Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Hello Kitty hack exposes 3.3 million users' details, says infosec bod


  • Please log in to reply
No replies to this topic

#1 JohnC_21

JohnC_21

  • Members
  • 23,673 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:04:17 AM

Posted 21 December 2015 - 03:03 PM

From The Register:

 

Up to 3.3 million Hello Kitty users have had their personal data exposed due to a database breach at the brand's online community SanrioTown.com, a security researcher has discovered.

The sanriotown.com breach had been discovered online by researcher Chris Vickery who informed security blog Salted Hash.

The exposed records include users' names, birthdates, gender, nationality, email addresses, unsalted SHA-1 password hashes, and password hint questions.

"While having sensitive details exposed is bad enough for adults, when the information relates to a child it's far worse.

"If someone managed to compromise a child's identity, the fraud might not be detected for years because most parents don't monitor their child's credit record," noted Salted Hash writer Steve Ragan.

In addition to the primary Sanriotown database, two additional backup servers containing mirrored data were also compromised, it said.

The earliest known date of publication for the private information was 22 November this year

 

 

Article



BC AdBot (Login to Remove)

 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users