Trending

HomeBlog
Cyber Criminals Breached Frost & Sullivan Database. Data Leaked
Cyber Criminals Breached Frost & Sullivan Database. Data Leaked

Cyber Criminals Breached Frost & Sullivan Database. Data Leaked

June 24, 2020, Update: Cyble has handed over the intelligence related to this leak to Frost & Sullivan response team for investigation and remediation purposes.

Update as of 06/23/2020: As part of our regular darkweb monitoring, the Cyble Research Team came across a team of hackers who claims to put up the database of Frost & Sullivan for sale.

Frost & Sullivan was founded by Dan L. Sullivan and Lore A. Frost in New York City in the year 1961. From then on, the company has been a business consulting firm involved in market research and analysis, growth strategy consulting, and corporate training across multiple industries. It is headquartered in Mountain View, California, and has 40 offices on six continents. With around 1800 number of employees, the company has been earning an average revenue of USD 0.18 billion.

The company’s database has been put off sale contains detailed records of 6ooo number of customers and 6146 number of company’s employees. For now, the hackers have posted a sample record of both company’s customers and employees. Below is the snapshot of the sample records been leaked by the group of hackers.

The leaked database seems to include data fields such as full name, user id, email address, date of account created, and many more.

We recommend people to:

report-ad-banner
  • Never share personal information, including financial information over the phone, email or SMSs
  • Use strong passwords and enforce multi-factor authentication where possible
  • Regularly monitor your financial transaction, if you notice any suspicious transaction, contact your bank immediately.
  • Turn-on automatic software update feature on your computer, mobile and other connected devices where possible and pragmatic
  • Use a reputed anti-virus and internet security software package on your connected devices including PC, Laptop, Mobile

About Cyble:

Cyble is a US-based cyber threat intelligence company with the express mission to provide organizations with real-time views of their supply chain cyber threats and risks.

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.

Get Threat Assessment Report

Identify External Threats Targeting Your Business​
Free

Threat Landscape Reports 2025

Upcoming Webinars

CISO's Guide to Threat Intelligence 2024

CISO’s Guide to Threat Intelligence 2024: Best Practices

Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now

Share the Post:
Scroll to Top

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading