I just got the email from haveibeenpwned. F Trello.

    • ChrislyBear@lemmy.world
      link
      fedilink
      English
      arrow-up
      45
      ·
      10 months ago

      They do, in the EU. If you fuck up your customer’s data, you’ll face fines consisting of hefty percentages of your yearly revenue!

        • JustEnoughDucks@feddit.nl
          link
          fedilink
          English
          arrow-up
          3
          ·
          edit-2
          10 months ago

          Oh noooo, 1% of their yearly gross revenue or 1.3% of their yearly gross profit. What a fine!

          Side note: I would love to discover a public record of them paying these fines… we hear they ate fined, but never that they had to pay them. What is stopping them from cutting a deal of a payment plan over 20 years with 0% interest or full up front but only paying 30% of it or some lobbying BS.

          We can infer that for sure this fine is coming out pre-tax.

    • CosmicTurtle@lemmy.world
      link
      fedilink
      English
      arrow-up
      30
      arrow-down
      7
      ·
      10 months ago

      Yes but this wasn’t a data breach. This was a data stuffing incident, meaning they took someone else’s data dump and tried their email and credentials here.

      • never use the same username and password in two or more places
      • always use MFA, a hard token if you can like a yubikey
      • Albatross2724@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        ·
        10 months ago

        For project tools like Trello, a good portion of your userbase is company emails. A malicious actor now has a list of company emails that they can compare against public facing data like Linkedin, imitate a user using a gmail based off their name, sending an email to that company’s IT team asking for an MFA reset sent to the newly created gmail account. Now imagine if that compromised user is a developer with admin access to production environments. These were the conditions for various ransomware attacks.

        An email, username, real name are not much, but it’s a foot in the door.

        • Dr. Moose@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          10 months ago

          It is a foot in the door but honestly there are way too many doors out there so it’s really hard to measure the real damage of this.

          I worked at a pretty major employment company like 20 years ago when basically everything was legal and we didn’t need to buy dark web datasets to find real names and contacts ever - most of that data is publicly available and can be captured with simple public scrapers and email checks.

          I think expectation of names and emails being private should be thrown out of the window entirely and every security system should implicitly assume these details are publicly known.

          • Albatross2724@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            10 months ago

            So the conditions I mentioned were directly from a series of ransomware attacks from the group BlackCat including the high profile ransomware incident targeting MGM Casinos last year. My team recently used the same premise during an incident response drill based on that event.

    • Petter1@lemm.ee
      link
      fedilink
      English
      arrow-up
      12
      arrow-down
      2
      ·
      10 months ago

      I agree that data security is important, even if it is only email addresses, where many are probably findable in the web anyway. Maybe, the link with the username has some value, but I’d bet only little. In my opinion, harsh penalties are more needed in privacy invasive (in my opinion malware) like google, meta, Amazon etc. are spreading.

      • deadbeef79000@lemmy.nz
        link
        fedilink
        English
        arrow-up
        8
        ·
        10 months ago

        The problem is that this data can be combined with other data. An email address by itself isn’t particularly important but when it’s matched up with names, physical addresses, DoB, SSN, other PII and the network of other services with matching data it becomes very serious.

        It’s never just this breach, it’s every other breach as well. Every breach makes every preceeding breach more effective and more valuable.

          • deadbeef79000@lemmy.nz
            link
            fedilink
            English
            arrow-up
            1
            ·
            10 months ago

            Other breaches do.

            If two breaches have an overlap, e.g. they both contain email address, then they can be joined into a more complete set.

            • aidan@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              arrow-down
              1
              ·
              10 months ago

              Yeah, I don’t think there is much that would be gleamed by combining with this dataset

        • Petter1@lemm.ee
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          1
          ·
          10 months ago

          Of course, but where are names, physical addresses, DoB, SSN, etc in this dataset? It’s just mail and username

          • deadbeef79000@lemmy.nz
            link
            fedilink
            English
            arrow-up
            1
            ·
            10 months ago

            Other breaches do.

            If two breaches have an overlap, e.g. they both contain email address, then they can be joined into a more complete set.