Sunday, November 24, 2024
HomeHacksVevo Got Hacked After Employee Questioned their Abilities

Vevo Got Hacked After Employee Questioned their Abilities

Published on

Hacking Group Ourmine who recently hijacked WikiLeaks DNS, now breached leading official online video provider Vevo. They have posted almost 3.12TB of Internal files online.

The leaked source consists of documents, videos, music charts, promotional materials and various other details about the artists.

Ourmine made the files publically available and upon their request now most of the files are deleted while writing we have checked the leaked source, all the download links redirecting Vevo page. This leak first reported by Gizmodo.

- Advertisement - SIEM as a Service

Why the Leak occurs?- Vevo

OurMine is well known for hacking social media accounts and website defacement, they took over Mark Zuckerberg’s (Twitter account), Adam Mosseri(Twitter account), BuzzFeed website defacement and much more in last three years.

Ourmine claims they posted videos on their site after communicating with Vevo employee and they said F**k of you don’t have anything which results in the leak.

Their spokesperson told Gizmodo can confirm that Vevo experienced a data breach as a result of a phishing scam via Linkedin. We have addressed the issue and are investigating the extent of exposure.

Also Read Hackers Steal the Credit Cards Information of Buckle, Inc by Injecting Malware in Their Payment Data Systems

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks

Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as...

240+ Domains Used By PhaaS Platform ONNX Seized by Microsoft

Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by...

Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor

The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in...

Earth Kasha Upgraded Their Arsenal With New Tactics To Attack Organizations

Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Telegram Bot Selling Phishing Tools to Bypass 2FA & Hack Microsoft 365 Accounts

A newly discovered phishing marketplace, ONNX Store, empowers cybercriminals to launch sophisticated attacks against...

Mobile Device Management Vendor Mobile Guardian Hacked

 Mobile Guardian, a leading Mobile Device Management (MDM) vendor, experienced unauthorized access to its...

Hunt3r Kill3rs Group claims they Infiltrated Schneider Electric Systems in Germany

The notorious cybercriminal group Hunt3r Kill3rs has claimed responsibility for infiltrating Schneider Electric's systems...