Last week, the company said [translated] an unknown threat actor posted claims on the Domain Factory forum which suggested they had managed to compromise the firm’s systems and access information.
Following this statement, Domain Factory pulled its forum and launched an investigation. The company found the claims to be true and says that customer data “was accessed by an outside party without authorization” on 28 January 2018.
Customer names, numbers, physical addresses, email addresses, phone numbers, and dates of birth were included in the breach, alongside account passwords, bank names, and account numbers, such as IBAN and BIC.
A “data feed” was compromised and while the “access route” has now been secured — in other words, the vulnerable system has been patched — the data breach was not discovered until 3 July.
According to Heise, the cyberattacker may have used a variant of the Dirty Cow vulnerability. The individual which claimed responsibility for the attack has alleged that the company owed him money, which was the motive for the cyberattack.
“We [will] take appropriate measures to prevent a recurrence of such a problem,” Domain Factory says.
TechRepublic: Typing ‘A’ key 29 times lets you hack HPE iLO 4 servers
Customers are being urged to change their passwords immediately.
However, Domain Factory is not only suggesting that customers change their account credentials, but also MySQL, SSH, FTP, and Live disk passwords as their websites, in theory, may also be compromised due to the data leak.
Domain Factory says that data protection authorities have been notified of the breach, and external experts have been brought in to investigate the issue.