Globant is the newest Lapsus$ victim, stealing over 70GB of their data

Globant Lapsus$ Threat Group Data Theft 70GB Source Code Data Breach CyberCrime

Another data breach incident performed by the Lapsus$ threat group was discovered by the researchers recently, wherein sensitive administrator data and source code of an IT and software company Globant get leaked by the threat actors.

About 70GB of Globant’s data was reportedly included in the leak made by Lapsus$, claiming that the released archive was the firm’s customer source code.

Globant is an Argentinian IT and software consultancy company that employs more than 16,000 employees globally. The IT firm serves various large entities such as Autodesk, Electronic Arts, Royal Caribbean, and more.

The IT firm confirmed the data breach news in a press release, stating that an unauthorised group had been detected accessing a fraction of their company’s source code. Included in the leaked archive by Lapsus$ is Globant’s file directory that holds folders of their customers and some of their information, such as Abbott, Facebook, DHL, and more.

After publishing the customer archive data, Lapsus$ then posted a set of credentials for giving admin access to platforms significant to Globant’s development, review, and collaboration for their customers’ code, such as Jira, Confluence, and GitHub.

 

The third release of the leak by Lapsus$ is a 70GB torrent file worth of stolen data from the IT firm Globant.

 

The firm explained that the intruders had accessed their systems and stolen some source code and documentation for a few of their customers. These stolen data, according to researchers, are sensitive customer information and code repositories, consisting of private keys like web server SSL certificates and API keys.

Globant also added that there was no evidence of a compromise with other parts of their system upon probing the incident.

Lapsus$ has recently been making it into headlines after the successive data breach attacks against large firms, including Nvidia, Samsung, Okta, and Microsoft.

Experts were surprised after learning that the actors behind the group have mostly consisted of teenagers that exercised their hacking skills to make a name in the cybercrime landscape. Nonetheless, the full identification of the group remains unclear while authorities work harder to locate and obstruct the group’s criminal activities.

About the author

Leave a Reply