns about data security practices.

Fair Vote Canada revealed that the breach involved data from 2020, which inadvertently became publicly accessible via an external website.

- Advertisement - SIEM as a Service

The exposed information included names, phone numbers, addresses, email addresses, and details about donations, such as dates and amounts for some individuals.

Join ANY.RUN's FREE webinar on How to Improve Threat Investigations on Oct 23 - Register Here 

Significantly, no credit card or banking information was leaked.  The organization traced the source of the leak to a well-meaning volunteer who had been granted temporary access to the data for a specific task.

Unknown to Fair Vote Canada, this volunteer moved the data to a website where insufficient security measures led to accidental exposure.

Details of the Data Leak

Upon discovering the leak, Fair Vote Canada swiftly removed and deleted the data from the unauthorized location.

Valerie Brooks and Steve Hindle, Co-Chairs of Fair Vote Canada, emphasized their commitment to data security in a statement: “We understand that this data exposure, even without malicious intent or evidence of misuse, is troubling and unacceptable.”

Fair Vote Canada has implemented immediate measures to restrict database access exclusively to staff and contractors in response to the incident.

The organization is also adopting stricter digital security procedures to prevent future occurrences.

Fair Vote Canada has regretted the incident and is taking proactive steps to reassure its supporters.

The organization is urging anyone with questions or concerns to reach out via their official email.

How to Choose an ultimate Managed SIEM solution for Your Security Team -> Download Free Guide (PDF)

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

ANY.RUN Sandbox Automates Interactive Analysis of Complex Cyber Attack Chains

ANY.RUN, a well-known interactive malware analysis platform, has announced Smart Content Analysis, an enhancement...

Rekoobe Backdoor In Open Directories Possibly Attacking TradingView Users

APT31, using the Rekoobe backdoor, has been observed targeting TradingView, a popular financial platform,...

Water Barghest Botnet Comprised 20,000+ IoT Devices By Exploiting Vulnerabilities

Water Barghest, a sophisticated botnet, exploits vulnerabilities in IoT devices to enlist them in...

North Korean IT Worker Using Weaponized Video Conference Apps To Attack Job Seakers

North Korean IT workers, operating under the cluster CL-STA-0237, have been implicated in recent...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Hackers Hijacked Misconfigured Servers For Live Streaming Sports

Recent threat hunting activities focused on analyzing outbound network traffic and binaries within containerized...

Volt Typhoon Attacking U.S. Critical Infra To Maintain Persistent Access

Volt Typhoon, a Chinese state-sponsored threat actor, targets critical infrastructure sectors like communications, energy,...

Microsoft Ignite New 360-Degree Details Attackers Tools & Methods

A significant leap forward in cybersecurity was announced with the introduction of new threat...