Imperva Hacked – Email addresses, API keys & SSL certificates of WAF Customers Exposed

Imperva, one of the leading cyber-security firm disclosed a data breach that impacts the customers’ data of Cloud Web Application Firewall (WAF).

According to the blog post published by Imperva CEO Chris Hylen, “elements of our Incapsula customer database through September 15, 2017, were exposed”.

The company learned the data exposure on August 20, 2019, an exposure limited only to the customers who have Cloud WAF product through September 15, 2017.

What are the Data Exposed?

The company has not provided any details about how the breach happened and they are currently investigating the incident.

Exposed data includes email addresses, hashed and salted passwords, API keys and customer-provided SSL certificates of customers who registered before September 15, 2017.

“We activated our internal data security response team and protocol, and continue to investigate with the full capacity of our resources how this exposure occurred. “

“We are informing all impacted customers directly and sharing the steps we are taking to safeguard their accounts and data, and additional actions they can take themselves.”

Recommended Security Measures

  • Change user account passwords for Cloud WAF
  • Implement Single Sign-On (SSO)
  • Enable two-factor authentication
  • Generate and upload new SSL certificate
  • Reset API keys

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and Hacking New updates.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

MITRE ATT&CK Evaluation Results 2024 – Cynet Became a Leader With 100% Detection & Protection

Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders…

2 hours ago

Antidot Malware Attacking Employees Android Devices To Inject Malicious Payloads

Researchers discovered a new variant of the AntiDot banking trojan targeting Android mobile devices through…

6 hours ago

Triad Nexus, Chinese Hackers Using 200,000 Domains For Widespread Cyber Attack

Researchers identified FUNNULL, a Chinese CDN, as hosting malicious content, which includes fake trading apps…

6 hours ago

Malicious ESLint Package Let Attackers Steal Data And Inject Remote Code

Cybercriminals exploited typosquatting to deploy a malicious npm package, `@typescript_eslinter/eslint`, targeting developers seeking the legitimate…

6 hours ago

New Chinese Surveillance Tool Attack Android Users Since 2017

Wuhan Chinasoft Token Information Technology Co., Ltd. developed EagleMsgSpy, a surveillance tool operational since 2017,…

6 hours ago

ConvoC2 – A Red Teamers Tool To Execute Commands on Hacked Hosts Via Microsoft Teams

A stealthy Command-and-Control (C2) infrastructure Red Team tool named ConvoC2 showcases how cyber attackers can…

8 hours ago