The main breach study reveals wide leaks of banking data, SSNS, and encryption switches star-news.press/wp


A new study revealed the extent of sensitive information that was leaked through ransom attacks and data violations, including major financial documents and encryption keys.
Main meals:
- Uneoccolical files such as financial documents and encryption switches are widely displayed in violations.
- The encryption switches are found in 18 % of accidents, which constitute serious security risks.
- Internet criminals mining hacked data such as data scientists, targeting high -value information.
The report, Published by Cyber Security Company Laboratory 1Analyzing more than 141 million records from 1,297 breach accidents.
Unlike most of the rating assessments that focus on organized data such as user names and passwords, LAB 1 analysis is aimed at unorganized files, and the type is often ignored but more harmful.
Violations include financial documents, encryption switches, e -mail archives and internal business records.
According to Lab 1 Robin Brattel CEO, the goal was to expose the hidden risks in daily files that rarely draw attention.
He said: “We have focused on the huge risks associated with non -structured files that often contain high -value information, such as encryption keys, customer account data or sensitive commercial contracts.”
The results are concerned. Financial documents appeared in 93 % of the studied breach accidents, representing 41 % of all the analyzes files.
It included nearly half of the banking data, and more than a third of the international bank account numbers.
In 82 % of cases, personal identification information or companies (PII), most of which arose from customer service reactions.
51 % of the accidents included emails containing US social security numbers.
Perhaps the most disturbing thing is to discover encryption keys in 18 % of violations.
These keys can be used to overcome ratification systems, giving attackers a strong advantage in future Internet interventions. The source code and internal textual programs were also leaked on a large scale, as they appeared in 17 % of the analyzed data collections.
The study confirms a shift in the tactics of the Internet criminals. Smooters work increasingly such as data scientists, or stolen data mining of high -value assets for use in fraud, identity theft, or ransom follow -up.
Bratil warned: “With the behavior of Internet criminals now like data scientists to discover these valuable ideas to calm electronic attacks and fraud, unorganized data cannot be ignored.”
16 billion records were leaked: The new Mega breach puts encryption users at risk
Last month, a massive data breach of more than 16 billion adopting login data from platforms such as Apple, Google, Facebook, Telegram and GitHub, according to CyberNews.
The violation is not among the largest registered people ever, one leakage, but rather a mixture of data collections collected through Infostealer’s malware, accreditation and unannounced abuse attacks since early 2024.
The researchers warned the leaked credentials – recently harvested – a severe threat to users, especially those in encryption, due to the inclusion of sensitive login details, cookies and symbols.
The data structure indicates that it was harvested by modern malware, making it much more dangerous than the recycled old leaks.
A single data collection linked to Telegram included 60 million records, while another, Borussia, had more than 455 million.
A lot of data is found in the unprecedented elasticsearch databases and object storage systems, which were briefly but long enough to copy it.
Although the exact source is still unclear, cybersecurity experts are suspected that criminal actors collected records.
Through such a huge category of credit papers, attackers now have tools for hunting, ransom, and unauthorized access to the encryption portfolios, especially for users who lack multiple agents.
https://cimg.co/wp-content/uploads/2025/07/29101122/1753783882-image-1753783372925_optimized.jpg
2025-07-29 12:00:00