Skip to content

A Threat Actor Claims to have Leaked the Data of Connext

💡This post is part of Free Post Friday! If you're not a paid subscriber to the platform, these are some of the details you would see if you were a paid subscriber!

💡 Subscribe to DarkWebInformer.com for Unmatched Cyber Threat Intelligence 💡

Why Subscribe? Let me do the work and save you time.

Stay ahead of cyber threats and safeguard your digital assets while enhancing your cybersecurity awareness with these exclusive subscriber-only features:

  • 📜
    Detailed Threat Posts: Stay updated on breaches, leaks, ransomware, DDoS attacks, and more.
  • 📡
    Exclusive Threat Feeds: Access the latest ransomware victim disclosures, breaches, leaks, and other critical updates. Approximately 100-150 alerts daily.
  • 🖼️
    High-Resolution Screenshots: All threat alerts include watermark-free, high-resolution images.
  • 🔗
    Direct Claim URLs: Instantly access claims with direct links for fast verification.

Click here to find out all of the exclusive benefits!


QUICK FACTS
🔗 DarkWebInformer.com - Cyber Threat Intelligence
📅 Date: 2025-01-24 09:11:39
🚨 Title: Alleged Database Leak of Connext
🛡️ Victim Country: USA
🏭 Victim Industry: Human Resources
🏢 Victim Organization: Connext
🌐 Victim Site: connextglobal.com
📜 Category: Data Breach
🔗 Claim: https://breachforums.st/Thread-DATABASE-BPO-ConnextGlobal-com-Employee-Database
🕵️‍♂️ Threat Actor: b0nd
🌍 Network: Openweb


WhiteIntel.io Data Leak Information

Country: Unknown Credentials: 19,618
Country: BR Credentials: 7,881
Country: US Credentials: 7,510
Country: ID Credentials: 6,538
Country: IN Credentials: 6,141
Country: TR Credentials: 4,537
Country: EG Credentials: 3,506
Fetching WhiteIntel.io Data...
Large datasets may take a moment...
This message will update automatically...

Description

The threat actor "b0nd" claims to have leaked the employee database of Connext, a company providing managed remote staffing services. The database reportedly contains the personally identifiable information (PII) of approximately 1,666 employees. The compromised data includes:

  • System Details: System ID, Employee ID, User Level
  • Personal Details: Last Name, Middle Name, First Name, Civil Status, Age, Gender
  • Contact Information: Address, Phone Number, Corporate Email, Emergency Contact
  • Work Information: Department, Immediate Supervisor, Position, Employee Type, Regularization Date, Separation Date, Schedule, Number of Hours to Work
  • Financial Information: Payroll Type, Biometric ID, SSS, TIN, PhilHealth, Pag-IBIG Number
  • Other Information: Educational Background, Client Name, Billability

The breach reportedly occurred in June 2024, and the data is available for download in the forum post.


Implications

For Connext:

  • Regulatory Breach: This incident may lead to legal consequences under U.S. data protection laws, including HIPAA if healthcare clients were involved.
  • Reputation Damage: Current and prospective clients may lose trust in the company’s ability to safeguard sensitive employee data.
  • Operational Risks: Leaked internal information could facilitate targeted attacks on the organization.

For Affected Employees:

  • Identity Theft: Employees’ PII could be used for fraudulent purposes.
  • Financial Risks: Access to payroll and tax information increases the likelihood of misuse.
  • Social Engineering: Employees may face phishing attempts and impersonation scams.

Recommendations

For Connext:

  • Incident Response:
    • Confirm the authenticity of the breach and notify affected employees.
    • Conduct a comprehensive review of IT infrastructure for vulnerabilities.
    • Collaborate with legal and data protection teams to handle regulatory requirements.
  • Preventative Measures:
    • Implement encryption for sensitive data storage and transfer.
    • Regularly conduct security audits and employee cybersecurity training.
    • Enhance authentication protocols, including multi-factor authentication (MFA).

For Employees:

  • Secure Accounts:
    • Change passwords and enable MFA on all online accounts.
  • Monitor for Fraud:
    • Regularly check credit reports and bank statements for suspicious activity.
  • Exercise Caution:
    • Avoid responding to unsolicited emails or calls requesting sensitive information.

Stay tuned to DarkWebInformer.com for updates on this and other cyber threat incidents.

Latest