Zendesk helped Internet Archive secure account after hacker breached email system

Avatar

Customer service platform Zendesk said it worked with the Internet Archive to help resolve a breach that allowed a hacker to respond to emails on behalf of the platform. 

Over the weekend, a hacker used the Internet Archive’s account on Zendesk to respond to dozens of inquiries, telling Recorded Future News and others that they still had access to parts of the Internet Archive’s systems.

A spokesperson for Zendesk on Tuesday confirmed much of what the hacker said — noting that the Internet Archive had not secured its authentication tokens which allowed the hacker to have continued access.  

“It’s important to note that there is no evidence this was a Zendesk issue and that Zendesk did not experience a compromise of its platform,” the spokesperson said. “We have since worked together with Internet Archive to secure their account.”

Chris Freeland, director of library services at the Internet Archive, published a new message on Monday evening confirming that the hacker “sent emails to patrons by exploiting a 3rd party helpdesk system.”

Freeland said they are “relaunching services as defenses are strengthened.” 

“These efforts are focused on reinforcing firewall systems and further protecting the data stores,” he explained. 

The Internet Archive, responsible for the WayBack Machine and other internet preservation tools, said last week that it had been making progress on restoring many of its services after multiple cybersecurity incidents forced it offline. 

But over the weekend, the hacker emailed anyone who had contacted the organization, writing that it is “dispiriting to see that even after being made aware of the breach 2 weeks ago, [Internet Archive] has still not done the due diligence of rotating many of the API keys that were exposed in their gitlab secrets.” GitLab is a software development platform.

BleepingComputer claimed this weekend that it “repeatedly tried to warn the Internet Archive that their source code was stolen through a GitLab authentication token that was exposed online for almost two years.”

In his update on Monday, Freeland said archive.org had returned to service but only in read-only mode. Features like uploading, borrowing, reviewing items, interlibrary loan and other services are not yet available, he added. 

“Thank you for standing with the Internet Archive as we continue to fight back on behalf of all affected readers,” he added.

CybercrimeIndustryNewsNews BriefsTechnology
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans

Related Posts

CISA Adds ScienceLogic SL1 Vulnerability to Exploited Catalog After Active Zero-Day Attack

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting ScienceLogic SL1 to its Known Exploited Vulnerabilities (KEV) catalog, following reports of active exploitation as a zero-day. The vulnerability in question, tracked as CVE-2024-9537 (CVSS v4 score: 9.3), refers to a bug involving an unspecified third-party component that could
Avatar
Read More

Anatomy of an Attack

In today's rapidly evolving cyber threat landscape, organizations face increasingly sophisticated attacks targeting their applications. Understanding these threats and the technologies designed to combat them is crucial. This article delves into the mechanics of a common application attack, using the infamous Log4Shell vulnerability as an example, and demonstrates how Application Detection and
Avatar
Read More