Feeds

Monster.com attack hits federal job search site

Collateral damage as Monster talks of previous assaults

Internet Security Threat Report 2014

Cybercrooks who raided Monster.com's database also pilfered the personal information of an estimated 146,000 from USAJobs, the US government's official job search site. Monster Worldwide is the technology provider for the USAJOBS website, so the recent attack on Monster.com's systems also exposed the contact information of USAJobs users, it emerged on Thursday.

Hackers used malware (Infostealer-Monstres) to gain unauthorized access to the Monster.com resume database and steal the contact information of job seekers. Compromised data included the name, address, telephone number, and email address of people who registered with the job seeking service. Neither Social Security nor credit card records are thought to have benn exposed by the recent attacks on Monster.com and USAJobs.

Monster Worldwide shut down a rogue server that was used by hackers to siphon off job seeker contact information, effectively closing the door after the horse had bolted. The compromised data has been used to craft targeted phishing attacks that sought to trick users into downloading malicious software or accepting jobs as "money mules" for phishing gangs.

The personal records of an estimated 1.3 million job seekers with resumes posted on Monster.com were hit by the attack. Users are urged to be wary.

The assault is far from an isolated incident, Monster WorldWide said on Wednesday. "As is the case with many companies that maintain large databases of information, Monster is from time to time subject to illegal attempts to extract information from its database. Despite ongoing analysis, the scope of this illegal activity is impossible to pinpoint," it said.

In a bid to restore confidence in its services, Monster Worldwide is introducing many measures to enhance security controls for its Web site. Site access policies and controls will be tightened up alongside closer monitoring of site traffic and the introduction of controls designed to protect job seeker contact information. ®

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.