Thursday, February 13, 2025
HomeCyber Security NewsKnuddels Chat App Fined €20k under GDPR Regulation For Storing Passwords in...

Knuddels Chat App Fined €20k under GDPR Regulation For Storing Passwords in Plain Text

Published on

SIEM as a Service

Follow Us on Google News

Knuddels chat app must pay the fine amount of 20,000 euros for violating its duty to ensure the security of the customer’s personal data.

In last July the company was attacked by hackers and they stole about 808,000 mail addresses and more than 1.8 million aliases and passwords. It is even worse if you use the same credentials on other websites. On the exposed 808,000 mailboxes the company verified only 320,000 mailboxes only

Knuddels published a breach notification and asked users to change their login credentials and notified incident to Baden-Württemberg data protection authority.

An unknown individual exposed user data of more than 8,000 members on Pastebin and more data on Mega cloud storage.

Baden-Wuerttemberg data protection commissioner Stefan Brink said the company should work with Cybersecurity agency and should improve the IT security reported Spiegel.

“Those who learn from harm and act transparently to improve data protection can emerge stronger as a company from a hacker attack.”

Holger Kujath, the managing director of Knuddels GmbH & Co. KG said the hack attack was a real test of stress for Knuddels, we immediately notified users and made improvement in IT security.

The General Data Protection Regulation (GDPR) applied on 25 May 2018, this new law applies to all companies that collect and process data belonging to the European Union (EU) citizens.

The company fined about four percent of the annual turnover achieved worldwide which is € 20 reported Spiegel.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can check the Complete GDPR Course Bundle Course to keep your self-updated.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Palo Alto PAN-OS Zero-Day Flaw Allows Attackers to Bypass Web Interface Authentication

Palo Alto Networks has disclosed a zero-day vulnerability in its PAN-OS software (CVE-2025-0108), allowing...

Enhancing Threat Detection With Improved Metadata & MITRE ATT&CK tags

The cybersecurity landscape continues to evolve rapidly, demanding more sophisticated tools and methodologies to...

Hackers Exploit Ivanti Connect Secure Vulnerability to Inject SPAWNCHIMERA malware

In a concerning development, cybersecurity experts have identified active exploitation of a critical vulnerability...

ZeroLogon Ransomware Exploits Windows AD to Hijack Domain Controller Access

A newly intensified wave of ransomware attacks has surfaced, leveraging the infamous ZeroLogon vulnerability...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Palo Alto PAN-OS Zero-Day Flaw Allows Attackers to Bypass Web Interface Authentication

Palo Alto Networks has disclosed a zero-day vulnerability in its PAN-OS software (CVE-2025-0108), allowing...

Enhancing Threat Detection With Improved Metadata & MITRE ATT&CK tags

The cybersecurity landscape continues to evolve rapidly, demanding more sophisticated tools and methodologies to...

Hackers Exploit Ivanti Connect Secure Vulnerability to Inject SPAWNCHIMERA malware

In a concerning development, cybersecurity experts have identified active exploitation of a critical vulnerability...