(In) Secure Digest: Netflix Leak, McDonald's Scammers, Rodents vs.Tokens

As per tradition, in the beginning of new month we are sharing with you the most notable Information Security incidents. In August, we had the following events: a nightmare for League of Legends fans, the largest leak in US history, and another Microsoft outage. 

Premature premiere

What happened: future Netflix novelties leaked online due to an attack on the contractor.

How it happened: on 9 August, episodes of Netflix anime and animated series that had not yet been released began to appear on social networks and on thematic forums. Among them: Arcane, Terminator Zero, Dandadan, Ranma ½ and others.

Netflix was quick to respond to the leak, saying that ‘hackers attacked one of our post-production partners.’ This is also confirmed by the low quality of the ‘leaked’ videos with ‘for work use’ watermarks.

The media giant tried to remove the leaked data from the network, and also posted a new story trailer of the most high-profile new product — the second season of the anime based on the League of Legends game — Arcane, to calm the hype. But it didn’t help, millions of fans waiting for the second season have already seen major plot spoilers.

Drive your dream, but don’t forget about InfoSecurity

What happened: Toyota’s US division fell victim to a cyberattack.

How it happened: 240 GB of data from Toyota’s California division appeared on a hacker forum on 16 August. Among the leaked information were employee and customer data, internal documents and databases, logins and passwords from admin accounts in plain text.

Notably, the attackers are not selling the data, but giving it away for free. This may suggest that the attack was an act of ‘hacktivism’.

Toyota confirmed the leak and assured that the incident was limited and the company has already launched an investigation. However, a few days after this statement, the leaked admin accounts were valid and still working.

To enter past the butler

What happened: hackers caused a major disruption in Indian banking apps.

How it happened: attackers attacked C-Edge Technologies, a major service provider. Because of this, mobile banking apps did not work almost all over India on 1 August.

The incident was investigated by Juniper Networks specialists. According to them, C-Edge Technologies was hacked because of a misconfigured Jenkins server. This is an automated system for testing and delivering mobile application modules.

The attackers started by sending a POST request to the server in an attempt to execute a malicious command. This succeeded, and the criminals gained a foothold on the server, accessed other company systems, and then injected the ransomware.

Notably, in addition to Jenkins being incorrectly configured, one of its parts incorrectly handled POST requests, the server itself had not been updated to the current version. This made it possible to exploit the critical vulnerability CVE-2024–23897 (CVSS score: 9.8/10) and conduct the attack.

Cold revenge from warm Italy

What happened: a former contractor attacked the crypto platform Holograph.

How it happened: Holograph is an omnichain tokenization protocol, enabling asset issuers to mint natively composable omnichain tokens. Hackers exploited a vulnerability in its system and used a proxy wallet to generate 1bn Holograph tokens — HLG.

The total value of the generated tokens was approximately $15 million. Due to such ‘cryptoinflation’ the value of HLG tokens fell from $0.014 to $0.0029 in a few hours.

After the incident, an international investigation was launched and the suspects were arrested on the territory of Italy. Their names were not disclosed, but it turned out that the organiser of the attack was a ‘disgruntled former contractor’, who understood the workings of the Holograph protocol.

PII Wars: Attack of the clones

What happened: 2.7 billion Americans’ data records were exposed.

How it happened: On 6 August, a hacker forum shared a post with the personal information of 2.7 billion Americans. It contained names, social security numbers, emails, and possible aliases of those affected.

Researchers believe that the alleged source of the leak is a company called National Public Data. It collects citizens’ personal data, and then for a fee provides access to them for criminal record checks and private investigators.

According to media reports, a dump with similar data was already sold on the same hacker forum this year in spring. Back then, another hacker claimed to have hacked National Public Data and obtained the personal data of US, UK and Canadian citizens.

After the initial leak, different hackers published partial copies of the data dump, with each copy containing a different number of records, and in some cases differing in the data itself. The latest and most complete version of the data dump appeared on 6 August.

So far, the exact authenticity of the leaked “clones” has not been identified. But it turned out that National Public Data collected Americans’ data without their consent from non-public sources. As a result, the company was indicted.

Six months together, already like family

What happened: Kootenai Health, a major US healthcare provider, fell victim to hackers.

How it happened: Attackers infiltrated the company’s infrastructure using ransomware. They then encrypted files and leaked customer and employee PII including: age, passport information, social security number, driver’s licence and medical records.

According to the researchers, the attackers infiltrated the company back in February 2024, but the problem was not discovered until August 2024. As a result, about 500,000 people were affected by the leak.

Microsoft’s unexpected day off

What happened: there was a global outage of Microsoft services.

How it happened: on 30 July, many Microsoft services and applications were unavailable: Azure, Outlook, Minecraft, Entura and Microsoft Intune, etc. This disrupted many organisations: courts, utilities, banks and medical facilities around the world!

Microsoft has openly stated that the disruption was due to a DDoS attack, and that their security measures only amplified the scale of the attack rather than mitigating it. A previously unknown group of hacktivists claimed responsibility for the outage.

The company also said it had configured Azure Web Application Firewall, a means of defending against such attacks. It’s unclear why the global IT giant didn’t install a web application firewall earlier.

Cleaner than pure

What happened: Hackers remotely wiped data from the devices of students around the world.

How it happened: Attackers compromised Mobile Guardian, a developer of MDM systems for the education sector. It develops cross-platform software to filter traffic, monitor student activity, and remotely manage devices.

According to the company, there was a cyberattack on 4 August which resulted in hackers gaining access to Mobile Guardian’s platform. The capabilities gained were not used to steal data, but to delete it. For example, in Singapore, data was deleted from 13,000 devices, and it ended with the cancellation of a contract with the country’s Ministry of Education.

The company, alas, gave up: after the attack, it completely shut down its management servers, so users cannot log in to Mobile Guardian, and students are restricted from accessing their devices.

Beavers attack!

What happened: Nexera’s blockchain infrastructure was attacked by hackers.

How it happened: on 7 August, unknown attackers hacked into the system for managing Fundrs smart contracts using the BeaverTail malware. This is how they were able to steal 47 million Nexera infrastructure tokens — NXRA worth $1.76 million.

The attackers cashed out 15 million tokens worth $450,000, while the Nexera team managed to remove the other 32 million from circulation. After that, the company suspended trading of its tokens on decentralised exchanges and recommended other platforms to do the same. However, this led to an 86% drop in the token price.

l’m Not Lovin’ It

What happened: hackers stole nearly $700k from McDonald’s subscribers.

How it happened: a hacker group hacked into McDonald’s Instagram account and advertised a fraudulent cryptocurrency token there. It was called the same name as one of the company’s mascots, Grimace.

The advertisement did its job, and the capitalisation of the token instantly grew from a few thousand to $25 million. After that, the fraudsters sold their tokens, thus earning about $700 thousand in the cryptocurrency Solana (SOL). The value of the token itself fell to $65 thousand.

In the end, the company was able to return his account, but in the description of his profile for some time ‘hung’ gratitude from hackers for cryptocurrency. McDonald’s apologised to subscribers for the incident.

IS tip of the month: After a relaxed summer and vacation season, your data storage could be in disarray: what new critical data is there and where is it now? But what’s more important is who has access to it and can edit an important file without permission? The DCAP system will help you clean up your storage and prevent data misuse.

E-mail me when people leave their comments –

SearchInform is a 100% private company that develops risk management products being one of the industry leaders. More than 4,000 companies across 20+ countries are SearchInform clients. The development team has been creating search technologies for unstructured data since 1995 and started developing information security solutions in 2004. Today, the team has products and services for comprehensive protection against insider threats at all levels of corporate information systems.

You need to be a member of Global Risk Community to add comments!

Join Global Risk Community

Community Guidlines


GlobalRisk Community Guidelines

The purpose of the Global Risk Community is to foster business, networking, and educational exploration among members. We reserve the right to remove any content or to ban a participant who does not follow the spirit of our…

Read more…
Views: 69
Comments: 0

The quick start guide


Dear New Member,
We're super excited to have you as part of our community. Feel free to invite new people, participate in discussions, activities and share knowledge. 

Special Bonus for new member:

20% off the…

Read more…
Views: 353
Comments: 0

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead