Section | Details |
---|---|
Threat Actors | Hellcat Ransomware group (Individuals: DNA, Grep, Pryx, and Rey) |
Campaign Overview | Data breach of Telefonica’s internal Jira ticketing system by compromised employee credentials. 2.3 GB of data leaked online without extortion attempts. |
Target Regions (Victims) | Telefonica, a multinational telecommunications firm, operating in 12 countries. |
Methodology | Attackers used compromised employee credentials to access the internal Jira system, scrape 2.3 GB of data, and leak it online. |
Product Targeted | Telefonica’s internal Jira ticketing system |
Malware Reference | Hellcat Ransomware (also tied to Schneider Electric breach) |
Tools Used | Jira ticketing system, compromised employee credentials |
Vulnerabilities Exploited | Compromised employee credentials |
TTPs | • Using compromised credentials for unauthorized system access. • No extortion attempts, data leaked directly. • Attackers acted without contacting the victim. |
Attribution | Hellcat Ransomware (Individuals: DNA, Grep, Pryx, Rey) |
Recommendations | • Strengthen credential management practices. • Implement multi-factor authentication (MFA). • Monitor internal systems for unusual access patterns. |
Source | Hackread |
Read full article: https://hackread.com/hackers-breach-telefonica-network-leak-data-online/
The above summary has been generated by an AI language model
Leave a Reply