Carbon Black an Endpoint detection and response (EDR) solutions Provider Accused of Fortune 1000 Companies sensitive data leaked and data contain more than Terabytes that including usernames, passwords, and network intelligence information, endpoint service cloud keys etc.
Carbon Black product is one of the most Popular anti-malwa endpoint service provider and CB Product used by Fortune 1000 Companies.
According to Direct defense Investigation, Leaked Data contains various Executable formats and it could recover the more sensitive data from several Carbon Black’s Fortune 1000 Companies.
Also Read : 6 Million Verizon Customers Data Revealed online Due to Misconfigured File Repository
An APK Key that Tied with Carbon Black next-gen anti-malware EDR Product is Playing Major role in this Massive Data Leak.
Direct defense said, this is the primary key(APK Key) for uploading files by Carbon Black for Cb Response. By searching for similar uploads from this key, we found hundreds of thousands of files comprising terabytes of data. We started downloading some of these and digging a little deeper.
A serious Leak find in Several Pieces of compiled java bytecode associated with Large Streaming Media company.
Slack API information found in content uploaded from Cb Response
Following Leaked Data by CB Product from Media Company.
After Further Analyse again files being uploaded via Carbon Black’s key and identified files belongs to large social media company . Files including Python Scripts that contains ,
Third Analyse OF Direct defense Revealed that, another customer’s data in the stream of files Carbon Black’s key is uploading. These files included:
AWS and database information found in java code uploaded by Cb Response
According to Carbon Black,“The company expects that by the end of 2015 it will achieve 7 million+ software licenses sold, almost 2,000 customers worldwide.”
Image Source: Direct defense
Some router models have identified a security vulnerability that allows attackers to bypass authentication. To exploit this vulnerability, an attacker…
Hackers often target CrushFTP servers as they contain sensitive data and are used for file sharing and storage. This makes…
DDoS attacks are a significant and growing risk that can overpower websites, crash servers, and block out authorized users with…
Hackers have leveraged an old Microsoft Office vulnerability, CVE-2017-8570, to deploy the notorious Cobalt Strike Beacon, targeting systems in Ukraine.…
In a historic move, Microsoft has made the source code for MS-DOS 4.0, one of the most influential operating systems…
A new attack campaign has been discovered to be employed by the FROZEN#SHADOW, which utilized SSLoad malware for its operations…