Article Details

Original Article Text

Click to Toggle View

Amazon confirms employee data breach after vendor hack. Amazon confirmed an employee data breach after a threat actor leaked on a hacking forum what they claimed was data stolen during the MOVEit data theft attacks in May 2023. The threat actor, known as Nam3L3ss, leaked over 2.8 million lines of Amazon employee data, including names, contact information, building locations, email addresses, and more. Amazon spokesperson Adam Montgomery confirmed Nam3L3ss' claims, adding that this data was stolen from systems belonging to a third-party service provider. "Amazon and AWS systems remain secure, and we have not experienced a security event. We were notified about a security event at one of our property management vendors that impacted several of its customers including Amazon," Montgomery said. "The only Amazon information involved was employee work contact information, for example work email addresses, desk phone numbers, and building locations." The company said the breached vendor only had access to employee contact information, and the attackers didn't access or steal sensitive employee information like Social Security numbers, government identification, or financial information. Amazon added that the vendor has since patched the security vulnerability used in the attack. ​Nam3L3ss also sells data from many other companies on the hacking forum. However, they say some of the data was also obtained from other sources, including ransom gangs' leak sites and exposed AWS and Azure buckers. "I download entire databases from exposed web sources including mysql, postgres, SQL Server databases and backups, azure databases and backups etc and then convert them to csv or other format," they said. "DO NOT ask me for access to my storage etc, at present I have well over 250TB of archived database files etc." The list of companies whose data was stolen in MOVEit attacks or harvested from Internet-exposed resources and is now up for sale online includes Lenovo, HP, TIAA, Schwab, HSBC, Delta, McDonald's, and Metlife, among others (as shown in the table below). BleepingComputer has contacted multiple companies and will update this article when additional information is available. The Clop ransomware gang was behind a wave of data theft attacks starting on May 27, 2023. These attacks leveraged a zero-day security flaw in the MOVEit Transfer secure file transfer platform, a managed file transfer (MFT) solution used in enterprise environments to securely transfer files between business partners and customers. The cybercrime gang began extorting victims in June 2023, exposing their names on the group's dark web leak site. The fallout from these attacks impacted hundreds of organizations worldwide, with tens of millions of people having their data stolen and used in extortion schemes or leaked online since then Multiple U.S. federal agencies and two U.S. Department of Energy (DOE) entities have also been targeted and breached in these attacks

Daily Brief Summary

DATA BREACH // Amazon Employee Data Exposed Due to Third-party Vendor Hack

Amazon confirmed a data breach involving over 2.8 million lines of Amazon employee data after a vendor hack.

The leaked data includes employee names, contact information, and building locations but not sensitive data like Social Security numbers.

The breach was a result of a security event at a property management vendor used by Amazon; the vendor has since patched the exploited security vulnerability.

Nam3L3ss, the threat actor responsible, claims to have obtained the data from the MOVEit data theft attacks, among other sources.

Nam3L3ss also markets data from other major corporations, harvested from various exposed internet resources.

The Clop ransomware gang initiated the MOVEit attacks, leveraging a zero-day flaw in the MOVEit Transfer platform, affecting many global organizations.

This security incident has broader implications, impacting multiple other companies and exposing tens of millions of personal data pieces.