Quantcast
Channel: Daily Dark Web
Viewing all articles
Browse latest Browse all 868

Threat Actor Claims to Sell BreingAir User Data Including Client, Employee, and Admin Credentials

$
0
0

A threat actor has claimed to be selling sensitive data from BreingAir, an airline company based in Alaska, USA. The alleged sale includes user credentials for both clients and employees, as well as administrative users.

According to the threat actor’s announcement, the compromised data includes:

28,378 Client/Employee User Credentials: This dataset reportedly contains user credentials, including email/login information and passwords encrypted using the MD5 hashing algorithm.

4 Admin User Credentials: Additionally, the breach allegedly includes credentials for administrative accounts, comprising email, login, and MD5-encrypted passwords.

The threat actor has not disclosed the specific server or vulnerability exploited to obtain this information, intending to share these details only with potential buyers after purchase. The price for the data is said to be negotiable, with interested parties instructed to engage privately for further discussions.

The post Threat Actor Claims to Sell BreingAir User Data Including Client, Employee, and Admin Credentials appeared first on Daily Dark Web.


Viewing all articles
Browse latest Browse all 868

Trending Articles