Breaking News



The ideas for roughly 7 million Robinhood shoppers stolen in a up to date knowledge breach are being bought on a well-liked hacking discussion board and market.

Ultimate week, Robinhood disclosed an information breach after one among its workers was once hacked, and the risk actor used their account to get right of entry to the guidelines for roughly 7 million consumers by means of buyer support strategies.

The ideas stolen in all places the assault incorporates the next non-public knowledge for Robinhood consumers:

  • Email correspondence addresses for five million shoppers.
  • Whole names for two million different shoppers.
  • Determine, date of provide, and zip code for 300 other people.
  • Further intensive account knowledge for ten other people.

In conjunction with stealing the information, Robinhood mentioned that the hacker tried to extort the corporate to prevent the information from being offered.

Stolen e-mail addresses, particularly the ones for monetary products and services and merchandise and products, are in particular trendy amongst risk actors as they can be utilized in focused phishing assaults to thieve additional delicate knowledge.

Stolen Robinhood knowledge bought on a hacking discussion board

Two days after Robinhood disclosed the assault, a risk actor named ‘pompompurin’ offered that they have got been promoting the information on a hacking discussion board.

In a discussion board publish, pompompurin discussed he was once promoting 7 million Robinhood shoppers’ stolen knowledge for at least 5 figures, which is $10,000 or upper.

Threat actor selling the stolen Robinhood data
Likelihood actor promoting the stolen Robinhood knowledge
Supply: BleepingComputer

The bought knowledge incorporates 5 million e-mail addresses, and for every other batch of Robinhood shoppers, 2 million e-mail addresses and their entire names. Alternatively, pompompurin discussed they weren’t promoting the information for 310 shoppers who had additional delicate knowledge stolen, along with id participating in taking part in playing cards for some consumers.

Robinhood didn’t to begin with disclose the robbery of ID participating in taking part in playing cards, and the risk actor states that they downloaded them from SendSafely, a secure document switch provider utilized by the buying and selling platform when acting Know Your Buyer (KYC) will have to haves.

“As we disclosed on November 8, we skilled an information coverage incident and a subset of roughly 10 shoppers had additional intensive non-public knowledge and account main points revealed,” Robinhood steered BleepingComputer when we contacted them in regards to the sale in their knowledge.

“Those additional intensive account main points integrated id pictures for plenty of those 10 other people. Like different monetary products and services and merchandise and products firms, we succeed in and retain id pictures for some shoppers as a part of our regulatory-required Know Your Buyer assessments.”

pompompurin steered BleepingComputer that he won get right of entry to to the Robinhood buyer support strategies after tricking a be in agreement table worker into putting in place a far flung get right of entry to tool on their pc.

As soon as far flung get right of entry to tool is put in on a tool, a risk actor can apply their actions, take screenshots, and remotely get right of entry to the pc. Moreover, whilst remotely controlling a tool, the attackers too can use the worker’s stored login credentials to log in to inner Robinhood strategies that that that they’d get right of entry to to.

“I was once in a position to look all account knowledge on other people. I noticed a couple of other people whilst the support agent did paintings,” pompompurin steered BleepingComputer.

In step with additional questions on the subject of how the worker’s tool was once breached, Robinhood referred us all over again to their authentic observation bringing up that the risk actor “socially engineered a buyer support worker by means of telephone.” Alternatively, they did check to BleepingComputer that malware was once not used throughout the assault

As evidence that they carried out the assault, pompompurin posted screenshots spotted by means of BleepingComputer of the attackers gaining access to inner Robinhood strategies.

Those screenshots integrated an inner be in agreement table tool used to seem up Robinhood member knowledge by means of e-mail handle, an inner wisdom base web internet web page a few “Endeavor Oliver Tornado” initiative designed to give protection to high-risk shoppers, and an “annotations” web internet web page appearing notes for a specific buyer.

Part of a screenshot showing internal member notes
A part of a screenshot appearing inner member notes

After learning of the information being bought, BleepingComputer contacted Robinhood and requested for affirmation as as to if those screenshots originated from their strategies.

Whilst they didn’t explicitly check the screenshots are in their strategies, they requested that any screenshots be redacted of personal knowledge, indicating they have been maximum unquestionably taken in all places the assault.

Identical risk actor answerable for fresh FBI hack

 This risk actor, pompompurin, was once additionally answerable for abusing FBI’s e-mail servers to ship threatening emails over the weekend,

This weekend, US entities started to obtain emails despatched from FBI infrastructure caution recipients that their “virtualized clusters ” had been being focused in a “delicate chain assault,” as showed throughout the e-mail underneath.

Fake FBI warning email sent this weekend
Pretend FBI caution e-mail despatched this weekend

To ship those emails, pompompurin discovered a computer virus throughout the FBI Law Enforcement Endeavor Portal (LEEP) portal that the actor may exploit to ship emails from IP addresses belonging to the FBI.

Given that emails got proper right here from IP addresses owned by means of the FBI, it added legitimacy to the emails, inflicting the federal government company to grow to be flooded with involved calls in regards to the pretend warnings.

After learning of the assault, the FBI took the equivalent server offline to unravel the problem.


Leave a Reply

Your email address will not be published. Required fields are marked *

Donate Us

X