Serious security alert for Monster.com and USAJobs.gov users
Posted on 26 January 2009.
IT security and control firm Sophos is advising all users of careers website Monster.com and USAJobs.gov, the official job site of the US Federal Government, to change their passwords following news that both sites have been the victim of a serious hacking attack which has compromised both and usernames and passwords.

Furthermore, as research has discovered that 41 percent of people use the same password for every website they access, many Monster and USAJobs users are likely to be at risk of their accounts on other websites are at risk of being hacked.


According to a warning published by Monster, other data stolen included users' email addresses, names, phone numbers and some demographic data.  The incident follows a similar attack on both sites 18 months ago when hackers used the Monstres Trojan horse to steal details of jobseekers via recruiter accounts.  That hack was unsurprisingly followed by a widespread phishing campaign.

Graham Cluley, senior technology consultant at Sophos commented:
Customers of both Monster and USAJobs have been placed at serious risk because of this attack.

One very real risk is that the hackers will use the email addresses and personal information they have stolen to mount a very realistic phishing campaign to gather more sensitive information from the victims.  But, that's just the tip of the iceberg - since so many people use the same password for every website, there's a good chance the cybercriminals will be able access users' bank accounts and other sites.
According to media reports, Monster is not planning to warn its users via email about the security breach, but instead posted an advisory on its website.
There will be a few raised eyebrows about how Monster is choosing to inform its members of this serious security breach.  As the company's database was hacked in what appears to have been a similar attack in 2007, customer confidence in the company may be damaged following this latest incident
- continued Cluley.





Spotlight

Windows 0-day exploited in ongoing attacks, temporary workarounds offered

Posted on 22 October 2014.  |  Microsoft is warning users about a new Windows zero-day vulnerability that is being actively exploited in the wild and is primarily a risk to users on servers and workstations that open documents with embedded OLE objects.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Oct 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //