TenCent Users Hacked by Fenice

12810213660?profile=RESIZE_400xA massive data leak exposed 1.4 billion Tencent user accounts. The data includes emails, phone numbers, and QQ IDs potentially linked to the “Mother of All Breaches” (MOAB).

A threat actor named “Fenice” has leaked 1.4 billion user accounts, which they claim belong to Tencent (Tencent.com), a Chinese internet giant and technology company.

Tencent is widely recognized for its diverse services, including social networks, music streaming, web portals, e-commerce, mobile games, internet services, payment systems, smartphones, and multiplayer online games.   It is worth noting that Fenice is the same threat actor who, on 6 August 2024, leaked the personal data of 3 billion users breached from the background lookup platform National Public Data.  This data included plain-text social security numbers (SSNs).[1]

The Hackread.com research team suspects this database originates from the “Mother of All Breaches” (MOAB), a massive data leak uncovered by cybersecurity researcher Bob Diachenko in January 2024.  MOAB comprises over 26 billion records from 4,144 breaches, spanning 3,876 domains.

12810215295?profile=RESIZE_400xThese domains include well-known sites like LinkedIn, MySpace, Twitter, and Adobe, as well as various government organizations and public bodies. Tencent has 1.5 billion accounts, Weibo has 504 million accounts, and Badoo has 127 million accounts.

What’s in the data?  According to the hacker, Tencent data includes 1.4 billion records, containing 44GB in compressed form and expanding to 500GB when uncompressed.  

The data is in JSON format and contains fields such as email, mobile numbers, and QQ IDs.  Timestamps and storage paths suggest that this data was processed on 9 May 2023.

 


12810216264?profile=RESIZE_710xThreat actor on Breach Forums and the data analyzed by Hackread.com research team (Screenshot: Hackread.com)

.gz file[2]

Implications - The implications of this leak are significant, particularly due to the nature and volume of the data involved.  Here’s a detailed analysis of the potential consequences:

  1. Privacy Violations: Exposure of Personal Information: The leak includes sensitive personal information such as email addresses, phone numbers, and QQ IDs. This data could be exploited by malicious actors to invade users’ privacy, leading to identity theft, unauthorized access to other accounts, or targeted harassment.

Increased Vulnerability to Phishing and Scams: The availability of both email addresses and phone numbers makes it easier for cybercriminals to craft convincing phishing emails or text messages, potentially tricking users into revealing further sensitive information or installing malware.

  1. Reputational Damage: Tencent’s Trustworthiness: Tencent, being a major tech company, relies heavily on user trust. A data breach of this magnitude could severely damage its reputation, leading to a loss of user confidence in the company’s ability to protect its information.

Impact on Business Partnerships: The leak might also affect Tencent’s relationships with other companies and governments, as partners may reconsider the security of collaborations involving Tencent’s platforms.

  1. Financial Impact: Costs of Mitigation and Legal Penalties: Tencent might face substantial costs related to mitigating the breach, including enhancing security measures, providing support to affected users, and potentially paying legal fines, especially if the breach violates data protection regulations like the GDPR(if any European users are involved).

Potential for Class-Action Lawsuits: If a large number of users are affected, Tencent could face class-action lawsuits, further increasing the financial burden.

  1. Regulatory Scrutiny: Government Investigations: Regulatory bodies in China and other countries may launch investigations into the breach, potentially leading to stricter oversight and additional compliance requirements for Tencent.

Strengthening of Data Protection Laws: This breach might prompt governments to revisit and strengthen data protection laws, increasing the regulatory burden on companies like Tencent to ensure the security of user data.

  1. Increased Cybersecurity Risks: Secondary Attacks: The data from this breach could be used in secondary cyberattacks. For instance, cybercriminals could leverage email addresses and phone numbers to perform brute-force attacks on other services, assuming users might reuse passwords across platforms.

Underground Market Exploitation: The leaked data could be sold on the dark web, where it could be used by other criminals for various malicious purposes, further amplifying the damage to the affected individuals.

  1. Impact on Users: Loss of Security for Affected Users: Users whose data has been exposed may need immediate action to secure their accounts, change passwords, and monitor their accounts for suspicious activity.

Psychological Impact: Knowing that personal information has been exposed can cause significant stress and anxiety for the affected individuals.

  1. Potential for Broader Cybersecurity Awareness: Increased Public Awareness: High-profile breaches like this can raise awareness about cybersecurity among the general public, leading to better personal security practices and more demand for secure digital services.

 

This article is shared at no charge and is for educational and informational purposes only.

We want to thank HackRead again for this report.  Red Sky Alliance provides Cyber Threat Analysis and Intelligence Services for our clients.  We provide valuable indicators of compromised information via a notification service (RedXray) or an analysis service (CTAC).  For questions, comments, or assistance, please get in touch with the office directly at 1-844-492-7225 or feedback@redskyalliance.com    

Weekly Cyber Intelligence Briefings:
REDSHORTS - Weekly Cyber Intelligence Briefings
https://register.gotowebinar.com/register/5378972949933166424

 

[1] https://hackread.com/hackers-leak-1-4-billion-tencent-user-accounts-online/

[2] https://www.makeuseof.com/what-is-gz-file/#:~:text=A%20GZ%20file%20is%20an%20archive%20compressed%20using

E-mail me when people leave their comments –

You need to be a member of Red Sky Alliance to add comments!