Job-Seeker Data Exposed in Monster File Leak
The job website says it cannot notify users since the exposure occurred on a third-party organization's servers.
An unprotected Web server has been offering information on Monster.com users for some time — and neither Monster nor the third party it says purchased the data has notified the victims.
According to reports, private information on job seekers using the site from 2014 through 2017 exposed includes phone numbers, home addresses, email addresses, and prior work experience. No financial information was included.
"The personally identifiable information typically found on a résumé can lead to account hijacking and highly targeted phishing attacks if it falls into the wrong hands," Vinay Sridhara, CTO of Balbix, told SiliconANGLE. "In fact, a threat actor can have password reset codes sent to a compromised phone number or email for far more sensitive accounts – both personal and professional."
Monster has said it cannot notify users since the exposure occurred on a third-party organization's servers — an unnamed third party with which Monster says it no longer does business. According to Monster, the server was secured after it was notified of the situation.
Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "8 Ways To Spot an Insider Threat."
About the Author
You May Also Like
The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response
Nov 20, 2024Safeguarding GitHub Data to Fuel Web Innovation
Nov 21, 2024