LexisNexis: LexisNexis confirms data breach, says hackers hit customer and business info

LexisNexis: LexisNexis confirms data breach, says hackers hit customer and business info

LexisNexis Data Breach: Hackers Claim Far Greater Access Than Company Admits

Cybersecurity researchers have uncovered a data breach at LexisNexis, the U.S.-based analytics firm, with hackers alleging far more extensive access than the company has acknowledged. The threat actor group FulcrumSec leaked 2GB of stolen files on underground forums, claiming to have exploited an unpatched React frontend application using the open-source post-exploitation tool React2Shell.

According to the hackers, the breach exposed hundreds of Redshift and VPC database tables, plaintext AWS Secrets Manager credentials, employee password hashes, and millions of records. Among the compromised data were details of over 100 government users, including federal judges, U.S. Department of Justice attorneys, and SEC staff, as well as approximately 400,000 cloud user profiles containing names, email addresses, phone numbers, and job functions.

LexisNexis confirmed the incident but downplayed its severity, stating that the stolen data was "legacy" and "deprecated," dating back to before 2020. The company asserted that the breach did not involve Social Security numbers, financial details, active passwords, or sensitive legal or contractual information. A spokesperson noted that the exposed data included only outdated customer names, user IDs, business contact details, and support ticket records.

FulcrumSec claimed it attempted to negotiate with LexisNexis likely for a ransom but the company declined to engage. LexisNexis has since stated that the attack has been contained. The discrepancy between the hackers' claims and the company’s response raises questions about the true scope of the breach and its potential impact on affected users.

Source: https://www.techradar.com/pro/security/lexisnexis-confirms-data-breach-says-hackers-hit-customer-and-business-info

LexisNexis cybersecurity rating report: https://www.rankiteo.com/company/lexisnexis

"id": "LEX1772641919",
"linkid": "lexisnexis",
"type": "Breach",
"date": "1/2020",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'customers_affected': 'Over 100 government users '
                                              '(federal judges, U.S. '
                                              'Department of Justice '
                                              'attorneys, SEC staff) and '
                                              'approximately 400,000 cloud '
                                              'user profiles',
                        'industry': 'Legal and Business Analytics',
                        'location': 'U.S.',
                        'name': 'LexisNexis',
                        'type': 'Analytics Firm'}],
 'attack_vector': 'Exploitation of unpatched React frontend application '
                  '(React2Shell)',
 'data_breach': {'data_exfiltration': '2GB of files leaked on underground '
                                      'forums',
                 'number_of_records_exposed': 'Millions of records (including '
                                              '~400,000 cloud user profiles)',
                 'personally_identifiable_information': ['Names',
                                                         'Email addresses',
                                                         'Phone numbers',
                                                         'Job functions'],
                 'sensitivity_of_data': 'High (government users, plaintext '
                                        'credentials, PII)',
                 'type_of_data_compromised': ['Database tables',
                                              'AWS Secrets Manager credentials',
                                              'Employee password hashes',
                                              'User profiles']},
 'description': 'Cybersecurity researchers uncovered a data breach at '
                'LexisNexis, with hackers alleging far more extensive access '
                'than the company acknowledged. The threat actor group '
                'FulcrumSec leaked 2GB of stolen files, claiming to have '
                'exploited an unpatched React frontend application using the '
                'open-source post-exploitation tool React2Shell. The breach '
                'exposed hundreds of Redshift and VPC database tables, '
                'plaintext AWS Secrets Manager credentials, employee password '
                'hashes, and millions of records, including details of over '
                '100 government users and approximately 400,000 cloud user '
                'profiles. LexisNexis confirmed the incident but downplayed '
                "its severity, stating the stolen data was 'legacy' and "
                "'deprecated.'",
 'impact': {'brand_reputation_impact': 'Potential reputational damage due to '
                                       'discrepancy in breach scope',
            'data_compromised': '2GB of stolen files, including database '
                                'tables, AWS Secrets Manager credentials, '
                                'employee password hashes, and millions of '
                                'records',
            'identity_theft_risk': 'High (exposure of names, email addresses, '
                                   'phone numbers, and job functions)',
            'systems_affected': ['Redshift databases',
                                 'VPC databases',
                                 'AWS Secrets Manager']},
 'initial_access_broker': {'entry_point': 'Unpatched React frontend '
                                          'application',
                           'high_value_targets': ['Government users',
                                                  'Cloud user profiles']},
 'investigation_status': 'Contained (per company statement)',
 'motivation': 'Likely financial (ransom negotiation attempted)',
 'post_incident_analysis': {'root_causes': 'Unpatched vulnerability in React '
                                           'frontend application'},
 'ransomware': {'data_exfiltration': 'Yes',
                'ransom_paid': 'No (company declined to engage)'},
 'references': [{'source': 'Cybersecurity researchers / Underground forums'}],
 'response': {'communication_strategy': 'Public statement downplaying severity',
              'containment_measures': 'Attack contained (per company '
                                      'statement)'},
 'threat_actor': 'FulcrumSec',
 'title': 'LexisNexis Data Breach: Hackers Claim Far Greater Access Than '
          'Company Admits',
 'type': 'Data Breach',
 'vulnerability_exploited': 'Unpatched React frontend application'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.