Stack Overflow now says hacker might have also accessed user data.
The hacker who breached Stack Overflow last week managed to access data on user accounts, the company said today in an update on its investigation into a security breach it disclosed last night.
The update comes to shed some light into what happened on the company’s servers last week, after Stack Overflow left many users scratching their heads when it posted a very short message on Thursday, announcing a severe breach of its production systems.
While it initially said that there was no evidence of the hacker accessing user data, the company changed its statement today.
“While our overall user database was not compromised, we have identified privileged web requests that the attacker made that could have returned an IP address, names, or emails for a very small number of Stack Exchange users,” said Mary Ferguson, VP of Engineering at Stack Overflow.
The exec said the company is now reviewing log files to determine which users were impacted by the hacker’s scans. Users found to have had their info viewed or collected by the hacker will receive a notification, she said.
HACKER WAS UNDETECTED FOR DAYS
Further, Ferguson also added a correction to the breach’s timeline, which started a week before Stack Overflow thought it did.
“The intrusion originated on May 5 when a build deployed to the development tier for stackoverflow.com contained a bug, which allowed an attacker to log in to our development tier as well as escalate their access on the production version of stackoverflow.com,” Ferguson said.
“Between May 5 and May 11, the intruder contained their activities to exploration,” the Stack Overflow exec said, highlighting the reason why the company did not detect the intrusion.
“On May 11, the intruder made a change to our system to grant themselves privileged access on production. This change was quickly identified and we revoked their access network-wide, began investigating the intrusion, and began taking steps to remediate the intrusion.”
Stack Overflow said it terminated the hacker’s access to its network and is now working with a forensics firm to audit its logs and trace the intruder’s actions on its servers.
The company said the investigation is still ongoing and more updates will follow.
Code Execution Vulnerability Identified in Change Healthcare Cardiology DevicesA vulnerability has been identified in Change Healthcare Cardiology, McKesson Cardiology, and Horizon Cardiology devices. The vulnerability could be exploited by a locally authenticated...
29% of Small Businesses Spend Less Than $1,000 on IT Security Annually and Why They Are The Most Targeted
29% of Small Businesses Spend Less Than $1,000 on IT Security Annually and Why They Are The Most TargetedThe digital and network footprint of small businesses is continually growing. Online commerce, social media, remote workers, and cloud-based IT infrastructure are...
What Other Companies Can Learn from Facebook’s $5 Billion Fine and Why Privacy MattersWhile Facebook’s $5 billion settlement stands as the largest fine in the history of the Federal Trade Commission (FTC), one must take into consideration that not every company is...
Stay Up to Date With The Latest News & Updates
Join Our Newsletter
Get weekly tech updates and immediate alerts when there is a zero-day or security issue!