[confirmed] 21,485 clear text passwords stolen from Billabong

Powered by SC Magazine
 

Clear text passwords published online.

More than 21,000 clear text passwords have been stolen from Australian surfwear icon Billabong and published online.

The breach has yet to be confirmed. SC has notified the company’s IT desk and provided a link to the codepaste site where the details were uploaded.

Billabong was previously unaware of the breach.

Hacktivists released the credentials under #WikiBoatWednesday, an event popular in hacktivist Twitter circles where groups publish stolen data caches online.

Other administrator database tables and information was released, including hashed passwords.

Here's what Billabong told SC.

"At this stage, we understand that the customer database contains personal information of certain customers of the website, but no financial data.  We view this attack as an extremely serious matter and have taken urgent action to contain the incident and prevent further attacks occurring. We are continuing to gather information about the incident and to establish the extent and nature of the data that may have been accessed.  We will take further appropriate measures as new information comes to light".

The leak comes a day after news broke that some 450,000 Yahoo! Voice email addresses and clear text passwords were uploaded to the internet.

Yahoo! told SC only five per cent of the records were legitimate. 

Updated 5:20PM.

Copyright © SC Magazine, Australia


[confirmed] 21,485 clear text passwords stolen from Billabong
 
 
 
Top Stories
ATO shaves $4m off IT contractor panel
Reform cuts admin burden, introduces KPIs.
 
Turnbull introduces data retention legislation
Still no definition of metadata to be stored.
 
Crime Commission prepares core systems overhaul
Will replace 30 year-old national criminal database.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  13%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  25%
TOTAL VOTES: 434

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  54%
 
No
  46%
TOTAL VOTES: 209

Vote