EA data breach: Battlefield 2042 maker allegedly ignored security holes for months
Domain vulnerabilities left EA exposed to hackers
When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.
New details have come to light about the recentdata breach suffered by EAand the video game maker allegedly ignored warnings from security researchers that could have prevented hackers from gaining access to its systems.
Earlier this month it was revealed that EA fell victim to a data breach in which hackers were able to gain access to its corporate network and steal 780GB of source code, SDKs and other proprietary tools.
Now the Israeli cybersecurity firm Cyberpion has revealed toZDNetthat it reached out to EA last year to inform the company that several of itsdomainscould be subject to takeovers while others contained misconfigured DNS records.
According to Cyberpion co-founder Ori Engelberg who spoke with the news outlet, EA did nothing to address the issues the firm had discovered even after it sent over a detailed document containing more information on the vulnerabilities along with a proof of concept.
Domain vulnerabilities
A report published byMotherboarddays after the data breach came to light revealed that the hackers responsible usedstolen cookies and Slackto trick one of EA’s employees to provide a login to its corporate network.
However, before EA was even breached, Engelberg and his team reportedly tried to warn the company that at least six (now 10 according to Engelberg) vulnerabilities left multiple domains and other assets exposed online. While 15 EA sites served login pages over HTTP as opposed toHTTPSwhich is more secure, others containedDNSmisconfigurations that made them vulnerable.
While speaking withZDNet, Engelberg recommended that large organizations like EA should decommission unused subdomains and keep their certificates up to date in order to protect their networks from similar attacks.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
As Cyberpion told its side of the story toZDNet, so too did EA with a company spokesperson saying the cybersecurity firm approached them about being a potential vendor. However, according to the spokesperson, Cyberpion did not provide EA with a full list of vulnerabilities and was more concerned about arranging a sales meeting to “show of their techniques”. At the same time, the firm did not follow EA’sproduct security vulnerability disclosureprocess.
ViaZDNet
After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home.
This new phishing strategy utilizes GitHub comments to distribute malware
Should your VPN always be on?
Anker Nebula Mars 3 review: A powerful and truly portable projector