Feeds

Monster.com suffers database breach deja vu

Millions (more) at risk

Top 5 reasons to deploy VMware with Tegile

For the second time in 18 months, employment search site Monster.com has lost a wealth of personal data belonging to millions of job seekers after its database was illegally accessed.

The Massachusetts-based website is warning all its customers that their names, birth dates, phone numbers, user IDs and passwords, email addresses, sex, and ethnicity have been pilfered. It strongly urges users to change their login credentials immediately and to be on the lookout for phishing emails. The breach prompted this warning from USAJobs, which looks to Monster to run its website.

The company has decided not to email or phone customers to warn them of the breach, spokeswoman Nikki Richardson said. The only warning is this undated advisory, which users will only know about if they happen to visit the company's website.

It's at least the third time Monster.com has put its users at risk after suffering a significant security breach. In August 2007, a Trojan-horse program used pilfered employer credentials to siphon resume data belonging to some 1.3 million people. Within days, many users started receiving targeted phishing attacks that tried to trick them into downloading malicious software or take jobs as money mules for online crime gangs.

The company made much fanfare about plans to improve security, but two months later, it was hit again when attackers hijacked some of its job listings and used them to infect visitors with malware.

"We take this very seriously," Richardson said of the latest breach. "We're devoted to continuing to put significant resources toward the protection of our database, and no company in our business can completely prevent unauthorized access to data. We believe Monster security measures are as or more robust than other sites in the industry."

People responsible for the breach were not able to access resumes, social security numbers, or personal financial data, Richardson said. The spokeswoman declined to say when or how the breach occurred and said it was still being investigated. She also declined to say how many users Monster has.

Over the past few years, personal information like that stored on Monster have become a hot commodity in the world of cyberfraud. It can be used in identity theft, phishing attacks, and spam campaigns. And because so many people (foolishly) use a single email address and password for multiple accounts, the data can be used to gain access to online banks and other sites across the internet.

Readers who believe they are being targeted as a result of Monster's latest monster flub are invited to contact your reporter using this link. Confidentiality assured (unlike Monster). ®

Beginner's guide to SSL certificates

More from The Register

next story
UK smart meters arrive in 2020. Hackers have ALREADY found a flaw
Energy summit bods warned of free energy bonanza
DRUPAL-OPCALYPSE! Devs say best assume your CMS is owned
SQLi hole was hit hard, fast, and before most admins knew it needed patching
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Mozilla releases geolocating WiFi sniffer for Android
As if the civilians who never change access point passwords will ever opt out of this one
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.