Wednesday, May 14, 2025
HomeData BreachLargest data Breach - 130,000 Finnish Username and Password's Stolen by Hackers

Largest data Breach – 130,000 Finnish Username and Password’s Stolen by Hackers

Published on

SIEM as a Service

Follow Us on Google News

More than 130,000 user’s Plain text password has been exposed with the Largest data breach that affected by the Helsinki New Business Center. The breach occurs on an open website(liiketoimintasuunnitelma[.]com) that shares the business ideas.

The username and passwords are not encrypted, so attackers can use the credentials any time. The website was taken down after the data breach was identified on 3rd April.

“It is currently not known that the disclosed information would be freely accessible to anybody on the Internet. However, it is likely that the disclosed information has spread to cybercriminals” reads FICORA statement.

FICORA asks users to change the passwords if they used the same password for Business Plan or with other information system or network service.

- Advertisement - Google News

The website has been taken down now after the Largest data breach with the note “Data from the New Business Center in Helsinki leaked in connection with a large-scale data hacking”.

Largest data breach

We are very sorry for all the people who have been subjected to crime and who may be affected by mental or financial disadvantages. Unfortunately, we are not yet able to know exactly how many people are and what information this information breaks. We have filed an offense report, and the parties do not need to report to the police separately, “says Jarmo Hyökyvaara, Chairman of the Board of the New Business Center of Helsinki.

The maintenance and security of our service was the responsibility of our subcontractor, our long-term partner. Unfortunately, the security of the service has not been enough to prevent this kind of attack. This is, in part, our mistake, and as a subscriber and owner of the service we are responsible for this, “said Hyökyvaara.

When it comes to cybersecurity then no any business would be able to ignore it! In fact, if we consider the reports of Verizon Data Breach Investigation then we would be able to see that 60% of the cyber attacks target SMBs, mostly because they are comparatively somewhat easy targets.

The FBI has estimated that ransomware infects more than 4,000 U.S. businesses every day.Attackers are more successful when effective countermeasures are not in place.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Windows Ancillary for WinSock 0-Day Vulnerability Actively Exploited to Gain Admin Access

Microsoft has confirmed active exploitation of a critical privilege escalation vulnerability in the Windows...

Earth Ammit Hackers Deploy New Tools to Target Military Drones

The threat actor group known as Earth Ammit, believed to be associated with Chinese-speaking...

New Microsoft Scripting Engine Vulnerability Exposes Systems to Remote Code Attacks

Critical zero-day vulnerability in Microsoft’s Scripting Engine (CVE-2025-30397) has been confirmed to enable remote...

Critical Microsoft Office Vulnerabilities Enable Malicious Code Execution

Microsoft has addressed three critical security flaws in its Office suite, including two vulnerabilities...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Marks & Spencer Confirms Customer Data Breach in Recent Cyber Attack

British retail giant Marks & Spencer has officially confirmed that customer personal data was...

Repeated Firmware Key-Management Failures Undermine Intel Boot Guard and UEFI Secure Boot

The security of fundamental technologies like Intel Boot Guard and UEFI Secure Boot has...

Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection

Cybersecurity researchers at Cofense Intelligence have identified a sophisticated phishing tactic leveraging Blob URIs...