Customer data stolen from gaming cloud host Shadow

Cloud infrastructure provider Shadow has warned of the data theft of over 500,000 customers. The customers were informed by a breach notification which was posted online.

Cloud is known in the gaming world and, among other things, allows gamers to play resource heavy games on lower-end devices,

The stolen data includes full customer names, email addresses, dates of birth, billing addresses, and credit card expiration dates. According to Shadow, no passwords or sensitive banking data have been compromised.

Shadow says the incident happened at the end of September, and was the result of a social engineering attack on a Shadow employee. The attack began on the Discord platform after the employee downloaded malware he believed to be a game on the Steam platform.

Shadow says that despite swift countermeasures, the attackers were able to use one or more of the cookies they had stolen in order to connect to the management interface of one of Shadow’s SaaS providers. From there the attackers were able to steal the data from Shadow by using their Application Programming Interface (API) access.

According to BleepingComputer, a cybercriminal claiming responsibility for the attack is selling the stolen database on a well-known hacking forum.

message on hacking board offering data for sale

image courtesy of BleepingComputer

In the message, the cybercriminal says IP connection logs were also stolen in the breach in addition to the other data mentioned by Shadow.

It is unclear, although likely, whether Shadow has reached out to everyone involved. Shadow recommends that users set up multi-factor authentication (MFA) on their accounts, and watch out for any emails that appear to come from Shadow, as they could be phishing attempts.

The company is also telling users to contact customer service with any questions or concerns.

Data breach

There are some actions you can take if you are, or suspect you may have been, the victim of a data breach.

  • Check the vendor’s advice. Every breach is different, so check with the vendor to find out what’s happened, and follow any specific advice they offer.
  • Change your password. You can make a stolen password useless to thieves by changing it. Choose a strong password that you don’t use for anything else. Better yet, let a password manager choose one for you.
  • Enable multi-factor authentication (MFA). This is good advice from Shadow, and something we always advise. If you can, use a FIDO2-compliant hardware key, laptop or phone as your second factor. Some forms of multi-factor authentication can be phished just as easily as a password. MFA that relies on a FIDO2 device can’t be phished.
  • Watch out for fake vendors. The thieves may contact you posing as the vendor. Check the vendor website to see if they are contacting victims, and verify any contacts using a different communication channel.
  • Take your time. As Shadow warns, phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.

We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

https://blog.malwarebytes.com/feed/

Leave a Reply