Hacker steals Bitdefender customer log-in credentials, attempts blackmail

The hacker exploited a vulnerability in an outdated software component to extract information from a single server

Digital key

Digital key

A hacker extracted customer log-in credentials from a server owned by Bitdefender that hosted the cloud-based management dashboards for its small and medium-size business clients.

The antivirus firm confirmed the security breach, but said in an emailed statement that the attack affected less than 1 percent of its SMB customers, whose passwords have since been reset. Consumer and enterprise customers were not affected, the company said.

The hacker, who uses the online alias DetoxRansome, first bragged about the breach on Twitter Saturday and later messaged Bitdefender threatening to release the company's "customer base" unless he was paid US$15,000.

To prove his point, the next day he published the email addresses and passwords for two Bitdefender customer accounts and one for an account operated by the company itself.

Travis Doering and Dan McPeake claimed in a blog post that they contacted the hacker, who offered to sell the data to them.

The hacker provided a list of user names and matching passwords for over 250 Bitdefender accounts, some of which were confirmed to be active, the two wrote Wednesday.

Doering and McPeake said that they shared the information with Bitdefender

According to them, when they asked DetoxRansome how he obtained the log-in credentials, he replied that he was "sniffing" one of Bitdefender's "major servers."

Bitdefender confirmed that the attack did not exploit a zero-day vulnerability -- a vulnerability that is previously unknown.

The issue was the result of human error: During an infrastructure increase, a single server was deployed with an outdated software package that had a known flaw, enabling the extraction of information, but not a full system compromise, said Catalin Cosoi, chief security strategist at Bitdefender.

He declined to name the vulnerable package.

The issue was resolved and additional security measures have been put in place to prevent its reoccurrence, the company said in its statement. "Our investigation revealed no other server or services were impacted."

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags intrusionbitdefender

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.
Lucian Constantin

Lucian Constantin

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Cate Bacon

Aruba Instant On AP11D

The strength of the Aruba Instant On AP11D is that the design and feature set support the modern, flexible, and mobile way of working.

Dr Prabigya Shiwakoti

Aruba Instant On AP11D

Aruba backs the AP11D up with a two-year warranty and 24/7 phone support.

Tom Pope

Dynabook Portégé X30L-G

Ultimately this laptop has achieved everything I would hope for in a laptop for work, while fitting that into a form factor and weight that is remarkable.

Tom Sellers

MSI P65

This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang

MSI GT76

It really doesn’t get more “gaming laptop” than this.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?