Feeds

Monster.com attack hits federal job search site

Collateral damage as Monster talks of previous assaults

Protecting against web application threats using SSL

Cybercrooks who raided Monster.com's database also pilfered the personal information of an estimated 146,000 from USAJobs, the US government's official job search site. Monster Worldwide is the technology provider for the USAJOBS website, so the recent attack on Monster.com's systems also exposed the contact information of USAJobs users, it emerged on Thursday.

Hackers used malware (Infostealer-Monstres) to gain unauthorized access to the Monster.com resume database and steal the contact information of job seekers. Compromised data included the name, address, telephone number, and email address of people who registered with the job seeking service. Neither Social Security nor credit card records are thought to have benn exposed by the recent attacks on Monster.com and USAJobs.

Monster Worldwide shut down a rogue server that was used by hackers to siphon off job seeker contact information, effectively closing the door after the horse had bolted. The compromised data has been used to craft targeted phishing attacks that sought to trick users into downloading malicious software or accepting jobs as "money mules" for phishing gangs.

The personal records of an estimated 1.3 million job seekers with resumes posted on Monster.com were hit by the attack. Users are urged to be wary.

The assault is far from an isolated incident, Monster WorldWide said on Wednesday. "As is the case with many companies that maintain large databases of information, Monster is from time to time subject to illegal attempts to extract information from its database. Despite ongoing analysis, the scope of this illegal activity is impossible to pinpoint," it said.

In a bid to restore confidence in its services, Monster Worldwide is introducing many measures to enhance security controls for its Web site. Site access policies and controls will be tightened up alongside closer monitoring of site traffic and the introduction of controls designed to protect job seeker contact information. ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.