Thursday, June 20, 2024

Media Gaint News Corp Says Hackers Had Access to Network for Two Years

On January 20, 2022, News Corp identified cyberattacks on a business email and document storage system utilized by numerous News Corp businesses.

According to the inquiry, News Corp has learned that, between February 2020 and January 2022, a third party illegally acquired access to some business documents and emails from a small number of its employees’ accounts in the compromised system. Some of these emails contained personal data.

“Our investigation indicates that this activity does not appear to be focused on exploiting personal information”, News Corp reports.

Research suggests that this activity doesn’t seem to be focused on utilizing personal data. The Wall Street Journal, the New York Post, and the publishing company’s news activities in the UK were all impacted by the incident.

“We are not aware of reports of identity theft or fraud in connection with this issue. We nonetheless are providing you notice of this issue because the investigation has determined that some of your personal information was contained in the relevant materials”, News Corp.

What Details Were Involved?

Your name, date of birth, Social Security number, license number, passport number, financial account information, medical information, and health insurance information might have been among the personal data that was compromised.

“As soon as we became aware of the activity, we notified U.S. law enforcement and launched an investigation with the assistance of a leading cybersecurity firm”, says the company.

“We have no evidence of ongoing unauthorized access to our systems. We take our obligation to safeguard personal information very seriously and are alerting you about this issue so you can take steps to help protect yourself”.

For a period of 24 months, the company provides free identity protection and credit monitoring services through Experian. So it advises you to sign up for the free credit monitoring service.

The New York Post, The Wall Street Journal, Dow Jones, MarketWatch, Fox News, Barron’s, The Sun, and the News UK British daily publisher are just a few of the properties owned by News Corp.

Also, the media giant said that the attackers are connected to a “foreign government” and that they exfiltrated some data while they had access to its systems when it initially revealed this security incident last year.

Network Security Checklist – Download Free E-Book

Website

Latest articles

1inch partners with Blockaid to enhance Web3 security through the 1inch Shield

1inch, a leading DeFi aggregator that provides advanced security solutions to users across the...

Hackers Exploit Progressive Web Apps to Steal Passwords

In a concerning development for cybersecurity, hackers are increasingly leveraging Progressive Web Apps (PWAs)...

INE Security: Optimizing Teams for AI and Cybersecurity

2024 is rapidly shaping up to be a defining year in generative AI. While...

Threat Actor Claims Breach of Jollibee Fast-Food Gaint

A threat actor has claimed responsibility for breaching the systems of Jollibee Foods Corporation,...

Threat Actors Claiming Breach of Accenture Employee Data

Threat actors have claimed responsibility for a significant data breach involving Accenture, one of...

Diamorphine Rootkit Exploiting Linux Systems In The Wild

Threat actors exploit Linux systems because they are prevalent in organizations that host servers,...

Amtrak Data Breach: Hackers Accessed User’s Email Address

Amtrak notified its customers regarding a significant security breach involving its Amtrak Guest Rewards...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles