Categories: News

As a result of a leak from the QuickBit exchange, data of 300,000 users has been compromised

The Swedish QuickBit cryptocurrency exchange, recently added to the listing of the Nordic Growth Market, leaked data to 300,000 customers through an unprotected MongoDB database.

The exchange confirmed this information in a series of messages on its forum.
investor relations. The leak described in detail
Security researcher Paul Bischoff (Paul Bischoff), first discovered after the search engine Shodan noted the existence of an open database. QuickBit stated that an external contractor left the data unprotected while attempting to update the security system. The Bischoff report states:

“QuickBit recently introduced a third-party system to further validate customers. Due to the implementation of this system, it was located on a server that was visible outside the QuickBit firewall for several days and was thus accessible to a person who had the necessary tools to gain access. During the deployment period, approximately 2% of QuickBit clients had information about names, addresses, email addresses, and incomplete map information. ”

Bischoff wrote that the QuickBit team took action against the database on July 3, receiving a notice that it was open. The records contained the full names, addresses, email addresses, gender of the user and date of birth. QuickBit said that passwords or social security numbers, as well as cryptocurrency keys were not lost.

“In addition to these entries, we also found 143 entries with internal credentials, including merchants, private keys, names, passwords, secret phrases, user IDs, and other information,” writes Bischoff.

The company became public on July 11, and its market capitalization is about $ 22 million. In QuickBit noted:

“Data security is crucial for QuickBit. In the near future, we will publish an incident report on our website. ”

Recently it became known that the South Korean stock exchange Bithumb is trying to attract
accountable for not taking adequate measures to protect personal information that was subsequently used
hackers

Miners Hashrate

Recent Posts

Mining RTX 3070 at NiceHash: Overclocking, tuning, profitability, consumption

Mining on RTX 3070. Overclocking, tuning, profitability, consumption: If you are interested in finding more…

6 months ago

Mining GTX 1660, 1660 Ti, 1660 Super: Overclocking, settings, consumption

Mining with GTX 1660, 1660 Ti, 1660 Super. Overclocking, settings, consumption, profitability, comparisons - If…

6 months ago

Mining RTX 2070 and 2070 Super: Overclocking, profitability, consumption

Mining with RTX 2070 and 2070 Super. Overclocking, profitability, consumption, comparison What the RTX 2070…

6 months ago

Mining with RTX 3060, 3060 Ti. Limitations, overclocking, settings, consumption

Mining with RTX 3060, 3060 Ti. Limitations, overclocking, settings, consumption, profitability, comparison Let's look at…

6 months ago

Alphacool Eisblock Aurora Acryl GPX-A Sapphire – test: 2.8 GHz++ are not an issue

Alphacool Eisblock Aurora Acryl GPX-A (2022) with Sapphire Radeon RX 6950 XT Nitro+ Pure in…

6 months ago

Corporate Crypto Strategies 4.0: Leading with Bitcoin Expertise

In the ever-evolving landscape of business strategy, Bitcoin has emerged as a pivotal asset. With…

6 months ago

This website uses cookies.


Notice: ob_end_flush(): failed to send buffer of zlib output compression (1) in /home/gamefeve/bitcoinminershashrate.com/wp-includes/functions.php on line 5420

Notice: ob_end_flush(): failed to send buffer of zlib output compression (1) in /home/gamefeve/bitcoinminershashrate.com/wp-includes/functions.php on line 5420