DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Have you googled your site to see if you’ve been hacked?

Posted on April 9, 2015 by Dissent

It’s 2015, and too many entities still don’t seem to know to do Google searches or Pastebin searches on themselves to find out if they’ve been hacked or their data dumped somewhere. There’s no way this blog can report on them all or even alert them all, but one of today’s examples is WAYEB, the European Association of Mayanists.

I know, I know: who’d want to hack a non-profit group of folks interested in the Mayan culture, right?  But being an academically oriented organization does not immunize you from those who run around testing for SQL injection vulnerabilities.

On April 5, a hacker who tweets as “Jabb” (@Versifyings on Twitter) dumped hundreds of records of WAYEB members on Pastebin. The records, from what appears to be a backup database,  included 237 members’ e-mail addresses, clear text passwords, and phone number(s). An additional 240 records included e-mail addresses, usernames, and once again, clear text passwords.

No financial information was dumped.

This was not the first time wayeb.org was hacked and data dumped, as DataBreaches.net pointed out to WAYEB in a notification alert last night.

WAYEB did not acknowledge or respond to the e-mail notification, but I see that all of the pastes that had been specifically mentioned in the e-mail notification have been removed overnight, so they likely did receive the alert. Whether they intend to notify all those whose email addresses, usernames, and clear-text passwords were exposed is unknown to DataBreaches.net, but it would be prudent to do so as people continue to re-use passwords across sites, despite repeated warnings to the contrary. DataBreaches.net does not know whether WAYEB also intends to report the breach to any EU data protection authorities.

In the meantime, when was the last time you checked to see if your organization’s information or records had been dumped on Pastebin or if they show up in a Google search for your domain? Even if you don’t collect or store financial data, think of what’s involved in notifying everyone whose personal information has been publicly dumped. And think of what data protection regulators might put you through.

Isn’t it worth checking regularly?

Update: Chris Walshman reminds me that haveibeenpwned.com is also a great site to check.


Related:

  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Hungarian police arrest suspect in cyberattacks on independent media
  • British institutions to be banned from paying ransoms to Russian hackers
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
  • Inquiry launched after identities of SAS soldiers leaked in fresh data breach
Category: Commentaries and AnalysesHackMiscellaneousNon-U.S.

Post navigation

← French media groups hold emergency meeting in wake of ISIS hacking attack
CareerSource South Florida employee stole and sold identity info on public benefits applicants →

1 thought on “Have you googled your site to see if you’ve been hacked?”

  1. Chris says:
    April 9, 2015 at 11:58 am

    One means folks can use to assist this process a bit comes courtesy of Troy Hunt (@troyhunt), who created https://haveibeenpwned.com/

    You can see if your individual credentials have been exposed, and with appropriate verification can also see if any creds from your domain have. It’s well thought out (IMO), and maintained diligently.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Paying cyberattackers is wrong, right? Should Taos County’s incident be an exception?
  • HHS OCR Settles HIPAA Ransomware Investigation with Syracuse ASC for $250k plus corrective action plan
  • IVF provider Genea notifies patients about the cyberattack earlier this year.
  • Key figure behind major Russian-speaking cybercrime forum targeted in Ukraine
  • Clorox Files $380M Suit Alleging Cognizant Gave Hackers Passwords in Catastrophic 2023 Cyberattack
  • Cyberattacks Paralyze Major Russian Restaurant Chains
  • France Travail: At least 340,000 job seekers victims of new hack
  • Legal Silence and Chilling Effects: Injunctions Against the Press in Cybersecurity
  • #StopRansomware: Interlock
  • Suspected XSS Forum Admin Arrested in Ukraine

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure
  • Idaho agrees not to prosecute doctors for out-of-state abortion referrals
  • As companies race to add AI, terms of service changes are going to freak a lot of people out. Think twice before granting consent!
  • Uganda orders Google to register as a data-controller within 30 days after landmark privacy ruling
  • Meta investors, Zuckerberg reach settlement to end $8 billion trial over Facebook privacy violations

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.