Wednesday, April 23, 2025
HomeData BreachLargest data Breach - 130,000 Finnish Username and Password's Stolen by Hackers

Largest data Breach – 130,000 Finnish Username and Password’s Stolen by Hackers

Published on

SIEM as a Service

Follow Us on Google News

More than 130,000 user’s Plain text password has been exposed with the Largest data breach that affected by the Helsinki New Business Center. The breach occurs on an open website(liiketoimintasuunnitelma[.]com) that shares the business ideas.

The username and passwords are not encrypted, so attackers can use the credentials any time. The website was taken down after the data breach was identified on 3rd April.

“It is currently not known that the disclosed information would be freely accessible to anybody on the Internet. However, it is likely that the disclosed information has spread to cybercriminals” reads FICORA statement.

FICORA asks users to change the passwords if they used the same password for Business Plan or with other information system or network service.

- Advertisement - Google News

The website has been taken down now after the Largest data breach with the note “Data from the New Business Center in Helsinki leaked in connection with a large-scale data hacking”.

Largest data breach

We are very sorry for all the people who have been subjected to crime and who may be affected by mental or financial disadvantages. Unfortunately, we are not yet able to know exactly how many people are and what information this information breaks. We have filed an offense report, and the parties do not need to report to the police separately, “says Jarmo Hyökyvaara, Chairman of the Board of the New Business Center of Helsinki.

The maintenance and security of our service was the responsibility of our subcontractor, our long-term partner. Unfortunately, the security of the service has not been enough to prevent this kind of attack. This is, in part, our mistake, and as a subscriber and owner of the service we are responsible for this, “said Hyökyvaara.

When it comes to cybersecurity then no any business would be able to ignore it! In fact, if we consider the reports of Verizon Data Breach Investigation then we would be able to see that 60% of the cyber attacks target SMBs, mostly because they are comparatively somewhat easy targets.

The FBI has estimated that ransomware infects more than 4,000 U.S. businesses every day.Attackers are more successful when effective countermeasures are not in place.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Weaponize Google Forms to Bypass Email Security and Steal Login Credentials

Threat actors are increasingly leveraging Google Forms, the tech giant’s widely-used form and quiz-building...

Lattica Emerges from Stealth to Solve AI’s Biggest Privacy Challenge with FHE

Lattica, an FHE-based platform enabling secure and private use of AI in the cloud,...

FireEye EDR Vulnerability Allows Attackers to Execute Unauthorized Code

A critical vulnerability (CVE-2025-0618) in FireEye’s Endpoint Detection and Response (EDR) agent has been...

New Malware Hijacks Docker Images Using Unique Obfuscation Technique

A recently uncovered malware campaign targeting Docker, one of the most frequently attacked services...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

FBI Alerts Public to Scammers Posing as IC3 Officials in Fraud Scheme

The Federal Bureau of Investigation (FBI) has issued a warning regarding an emerging scam...

Hackers Exploit Stolen Certificates and Private Keys to Breach Organizations

Recent research has unveiled a concerning vulnerability within the realm of containerized applications, where...

Gain Legends International Suffers Security Breach – Customers Data Stolen

Gain Legends International, a prominent name in sports, entertainment, and venue management, has confirmed...