DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Hacker claims Comcast breach linked to unpatched Zimbra vulnerability noted by NullCrew

Posted on November 12, 2015 by Dissent

There’s a new claim in the Comcast breach first reported by Steve Ragan. Darren Pauli reports that a hacker claiming responsibility for the breach notes that it was NullCrew’s hack and taunting of Comcast in 2014 that set the stage for the theft of hundreds of thousands of users’ information. Well, that and Comcast’s failure to have patched promptly when a fix for the vulnerability had been issued prior to the hack.  And of course, storing passwords in plain text didn’t help.

The hacker, using the handle “Orion,” reportedly told The Register:

“So in 2013 December the f****s at NullCrew came across an exploit for Zimbra which Comcast used at this domain *****.comcast.net ,” Orion says.

“NullCrew only got [about] 27k emails with no passwords lol while I got 800k with only 590k users with plaintext passwords.”

The Zimbra vulnerability that NullCrew allegedly exploited, CVE-2013-70911, had been disclosed in December, 2013, and a fix was already available prior to the hack.

The Comcast hack was first disclosed on Twitter in February, 2014, as I had reported here. At the time, Comcast did not seem to respond immediately to the claimed hack, and Violet Blue noted that the lack of immediate response might have consequences:

During that 24 hours, Comcast stayed silent, and the veritable “keys to the kingdom” sat out in the open internet, ripe for the taking by any malicious entity with a little know-how around mail servers and selling or exploiting customer data.

Comcast customers have not been not told to reset their passwords. But they should.

Violet Blue’s comments seem spot on, as Orion claims to have taken advantage during the period that Comcast did not respond to the February 6 announcement by NullCrew. And unlike NullCrew, who seemed more interested in embarrassing companies and making a point instead of actually stealing tons of data and misusing it for commercial gain, Orion may have had a different intent.

Whether “Orion’s” disclosure and claims pose additional problems for Timothy French, now in federal prison awaiting trial for his hacking activities with NullCrew, remains to be seen, but the claims call into question Comcast’s statement that they were not responsible for the breach and that perhaps their customers had downloaded malware from somewhere. If Orion’s claims are accurate, Comcast would appear more responsible for failure to fix the Zimbra vulnerability and failure to respond faster when NullCrew taunted them and then started posting some data to show that they had access.

So yes, Comcast may not have had a recent hack/breach of their system that accounts for a lot of the stale data for sale, but they may have been more responsible than they have acknowledged so far.


Related:

  • Qantas obtains injunction to prevent hacked data’s release
  • Ransomware attack disrupts Korea's largest guarantee insurer
  • Former U.S. Soldier Pleads Guilty to Hacking and Extortion Scheme Involving Telecommunications Companies
  • Four people bailed after arrests over cyber attacks on M&S, Co-op and Harrods
  • Mississippi Law Firm Sues Cyber Insurer Over Coverage for Scam
  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
Category: Business Sector

Post navigation

← Oz railway lets newspaper photograph train keys
Q3 2015 Data Breach QuickView Report – A Record Breaking Year in the Making →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • WA: Cyber-attacks problem for small hospitals
  • Florida prison data breach exposes visitors’ contact information to inmates
  • Experian Wins Appeal to Send Data Breach Victim to Arbitration
  • ICANN sends breach notice to domain registrar Webnic about failure to deal with DNS abuse compliants properly
  • Canadian cybercriminal sentenced to a year in prison for NFT theft scheme
  • Oops! Catasauqua employees’ Social Security numbers, other data accidentally sent to government watchdog group
  • EU-wide Breach Notification Template on the Horizon
  • Sex toy maker Lovense caught leaking users’ email addresses and exposing accounts to takeovers
  • Hackers wipe out Rs 384 crore from Bengaluru cryptocurrency firm Neblio Technologies; firm says inside job
  • Intelligence cyberattack on Crimea. Documents confirming abduction of children from Ukraine found

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Trump administration is launching a new private health tracking system with Big Tech’s help
  • Attorney General James Takes Action to Protect Sensitive Personal Information of Tens of Millions of People
  • Searches of Your Private Data in the Cloud Amount to Illicit State Action
  • How a Tax Subpoena in Ohio Tests European Privacy Law
  • Cambodia moves to enact comprehensive data privacy law
  • White House ordered to restore Medicaid funding to Planned Parenthood clinics
  • California Attorney General Announces $1.55M CCPA Settlement with Healthline.com

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.