GoPlus Emergency Alert: Adobe Allegedly Hacked, Data Breach Exposes 13 Million Users

MarketWhisper

Adobe駭客攻擊

GoPlus issued an emergency alert on April 3: Adobe is suspected to have been the target of a targeted attack, putting approximately 13,000,000 users’ data at risk of exposure. The incident was disclosed by International Cyber Digest, where a threat actor identified as “Mr. Raccoon” claimed to have infiltrated Adobe systems.

Supply-Chain Attack Path: From an Indian Outsourcer to Adobe’s Core Systems

Adobe供應鏈攻擊 (Source: CSN)

The entry point of this attack was not Adobe’s direct infrastructure, but rather a business process outsourcing (BPO) company in India that Adobe contracted. This is a typical supply-chain attack scenario. The attackers deployed a remote access trojan (RAT) on a computer of an employee at the BPO company via malicious emails to gain an initial foothold. After that, they used spear-phishing to target the employee’s supervisor, further expanding the scope of network control.

The deployed RAT can not only access documents on the target computer, but also activate the device’s network camera and intercept private communications transmitted via WhatsApp—providing deep access capabilities that far exceed typical office device intrusions. This path reveals systematic gaps in third-party vendors’ security controls when enterprises outsource core business processes.

The High Risk of Exposed Data: Full Disclosure of Support Ticket Data to HackerOne Zero-Day Submissions

The dataset suspected to have been leaked is especially sensitive in nature and includes multiple high-value types of information:

13,000,000 support tickets: includes customer names, email addresses, account details, and descriptions of technical issues—ideal material for precise phishing and identity theft

15,000 employee records: information about internal personnel at the company, which could be used for deeper social engineering attacks

All HackerOne bounty submission records: the most destructive portion—includes unpublished security vulnerabilities reported by security researchers; before patches are released, once these zero-day vulnerability details fall into the hands of malicious attackers, they will provide ready-made paths for follow-on attacks

Various internal documents: specific scope to be confirmed further

GoPlus User Safety Recommendations: Protective Measures to Take Immediately

In response to this incident, GoPlus advises users affected by Adobe services to take the following steps immediately: first, enable multi-factor authentication (2FA) to ensure that even if a password is leaked, it won’t directly lead to account takeover; second, change passwords for Adobe-related accounts to make sure they are not reused across multiple platforms; third, remain highly vigilant toward any calls or emails that claim to be “Adobe official customer support,” as leaked support ticket information could be used for highly targeted social-engineering scams.

GoPlus also reminds users to remember the “four don’ts” anti-phishing rule: don’t click on unknown links, don’t install software of unknown origin, don’t sign for unknown transactions, and don’t transfer money to unverified addresses.

Frequently Asked Questions

Has Adobe officially confirmed this data breach?

As of now, Adobe has not released any official statement confirming or denying this incident. The available information mainly comes from the threat actor’s own statements and the report from International Cyber Digest; Adobe’s official response or independent third-party verification is still pending. Users should take preventive measures before the information is clearly established.

Why is the leakage of HackerOne bounty submission records particularly dangerous?

HackerOne submission records include unpublished security vulnerabilities reported by security researchers in the bounty program. These are “zero-day vulnerabilities” in nature before Adobe completes remediation and releases patches. If they fall into the hands of malicious attackers, they could be used immediately for new attacks targeting Adobe products—putting individual and enterprise users who rely on Adobe software at direct risk.

How do supply-chain attacks bypass a company’s own security measures?

Supply-chain attacks infiltrate a target company’s outsourced vendors, bypassing the company’s own security boundaries. Even if Adobe’s own security measures are strict, if the contracted third-party BPO company’s security standards are not up to par, it can still become the attackers’ entry point. Security experts recommend conducting regular audits of all third-party vendors that have data access permissions and strictly limiting who can use bulk data export functionality.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Sanctioned Exchange Grinex Hit by $13.7M Hack; Blames Foreign Intelligence Services

Grinex, a sanctioned crypto-ruble exchange, has halted operations due to a cyberattack that stole over $13.74 million in USDT. The attack is believed to involve state-level actors aiming to destabilize Russia's financial system. Grinex is cooperating with law enforcement but has no timeline for resuming services.

Coinpedia2h ago

Figure Faces Short Seller Accusations Over Blockchain Integration Claims; FIGR Stock Down 53% From January Peak

Figure Technology Solutions faced allegations from Morpheus Research of overstating its blockchain technology use, resulting in a significant drop in share prices. Figure defended its operations, highlighting its digital asset features and strong performance metrics.

GateNews9h ago

Houston Crypto Fraudster Sentenced to 23 Years for $20M Meta-1 Coin Scam

Robert Dunlap, a Houston entrepreneur, was sentenced to 23 years in prison for a $20 million cryptocurrency fraud involving fake assets and deceptive practices, impacting over 1,000 victims. His case reflects a broader rise in crypto-related cybercrimes.

GateNews14h ago

SlowMist Warns of Active Phishing Attack Using Fake 'Harmony Voice' Software

SlowMist's security team has warned of a social engineering campaign targeting cryptocurrency users. Fraudsters are posing as project partners to trick users into downloading a malicious application disguised as a translation tool. Users are advised to verify software authenticity.

GateNews14h ago

Zonda Exchange CEO Blames Missing Founder for $336M in Lost Bitcoin

Zonda CEO Przemysław Kral has attributed the exchange's loss of access to 4,500 BTC, valued at $336 million, to missing founder Sylwester Suszek's failure to transfer private keys. Amid allegations of bankruptcy and intensified withdrawal requests, Kral insists Zonda remains solvent and will pursue legal action while searching for Suszek, who disappeared in 2022.

GateNews15h ago

Grinex Exchange Halts All Trading After $15M Cyberattack on Wallet Systems

Grinex, a Kyrgyz crypto exchange, suspended trading after a cyberattack resulting in losses of around $15 million. The advanced nature of the attack points to organized or state-level involvement. Grinex has reported the incident to authorities and is assessing the damage.

GateNews15h ago
Comment
0/400
No comments