Yandex

Yandex

A Yandex source code repository purportedly stolen by a former worker of the Russian IT giant was exposed on a well-known forum for cybercrime.

There are no personal details because this breach just includes the contents of git repositories. There are at least a few API keys, but they are probably mainly used for deployment testing.

The business said that it is looking into the data leak, but made clear that user data was safe and platform performance was unaffected.

Threat actors may be able to examine the git source code because it is available to the public and uncover flaws that they can use to attack Yandex services.

Source: https://securityaffairs.com/141382/data-breach/yandex-code-repositories-leaked.html

TPRM report: https://scoringcyber.rankiteo.com/company/yandex

"id": "yan224381023",
"linkid": "yandex",
"type": "Breach",
"date": "01/2023",
"severity": "25",
"impact": "3",
"explanation": "Attack with significant impact with internal employee data leaks"
{'affected_entities': [{'industry': 'IT',
                        'location': 'Russia',
                        'name': 'Yandex',
                        'type': 'Company'}],
 'attack_vector': 'Insider Threat',
 'data_breach': {'file_types_exposed': ['Source code files'],
                 'type_of_data_compromised': ['Source code', 'API keys']},
 'description': 'A Yandex source code repository purportedly stolen by a '
                'former worker of the Russian IT giant was exposed on a '
                'well-known forum for cybercrime. The breach includes the '
                'contents of git repositories with some API keys, but user '
                'data was unaffected.',
 'impact': {'data_compromised': ['Source code', 'API keys'],
            'systems_affected': ['Git repositories']},
 'investigation_status': 'Investigation ongoing',
 'motivation': 'Unknown',
 'references': [{'source': 'Cyber Incident Description'}],
 'threat_actor': 'Former employee',
 'title': 'Yandex Source Code Repository Breach',
 'type': 'Data Breach',
 'vulnerability_exploited': 'Unauthorized access to source code repository'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.