Threat Actor: Unknown | Unknown
Victim: Taiwanese Electronics Company | Taiwanese Electronics Company
Price: Negotiable (discounted due to 2FA bypass requirement)
Exfiltrated Data Type: VPN access
Key Points :
- The threat actor claims to offer VPN access to a major electronics company in Taiwan.
- The targeted company has an annual revenue of approximately $20 billion.
- The access is configured through the “Dana-na” panel, which is protected by two-factor authentication (2FA).
- A bypass for the 2FA is necessary to fully utilize the access.
- The threat actor is open to negotiations regarding the final price due to the 2FA bypass requirement.
- This incident raises significant security concerns regarding the effectiveness of 2FA systems.
A new cyber incident post from a threat actor has emerged, claiming to offer VPN access to a major electronics company in Taiwan with an annual revenue of $20 billion. Allegedly, the access is announcement configured through the “Dana-na” panel but is protected by two-factor authentication (2FA), necessitating a bypass to utilize the access fully.
Due to the requirement for a 2FA bypass, the threat actor is offering the access at a discounted price and is open to negotiations to establish the final price. This situation highlights significant security concerns for the targeted company, underscoring the importance of robust 2FA systems and the potential vulnerabilities that can arise even with such measures in place.
The post Threat Actor Claims to Sell VPN Access to $20B Taiwanese Electronics Company appeared first on Daily Dark Web.