Official forum for Utopia Community
You are not logged in.
Inadvertently uploaded to the malware scanning platform by a worker, the information related to a subset of VirusTotal's registered customers, including their names and email addresses, was made public.
Der Spiegel and Der Standard were the first to report yesterday's security breach, which involves a database of 5,600 names in a 313KB file.
VirusTotal, a well-known service that was introduced in 2004, uses antivirus engines and website scanners to examine suspicious files and URLs in order to find different malware types and malicious content. In 2012, Google purchased it; in 2018, it was added to the Chronicle division of Google Cloud.
Google acknowledged the data leak when contacted for comment and claimed it removed the information right away.
A Google Cloud representative told The Hacker News, "We are aware of the accidental distribution of a small segment of customer group administrator emails and organization names by one of our employees on the VirusTotal platform.
"Within an hour of the list being posted, we removed it from the platform, and we are currently reviewing our internal procedures and technical controls to enhance our business practices.
".
The information includes accounts associated with recognized U.
S. the National Security Agency (NSA), the Department of Justice, the Federal Bureau of Investigation (FBI), and Cyber Command. Other accounts are owned by governments in Taiwan, Germany, the Netherlands, and the United States. K.
In a warning issued last year, Germany's Federal Office for Information Security (BSI) cautioned against automatically uploading dubious email attachments, noting that doing so could expose sensitive data.
Offline