Monster.com suffers database breach deja vu
Millions (more) at risk
For the second time in 18 months, employment search site Monster.com has lost a wealth of personal data belonging to millions of job seekers after its database was illegally accessed.
The Massachusetts-based website is warning all its customers that their names, birth dates, phone numbers, user IDs and passwords, email addresses, sex, and ethnicity have been pilfered. It strongly urges users to change their login credentials immediately and to be on the lookout for phishing emails. The breach prompted this warning from USAJobs, which looks to Monster to run its website.
The company has decided not to email or phone customers to warn them of the breach, spokeswoman Nikki Richardson said. The only warning is this undated advisory, which users will only know about if they happen to visit the company's website.
It's at least the third time Monster.com has put its users at risk after suffering a significant security breach. In August 2007, a Trojan-horse program used pilfered employer credentials to siphon resume data belonging to some 1.3 million people. Within days, many users started receiving targeted phishing attacks that tried to trick them into downloading malicious software or take jobs as money mules for online crime gangs.
"We take this very seriously," Richardson said of the latest breach. "We're devoted to continuing to put significant resources toward the protection of our database, and no company in our business can completely prevent unauthorized access to data. We believe Monster security measures are as or more robust than other sites in the industry."
People responsible for the breach were not able to access resumes, social security numbers, or personal financial data, Richardson said. The spokeswoman declined to say when or how the breach occurred and said it was still being investigated. She also declined to say how many users Monster has.
Over the past few years, personal information like that stored on Monster have become a hot commodity in the world of cyberfraud. It can be used in identity theft, phishing attacks, and spam campaigns. And because so many people (foolishly) use a single email address and password for multiple accounts, the data can be used to gain access to online banks and other sites across the internet.
Readers who believe they are being targeted as a result of Monster's latest monster flub are invited to contact your reporter using this link. Confidentiality assured (unlike Monster). ®
Sponsored: Network DDoS protection