Image: Mikhail Fesenko (unsplash)
A renowned digital threat entity, historically associated with significant data breaches, has purportedly leaked several gigabytes of sensitive data from the credit reporting agency, TransUnion, as per research specialists.
An individual operating under the alias “USDoD” is said to have disseminated a 3GB data collection encompassing the personal data of 58,505 people, as reported by Vx-underground.
The distinction between the affected parties being clients or staff remains unclear. Nonetheless, given TransUnion’s stature, it’s plausible that a portion of the disclosed data pertains to their clientele.
According to Vx-underground’s disclosure on X (formerly known as Twitter), this database, comprising details of individuals spanning continents from the Americas to Europe, was seemingly compromised on March 2, 2022.
Details within the reported data leak encompass individuals’ first and last names, proprietary TransUnion codes, comprehensive passport details, marital status, age, professional affiliations, credit rankings, and loan particulars.
Such a vast reservoir of information offers a lucrative opportunity for digital con artists planning subsequent deceptive actions against the impacted parties.
Emsisoft threat analyst Brett Callow unveiled on X that USDoD showcased this data on BreachForums. This platform was previously utilized by the same entity to divulge details procured from 3200 Airbus affiliates.
The individual in question has, in the past, professed collaboration with a digital extortion group named Ransomed. Further speculations by Vx-underground suggest the possibility of other prominent aerospace entities being targeted in the imminent future.
Chad McDonald, the Chief Information Security Officer at Radiant Logic, contended the authenticity of the TransUnion breach. He stressed the episode as a potent indicator for firms to proactively enhance their data safeguarding protocols. He articulated concerns regarding corporate challenges related to identity data, such as redundancy or irregularities. He accentuated the significance of adopting an identity-centric security methodology, amalgamating identity information into a fortified central repository to preemptively thwart both external and internal data threats.
Intriguingly, the reported database breach timeline seems to coincide with a separate ransomware episode involving TransUnion’s South African division in the preceding year. During that occurrence, malicious entities reportedly sought a substantial ransom from the credit institution.