Event JSON
{
"id": "67f5e1d8e8cd4530ea345f3a2b478d475c5d4a5b6d2ac9d980e40b2a6d3436ed",
"pubkey": "331c4aa1ff9c0b89d2071ca78d1b6aeb532e6d7f88d19b51d36e03b5c2f0b17f",
"created_at": 1715705713,
"kind": 1,
"tags": [
[
"proxy",
"https://infosec.exchange/@lorenzofb/112440489650446461",
"web"
],
[
"proxy",
"https://infosec.exchange/users/lorenzofb/statuses/112440489650446461",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://infosec.exchange/users/lorenzofb/statuses/112440489650446461",
"pink.momostr"
]
],
"content": "SCOOP: There's another Dell breach.\n\nThe same threat actor who said he scraped 49M customer records told me that he has now scraped data of around 30,000 customers (and counting), abusing a new flaw in a different Dell portal.\n\nData includes customer phone numbers, user-uploaded photos, computer logs, and, in some cases, GPS location coming from the EXIF data on those photos.\n\nhttps://techcrunch.com/2024/05/14/threat-actor-scraped-dell-support-tickets-including-customer-phone-numbers/",
"sig": "1c4993f299d51e54345e77a8ea872b2bbe1b2716d363932d2175a6ee799198fc26c6065ae39cb5de78f171b68c59b0456073ad66a7b8ed3062080373b9ff67ef"
}