Feed aggregator
Fintech Giant Finastra Investigating Data Breach
The financial technology firm Finastra is investigating the alleged large-scale theft of information from its internal file transfer platform, KrebsOnSecurity has learned. Finastra, which provides software and services to 45 of the world’s top 50 banks, notified customers of the security incident after a cybercriminal began selling more than 400 gigabytes of data purportedly stolen from the company.
London-based Finastra has offices in 42 countries and reported $1.9 billion in revenues last year. The company employs more than 7,000 people and serves approximately 8,100 financial institutions around the world. A major part of Finastra’s day-to-day business involves processing huge volumes of digital files containing instructions for wire and bank transfers on behalf of its clients.
On November 8, 2024, Finastra notified financial institution customers that on Nov. 7 its security team detected suspicious activity on Finastra’s internally hosted file transfer platform. Finastra also told customers that someone had begun selling large volumes of files allegedly stolen from its systems.
“On November 8, a threat actor communicated on the dark web claiming to have data exfiltrated from this platform,” reads Finastra’s disclosure, a copy of which was shared by a source at one of the customer firms.
“There is no direct impact on customer operations, our customers’ systems, or Finastra’s ability to serve our customers currently,” the notice continued. “We have implemented an alternative secure file sharing platform to ensure continuity, and investigations are ongoing.”
But its notice to customers does indicate the intruder managed to extract or “exfiltrate” an unspecified volume of customer data.
“The threat actor did not deploy malware or tamper with any customer files within the environment,” the notice reads. “Furthermore, no files other than the exfiltrated files were viewed or accessed. We remain focused on determining the scope and nature of the data contained within the exfiltrated files.”
In a written statement in response to questions about the incident, Finastra said it has been “actively and transparently responding to our customers’ questions and keeping them informed about what we do and do not yet know about the data that was posted.” The company also shared an updated communication to its clients, which said while it was still investigating the root cause, “initial evidence points to credentials that were compromised.”
“Additionally, we have been sharing Indicators of Compromise (IOCs) and our CISO has been speaking directly with our customers’ security teams to provide updates on the investigation and our eDiscovery process,” the statement continues. Here is the rest of what they shared:
“In terms of eDiscovery, we are analyzing the data to determine what specific customers were affected, while simultaneously assessing and communicating which of our products are not dependent on the specific version of the SFTP platform that was compromised. The impacted SFTP platform is not used by all customers and is not the default platform used by Finastra or its customers to exchange data files associated with a broad suite of our products, so we are working as quickly as possible to rule out affected customers. However, as you can imagine, this is a time-intensive process because we have many large customers that leverage different Finastra products in different parts of their business. We are prioritizing accuracy and transparency in our communications.
Importantly, for any customers who are deemed to be affected, we will be reaching out and working with them directly.”
On Nov. 8, a cybercriminal using the nickname “abyss0” posted on the English-language cybercrime community BreachForums that they’d stolen files belonging to some of Finastra’s largest banking clients. The data auction did not specify a starting or “buy it now” price, but said interested buyers should reach out to them on Telegram.
According to screenshots collected by the cyber intelligence platform Ke-la.com, abyss0 first attempted to sell the data allegedly stolen from Finastra on October 31, but that earlier sales thread did not name the victim company. However, it did reference many of the same banks called out as Finastra customers in the Nov. 8 post on BreachForums.
The October sales thread also included a starting price: $20,000. By Nov. 3, that price had been reduced to $10,000. A review of abyss0’s posts to BreachForums reveals this user has offered to sell databases stolen in several dozen other breaches advertised over the past six months.
The apparent timeline of this breach suggests abyss0 gained access to Finastra’s file sharing system at least a week before the company says it first detected suspicious activity, and that the Nov. 7 activity cited by Finastra may have been the intruder returning to exfiltrate more data.
Maybe abyss0 found a buyer who paid for their early retirement. We may never know, because this person has effectively vanished. The Telegram account that abyss0 listed in their sales thread appears to have been suspended or deleted. Likewise, abyss0’s account on BreachForums no longer exists, and all of their sales threads have since disappeared.
It seems improbable that both Telegram and BreachForums would have given this user the boot at the same time. The simplest explanation is that something spooked abyss0 enough for them to abandon a number of pending sales opportunities, in addition to a well-manicured cybercrime persona.
In March 2020, Finastra suffered a ransomware attack that sidelined a number of the company’s core businesses for days. According to reporting from Bloomberg, Finastra was able to recover from that incident without paying a ransom.
This is a developing story. Updates will be noted with timestamps. If you have any additional information about this incident, please reach out to krebsonsecurity @ gmail.com or at protonmail.com.
Lex Fridman interviews Javier Milei [video]
Article URL: https://www.youtube.com/watch?v=8NLzc9kobDk
Comments URL: https://news.ycombinator.com/item?id=42189820
Points: 1
# Comments: 0
Tldr pages – tl;dr for man pages
Article URL: https://tldr.sh/
Comments URL: https://news.ycombinator.com/item?id=42189812
Points: 1
# Comments: 0
Bose Acquires McKintosh
Article URL: https://www.theverge.com/2024/11/19/24300618/bose-mcintosh-group-audio-acquisition
Comments URL: https://news.ycombinator.com/item?id=42189783
Points: 1
# Comments: 0
I designed my website to look like a chat log
Article URL: https://www.ypson.com
Comments URL: https://news.ycombinator.com/item?id=42189744
Points: 1
# Comments: 1
SpaceX Launches Starship Flight Test 6: Everything That Happened in 14 Minutes video
Strava is killing apps through the latest changes
So it seems that the latest announcement of Strava for their API is killing a lot of apps
In more detail, they sent an email yesterday to everyone, mentioning the following:
Any App using its API can no longer:
- Show data in your app to coaches - Use any AI algorithms - Display any analytics and customer insights
DC Rainmaker did a good analysis of this here: https://www.dcrainmaker.com/2024/11/stravas-changes-to-kill-off-apps.html
It comes as a big surprise, since there are thousands of apps using their API, and they are only giving 30 days for the changes to take place.
(full disclosure: i'm the founder of Terra API - and it can be used to fully replace Strava https://tryterra.co )
Comments URL: https://news.ycombinator.com/item?id=42189722
Points: 2
# Comments: 1
Software Security Analysis in 2030 and Beyond: A Research Roadmap [pdf]
Article URL: https://mpi-softsec.github.io/papers/TOSEM25-roadmap.pdf
Comments URL: https://news.ycombinator.com/item?id=42189697
Points: 1
# Comments: 0
Flying with Photons: Rendering Novel Views of Propagating Light
Article URL: https://anaghmalik.com/FlyingWithPhotons/
Comments URL: https://news.ycombinator.com/item?id=42189657
Points: 1
# Comments: 0
Save $50 on the DJI Osmo Mobile 6 Smartphone Gimbal Before Black Friday
How to Reach Angel Investors in the San Francisco Area for Agentic AI Startup?
Hi All! We’ve recently launched a San Francisco-based Agentic AI startup. So far, we’ve organically built a waitlist of over 1000 users and converted some of them into paying subscribers without any marketing spend. With this early traction, we’re eager to scale our platform and attract enterprise clients. Given our progress, what strategies or channels would you recommend for connecting with angel investors in the San Francisco area? Any insights or advice on approaching potential investors effectively would be greatly appreciated!
Comments URL: https://news.ycombinator.com/item?id=42189648
Points: 1
# Comments: 1
Elasticsearch Was Great, but Vector Databases Are the Future
Article URL: https://thenewstack.io/elasticsearch-was-great-but-vector-databases-are-the-future/
Comments URL: https://news.ycombinator.com/item?id=42189643
Points: 2
# Comments: 0
How the Ivy League Broke America
Volvo Cars partners with OVO to deliver ultra-low charging rates for EV drivers
Joining the Shopify Board of Directors
Article URL: https://world.hey.com/dhh/joining-the-shopify-board-of-directors-3c351fbb
Comments URL: https://news.ycombinator.com/item?id=42189613
Points: 2
# Comments: 1
LPEs in Needrestart
Article URL: https://www.qualys.com/2024/11/19/needrestart/needrestart.txt
Comments URL: https://news.ycombinator.com/item?id=42189611
Points: 1
# Comments: 0
Apple Confirms Zero-Day Attacks Hitting macOS Systems
Article URL: https://www.securityweek.com/apple-confirms-zero-day-attacks-hitting-intel-based-macs/
Comments URL: https://news.ycombinator.com/item?id=42189581
Points: 29
# Comments: 3
Suno – Introducing v4
Article URL: https://suno.com/blog/v4
Comments URL: https://news.ycombinator.com/item?id=42189571
Points: 3
# Comments: 0
The Longhorn's Long Journey to Becoming a Texas Icon
Article URL: https://www.texasmonthly.com/being-texan/how-longhorn-became-texas-icon/
Comments URL: https://news.ycombinator.com/item?id=42189568
Points: 1
# Comments: 0