Please do not leave this page until complete. This can take a few moments.
The company issued a statement saying it shut down the "rogue server" where the stolen data was being stored and that only names, addresses, phone numbers and e-mail addresses were found. The company declined further comment, saying it is cooperating with law enforcement.
However, security experts say the rogue server was likely just one of dozens used to steal and store data from Monster in an elaborate theft campaign that has been ongoing since May.
There could be many more than 1.3 million Monster patrons whose data has been breached, and there is little stopping the crooks from continuing the attacks, says Robert Sandilands, chief researcher at security firm Authentium.
"It is a very good first step by Monster," says Sandilands. "There will have to be more changes to prevent this from happening again. This was a smaller part of a much bigger operation."
In targeting Monster, the intruders sent out e-mail come-ons and pop-up ads pitching job-finding services to get victims to click on a tainted web link. Clicking on the link results in an error message - and turns control of the PC over to the intruder, says Don Jackson, virus researcher at security firm SecureWorks.
Monster has posted detailed precautions at http://help.monster.com/besafe.
Infected PCs are being incorporated into "zombie" networks to spread e-mail spam, deliver more infections and collect and store stolen data. Meanwhile, all information typed by the user into the Web browser, including usernames and passwords for online accounts, gets collected.
Jackson has tracked down several servers being used to store data collected over time from victims' browser activity, including Social Security numbers and other data. One such storage unit held rich data for 46,000 individuals, he said.
The crooks appear to have used such data to log into a job recruiter's Monster account and order contact information for 1.3 million job candidates. That data, in turn, was used to target known job seekers for e-mail scams touting Monster's services.
The Monster attack has been so successful that security experts expect it to be attempted at other employment Web sites. For that matter, all Web sites that collect user profiles, particularly social and business networking and media Web sites, are susceptible as targets, security experts say.
"The advice to just stay out of the dark corners of the Internet really doesn't hold water any more," says David Cole, director of Symantec Security Response team. "The bad guys are going to legitimate Web sites and attacking people."
Stay connected! Every business day, WBJ Daily Report will be delivered to your inbox by noon. It provides a daily update of the area’s most important business news.
Sign upWorcester Business Journal provides the top coverage of news, trends, data, politics and personalities of the Central Mass business community. Get the news and information you need from the award-winning writers at WBJ. Don’t miss out - subscribe today.
SubscribeWorcester Business Journal presents a special commemorative edition celebrating the 300th anniversary of the city of Worcester. This landmark publication covers the city and region’s rich history of growth and innovation.
See Digital EditionStay connected! Every business day, WBJ Daily Report will be delivered to your inbox by noon. It provides a daily update of the area’s most important business news.
Worcester Business Journal provides the top coverage of news, trends, data, politics and personalities of the Central Mass business community. Get the news and information you need from the award-winning writers at WBJ. Don’t miss out - subscribe today.
Worcester Business Journal presents a special commemorative edition celebrating the 300th anniversary of the city of Worcester. This landmark publication covers the city and region’s rich history of growth and innovation.
In order to use this feature, we need some information from you. You can also login or register for a free account.
By clicking submit you are agreeing to our cookie usage and Privacy Policy
Already have an account? Login
Already have an account? Login
Want to create an account? Register
In order to use this feature, we need some information from you. You can also login or register for a free account.
By clicking submit you are agreeing to our cookie usage and Privacy Policy
Already have an account? Login
Already have an account? Login
Want to create an account? Register
This website uses cookies to ensure you get the best experience on our website. Our privacy policy
To ensure the best experience on our website, articles cannot be read without allowing cookies. Please allow cookies to continue reading. Our privacy policy
0 Comments