{"id":84517,"date":"2024-07-21T03:47:07","date_gmt":"2024-07-21T07:47:07","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=84517"},"modified":"2024-07-21T03:47:10","modified_gmt":"2024-07-21T07:47:10","slug":"fractal-id-breach-links-to-2022-password-hack","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/fractal-id-breach-links-to-2022-password-hack\/","title":{"rendered":"Fractal ID Breach Links to 2022 Password Hack"},"content":{"rendered":"\n<p>Fractal ID's postmortem reveals a July 14 data breach traced to a reused password from a 2022 incident, swiftly mitigated by system monitoring.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/07\/0x0-1024x1024.png\" alt=\"Fractal ID Breach Links to 2022 Password Hack\" class=\"wp-image-84519\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/07\/0x0-1024x1024.png 1024w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/07\/0x0-300x300.png 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/07\/0x0-150x150.png 150w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/07\/0x0-768x768.png 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/07\/0x0-860x860.png 860w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/07\/0x0.png 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Fractal ID Breach Links to 2022 Password Hack<\/figcaption><\/figure>\n\n\n\n<p>Fractal ID, a <a href=\"https:\/\/coinscreed.com\/staging\/blockchain-security-firm-certik-moves-services-to-alibaba-cloud.html\" target=\"_blank\" rel=\"noreferrer noopener\">blockchain identity platform<\/a>, released a postmortem delineating the data breach on July 14. The breach has been traced back to a 2022 incident in which an employee reused a compromised password.<\/p>\n\n\n\n<p>The compromised account belonged to an operator who had been using the platform for three years and had administrator rights, according to Fractal ID.<\/p>\n\n\n\n<p>This enabled the perpetrator to circumvent internal data privacy systems; however, system monitoring was able to prevent the attacker from gaining access within 29 minutes.<\/p>\n\n\n\n<p>The breach was facilitated by the operator's failure to adhere to operational security policies, undergo training, and reuse credentials from previous attacks.<\/p>\n\n\n\n<p>The crypto identity verification provider identified peculiar activity in one of its back offices on July 14, 2024. This activity was promptly recognized as a malevolent attack, resulting in data exfiltration for approximately 0.5% of its user base.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" width=\"1011\" height=\"1024\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/07\/937df2f7-d19c-4b19-9520-569e1908855e-1011x1024.webp\" alt=\"\" class=\"wp-image-84518\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/07\/937df2f7-d19c-4b19-9520-569e1908855e-1011x1024.webp 1011w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/07\/937df2f7-d19c-4b19-9520-569e1908855e-296x300.webp 296w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/07\/937df2f7-d19c-4b19-9520-569e1908855e-768x778.webp 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/07\/937df2f7-d19c-4b19-9520-569e1908855e-860x871.webp 860w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/07\/937df2f7-d19c-4b19-9520-569e1908855e.webp 1100w\" sizes=\"(max-width: 1011px) 100vw, 1011px\" \/><\/figure>\n\n\n\n<p>Nevertheless, Fractal ID identified in the postmortem report that it disabled all accounts in the compromised system as a response and restricted access to senior employees.<\/p>\n\n\n\n<p>The company also prioritized improving its security measures to prevent future incidents. This included the implementation of request throttling, finer-grained authorization, tighter surveillance of failed authentication attempts, and stricter IP control.<\/p>\n\n\n\n<p>In addition to its internal initiatives, Fractal ID contacted the relevant data protection authorities and the cybercrime police division in Berlin. The company has also contracted cybersecurity services to monitor for the potential distribution of stolen data on known <a href=\"https:\/\/coinscreed.com\/staging\/bitfinex-cto-confirms-data-breach-claims-as-false.html\" target=\"_blank\" rel=\"noreferrer noopener\">data breach sites<\/a>.<\/p>\n\n\n\n<p>According to the report, the stolen data, which impacted approximately 6,300 users, encompasses a range of information, including proof-of-personhood checks and comprehensive KYC checks.<\/p>\n\n\n\n<p>This information may encompass names, email addresses, phone numbers, wallet addresses, physical addresses, and images of uploaded documents. Fractal ID also reached out to the affected users directly to notify them of the breach.<\/p>\n\n\n\n<p>Julian, Julio, Lluis, and Anna, the <a href=\"https:\/\/cointelegraph.com\/news\/fractal-id-data-breach-2022-password-reuse#:~:text=Fractal%20ID%20co%2Dfounders%20Julian,commitment%20to%20protecting%20user%20data.\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">co-founders of Fractal ID<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a>, conveyed their regret for the incident and underscored their dedication to safeguarding user data. They reiterated the organization's objective of transitioning to a self-custody storage system in order to improve data security.<\/p>\n\n\n\n<p>This security breach serves as a stark reminder of the challenges associated with data protection. On June 27, Autix10, a provider of crypto IDs, disclosed that their online administrative logon credentials had been compromised. Nevertheless, it appears that the perpetrator did not acquire any customer data in this case.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fractal ID&#8217;s postmortem reveals a July 14 data breach traced to a reused password from a 2022 incident, swiftly mitigated by system monitoring. Fractal ID, a blockchain identity platform, released a postmortem delineating the data breach on July 14. The breach has been traced back to a 2022 incident in which an employee reused a [&hellip;]<\/p>\n","protected":false},"author":36,"featured_media":84519,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[21],"tags":[608,20693,20692],"class_list":["post-84517","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-608","tag-fractal-id","tag-password-hack"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/07\/0x0.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/84517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=84517"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/84517\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/84519"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=84517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=84517"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=84517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}