Monday, May 19, 2025
HomeData BreachLargest data Breach - 130,000 Finnish Username and Password's Stolen by Hackers

Largest data Breach – 130,000 Finnish Username and Password’s Stolen by Hackers

Published on

SIEM as a Service

Follow Us on Google News

More than 130,000 user’s Plain text password has been exposed with the Largest data breach that affected by the Helsinki New Business Center. The breach occurs on an open website(liiketoimintasuunnitelma[.]com) that shares the business ideas.

The username and passwords are not encrypted, so attackers can use the credentials any time. The website was taken down after the data breach was identified on 3rd April.

“It is currently not known that the disclosed information would be freely accessible to anybody on the Internet. However, it is likely that the disclosed information has spread to cybercriminals” reads FICORA statement.

FICORA asks users to change the passwords if they used the same password for Business Plan or with other information system or network service.

- Advertisement - Google News

The website has been taken down now after the Largest data breach with the note “Data from the New Business Center in Helsinki leaked in connection with a large-scale data hacking”.

Largest data breach

We are very sorry for all the people who have been subjected to crime and who may be affected by mental or financial disadvantages. Unfortunately, we are not yet able to know exactly how many people are and what information this information breaks. We have filed an offense report, and the parties do not need to report to the police separately, “says Jarmo Hyökyvaara, Chairman of the Board of the New Business Center of Helsinki.

The maintenance and security of our service was the responsibility of our subcontractor, our long-term partner. Unfortunately, the security of the service has not been enough to prevent this kind of attack. This is, in part, our mistake, and as a subscriber and owner of the service we are responsible for this, “said Hyökyvaara.

When it comes to cybersecurity then no any business would be able to ignore it! In fact, if we consider the reports of Verizon Data Breach Investigation then we would be able to see that 60% of the cyber attacks target SMBs, mostly because they are comparatively somewhat easy targets.

The FBI has estimated that ransomware infects more than 4,000 U.S. businesses every day.Attackers are more successful when effective countermeasures are not in place.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

GNU C(glibc) Vulnerability Let Attackers Execute Arbitrary Code on Millions of Linux Systems

Security researchers have disclosed a significant vulnerability in the GNU C Library (glibc), potentially...

Exploiting dMSA for Advanced Active Directory Persistence

Security researchers have identified new methods for achieving persistence in Active Directory environments by...

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Printer Company Distributes Malicious Drivers Infected with XRed Malware

Procolored, a printer manufacturing company, has been found distributing software drivers infected with malicious...

Nucor Steel Manufacturer Halts Production After Cyberattack

Nucor Corporation, one of North America’s largest steel producers, has temporarily halted production at...

Customer Data Compromised in Dior Cyber Attack

Luxury fashion house Dior experienced a significant security incident when unauthorized external actors breached...