{"id":96343,"date":"2024-05-10T16:03:35","date_gmt":"2024-05-10T16:03:35","guid":{"rendered":"https:\/\/entertainment.runfyers.com\/index.php\/2024\/05\/10\/threat-actor-says-he-scraped-49m-dell-customer-addresses-before-the-company-found-out-techcrunch\/"},"modified":"2024-05-10T16:03:35","modified_gmt":"2024-05-10T16:03:35","slug":"threat-actor-says-he-scraped-49m-dell-customer-addresses-before-the-company-found-out-techcrunch","status":"publish","type":"post","link":"https:\/\/entertainment.runfyers.com\/index.php\/2024\/05\/10\/threat-actor-says-he-scraped-49m-dell-customer-addresses-before-the-company-found-out-techcrunch\/","title":{"rendered":"Threat actor says he scraped 49M Dell customer addresses before the company found out | TechCrunch"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p id=\"speakable-summary\" class=\"wp-block-paragraph\">The person who claims to have 49 million Dell customer records told TechCrunch that he brute-forced an online company portal and scraped customer data, including physical addresses, directly from Dell\u2019s servers.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">TechCrunch verified that some of the scraped data matches the personal information of Dell customers.<\/p>\n<p class=\"wp-block-paragraph\">On Thursday, Dell sent an email to customers <a href=\"https:\/\/techcrunch.com\/2024\/05\/09\/dell-discloses-data-breach-of-customers-physical-addresses\/\" target=\"_blank\" rel=\"noopener\">saying the computer maker had experienced a data breach<\/a> that included customer names, physical addresses and Dell order information.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">\u201cWe believe there is not a significant risk to our customers given the type of information involved,\u201d Dell wrote in the email, in an attempt to downplay the impact of the breach, implying it does not consider customer addresses to be \u201chighly sensitive\u201d information.<\/p>\n<p class=\"wp-block-paragraph\">The threat actor said he registered with several different names on a particular Dell portal as a \u201cpartner.\u201d A partner, he said, refers to a company that resells Dell products or services. After Dell approved his partner accounts, Menelik said he brute-forced customer service tags, which are made of seven digits of only numbers and consonants. He also said that \u201cany kind of partner\u201d could access the portal he was granted access to.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">\u201c[I] sent more than 5,000 requests per minute to this page that contains sensitive information. Believe me or not, I kept doing this for nearly 3 weeks and Dell did notice anything. Nearly 50 Million requests\u2026After I thought I got enough data, I sent multiple emails to Dell and notified the vulnerability. It took them nearly a week to patch it all up,\u201d Menelik told TechCrunch.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Menelik, who shared screenshots of the several emails he sent in mid-April, also said that at some point he stopped scraping and did not obtain the complete database of customer data. A Dell spokesperson confirmed to TechCrunch that the company received the threat actor\u2019s emails.<\/p>\n<p class=\"wp-block-paragraph\">The threat actor listed the stolen database of Dell customers\u2019 data on a well known hacking forum. The forum listing <a href=\"https:\/\/dailydarkweb.net\/threat-actor-claims-sale-of-dell-database-containing-49-million-customer-records\/\" target=\"_blank\" rel=\"noopener\">was first reported by Daily Dark Web<\/a>.<\/p>\n<p class=\"wp-block-paragraph\">TechCrunch confirmed that the threat actor has legitimate Dell customer data by sharing a handful of names and service tags of customers \u2014 with their permission \u2014 who received the breach notification email from Dell. In one case, the threat actor found the personal information of a customer by searching the stolen records for his name. In another case, he was able to find the corresponding record of another victim by searching for the specific hardware service tag from an order she made.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">In other cases, Menelik could not find the information, and said that he doesn\u2019t know how Dell identified the impacted customers. \u201cJudging by checking the names you gave, it looks like they sent this mail to customers who are not affected,\u201d the threat actor said.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Dell has not said who the physical addresses belong to. TechCrunch\u2019s analysis of a sample of scraped data shows that the addresses appear to relate to the original purchaser of the Dell equipment, such as a business purchasing an item for a remote employee. In the case of consumers buying directly from Dell, TechCrunch found many of those physical addresses also correlate to the consumer\u2019s home address or other location where they had the item delivered.<\/p>\n<p class=\"wp-block-paragraph\">Dell did not dispute our findings when reached for comment.<\/p>\n<p class=\"wp-block-paragraph\">When TechCrunch sent a series of specific questions to Dell based on what the threat actor said, an unnamed company spokesperson said that \u201cprior to receiving the threat actor\u2019s email, Dell was already aware of and investigating the incident, implementing our response procedures and taking containment steps.\u201d Dell did not provide evidence for this claim.<\/p>\n<p class=\"wp-block-paragraph\">\u201cLet\u2019s keep in mind, this threat actor is a criminal and we have notified law enforcement. We are not disclosing any information that could compromise the integrity of our ongoing investigation or any investigations by law enforcement,\u201d wrote the spokesperson.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/techcrunch.com\/2024\/05\/10\/threat-actor-scraped-49m-dell-customer-addresses-before-the-company-found-out\/\" target=\"_blank\" rel=\"noopener\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The person who claims to have 49 million Dell customer records told TechCrunch that he brute-forced an online company portal and scraped customer data, including physical addresses, directly from Dell\u2019s servers.\u00a0 TechCrunch verified that some of the scraped data matches the personal information of Dell customers. On Thursday, Dell sent an email to customers saying [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":96344,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":{"0":"post-96343","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tech"},"_links":{"self":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/96343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/comments?post=96343"}],"version-history":[{"count":0,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/96343\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media\/96344"}],"wp:attachment":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media?parent=96343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/categories?post=96343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/tags?post=96343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}