LexisNexis Legal & Professional confirms data breach
Briefly

LexisNexis Legal & Professional confirms data breach
"A spokesperson said only "a limited number of servers" were accessed, and the data stored on them was "mostly legacy, deprecated data from prior to 2020." This included customer names, user IDs, business contact information, products used, customer surveys with respondent IP addresses, and support tickets."
""The impacted information did not contain Social Security numbers, driver's license numbers, or any other sensitive personally identifiable information; credit card, bank accounts, or any other financial information; active passwords; or customer search queries, customer client or matter information, or customer contracts," the spokesperson added."
"Per the criminals' listing, which claims to contain a little more than 2 GB of company data, Fulcrumsec reckons it exfiltrated the files from a LexisNexis AWS instance by exploiting a vulnerable React container - specifically, an unpatched React2Shell vulnerability."
LexisNexis confirmed a data breach in its Legal & Professional division after Fulcrumsec cybercrime group claimed responsibility. The breach affected a limited number of servers containing mostly legacy data from before 2020, including customer names, user IDs, business contact information, and support tickets. The company stated that sensitive information such as Social Security numbers, financial data, active passwords, and customer search queries were not compromised. LexisNexis engaged third-party digital forensics experts to contain and remediate the incident. Fulcrumsec claims to have exfiltrated over 2 GB of data by exploiting an unpatched React2Shell vulnerability in a LexisNexis AWS instance, allegedly including 400,000 cloud user profiles with personally identifiable information.
Read at Theregister
Unable to calculate read time
[
|
]