15 September, 2016

ClixSense Hacked Exposed 6.6Million Passwords in Plaintext

ClixSense Hacked Exposed 6.6Million Passwords in Plaintext

One of the best site who pays users for viewing the ads, complete survey, suffers from massive data breach.
The data breach has exposed plaintext passwords, usernames, email addresses, banking information, first name, last name, payment history,  ip address, Home address and all others personal information  of more than 6.6 Million ClixSense users.
Hacker already posted more than 2.2 Million people's  personal and sensitive data on PasteBin over the weekend. And the remaining 4.4 Million account put for sale. The PasteBin Paste has been removed by PasteBin. The
Tory Hunt Operator of Have I Been Pwned ? breach notification service said he reviewed the file and verified the authenticity of the data taken from ClixSense.
After getting access to database hacker copied almost all data of users and ran SQL code to change account names to "hacked account," deleted several forum posts, as well as set account balances of users to $0.00.
Reaction from ClixSense
ClixSense admitted  the data breach and  the Owner of ClixSense - Jim Grago Admitted that the database of ClixSense contained roughly 6.6 Million account and the company became aware about data breach, while talking with Ars Technica.
Not only data breach he admitted that all the ClixSense domain and email had been compromised.
I am User of ClixSense, What can I do To Be Safe?
ClixSense issued a mandatory password reset for all users shortly after the trouble began. We can suggest you to change your password, security question as much fast as you can. You should change passwords of all  service if you used same password. Actually the data breached because of ClixSense's fault you won't be completely secure till they find and fix the way, from that hacker leaked data.

Subscribe by Email

Follow Updates Articles from This Blog via Email

3 Comments

avatar
This comment has been removed by a blog administrator.
avatar
This comment has been removed by a blog administrator.