Data associated with a subset of registered customers of VirusTotal, including their names and email addresses, were exposed after an employee inadvertently uploaded the information to the malware scanning platform.
The security incident, which comprises a database of 5,600 names in a 313KB file, was disclosed. Google confirmed the leak and said, it took immediate steps to remove the data - "We are aware of the unintentional distribution of a small segment of customer group administrator emails and organization names by one of our employees on the VirusTotal platform and we removed the list from the platform within an hour of its posting.”
This breach included data from accounts linked to official U.S. bodies such as the Cyber Command, Department of Justice, Federal Bureau of Investigation (FBI), and the National Security Agency (NSA). Other accounts belong to government agencies in Germany, the Netherlands, Taiwan, and the U.K.
Dark Web Monitor ✅
External Network Vulnerability Scan ✅
Sensitive Data Identification ✅
Credential Leakage Detection ✅
Phishing Simulation & Training✅
Identity and Access Management ✅
External Surface Exposure ✅
And Much More ✅
If you are interested in a demo of how our services can help you manage this concern and many more, please email support@telivy.com and we will reach out to schedule some time with you!
Reference
The Hacker News. “VirusTotal Data Leak Exposes Some Registered Customers’ Details.” The Hacker News, thehackernews.com/2023/07/virustotal-data-leak-exposes-some.html.
Image by benzoix on Freepik