Data Breach at Cartier Linked to BORN GROUP

Threat Actor: @IntelBroker, @EnergyWeaponUser | IntelBroker, EnergyWeaponUser
Victim: Cartier | Cartier
Price: Not disclosed
Exfiltrated Data Type: Source code, images, various random files

Key Points :

  • Threat actors claim to have leaked a database from BORN GROUP affecting Cartier.
  • The breach involved exfiltration of data from Cartier’s AWS S3 storage.
  • Attackers exploited LFI vulnerabilities to access sensitive information.
  • Compromised data includes source code, images, and various random files.
  • The incident highlights serious security vulnerabilities in Cartier’s digital infrastructure.

Threat actors, @IntelBroker and @EnergyWeaponUser, claims to have leaked a database of the BORN GROUP. They claim this breach affects Cartier, a renowned watch company. The attackers allege they managed to exfiltrate data from Cartier’s AWS S3 storage and abused LFI vulnerabilities to gain access to some important data.

According to the threat actors, the compromised data includes source code, images, and various random files. This breach highlights serious security vulnerabilities within Cartier’s digital infrastructure managed by the BORN GROUP.

 

 

 

The post Threat Actors Alleged Data Breach on Cartier via BORN GROUP appeared first on Daily Dark Web.