logo
LexisNexis data breach exposes 364,000 personal records

LexisNexis data breach exposes 364,000 personal records

Techday NZ4 days ago

LexisNexis, a prominent global data analytics and legal intelligence provider, has confirmed a data breach impacting more than 364,000 individuals, raising significant concerns over the security of personal information held by data brokers. The breach, reportedly executed through a third-party platform used for software development, exposed a wide array of sensitive data, including names, dates of birth, phone numbers, addresses, email and postal details, driver's license numbers, and Social Security information.
The exposure of such comprehensive personal data has triggered alarm among both customers and cybersecurity experts. LexisNexis serves a varied clientele, ranging from law enforcement agencies to automotive manufacturers, which means the implications of the breach extend across numerous industries and organisations. The breadth and depth of the data held by LexisNexis amplify the potential fallout from the incident.
Andrew Costis, Engineering Manager of the Adversary Research Team at AttackIQ, commented on the breach, highlighting its origins and wider impact: "Legal AI and data analytics company LexisNexis has disclosed a data breach that has affected at least 364,000 people. An unknown hacker accessed customer data through a third-party platform that LexisNexis utilises for software development. The stolen data includes names, dates of birth, phone numbers, postal and email addresses, driver's license numbers, and Social Security information. Given the range of LexisNexis' customer base, which spans law enforcement agencies to vehicle manufacturers, the scope of individuals and organisations impacted is substantial."
Costis further stressed the critical importance of security for data brokers: "Protecting the information of its customers is a necessity for any successful company. However, for data brokers like LexisNexis, who profit from collecting and selling huge amounts of personal and financial customer data, the need for airtight security measures is exponentially greater. One breach can often set off a chain reaction of mistrust from their client base, putting not just the company at risk, but their massive stockpile of customer data as well. A recent example of this effect can be seen in the recent 23andMe breach and subsequent bankruptcy."
He called for more proactive defence strategies: "To protect valuable customer data, organisations must prioritise proactive defense, with a strong focus on threat detection and response. By utilising techniques like adversarial exposure validation, organisations can test their system's response to identify and address any vulnerabilities before they can be exploited."
Steve Cobb, Chief Information Security Officer at SecurityScorecard, added analysis on the risks associated with third-party platforms: "The breach at LexisNexis Risk Solutions, involving unauthorised access via GitHub and the exposure of over 360,000 individuals' personal data, highlights a critical blind spot in third-party risk management."
He pointed out the ongoing challenges LexisNexis faces with its data broker role: "LexisNexis has already faced scrutiny over data sharing relationships and has faced multiple lawsuits for its role as a data broker that collects and sells sensitive information. The immense volume of sensitive data that the company holds makes the integrity of every access point, including software development platforms, non-negotiable."
Cobb emphasised the importance of treating third-party platforms with the same security rigour as core systems: "Third-party platforms are high-value assets used by organisations that demand the same level of security oversight as any core system. When enterprises treat them as afterthoughts, they open the door to cascading risk. In today's ecosystem, third-party risk isn't an external issue, but an internal vulnerability. The future of cyber defence hinges on operationalising visibility and integrating supply chain detection and response into the heart of security operations."
LexisNexis has historically faced scrutiny over its data collection practices and the sharing of sensitive information. This latest breach may reinvigorate debate around the accountability of data brokers and the regulatory frameworks designed to protect individuals' privacy. As the volume and value of digital information continue to rise, the incident serves as a stark reminder of the responsibility data custodians bear to maintain the highest standards of security across all facets of their operations, including those managed by third-party suppliers.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Experts warn of surge in Google, Apple, Microsoft breaches
Experts warn of surge in Google, Apple, Microsoft breaches

Techday NZ

time3 days ago

  • Techday NZ

Experts warn of surge in Google, Apple, Microsoft breaches

Cybersecurity experts are raising alarm over a significant campaign targeting users through the Google Chrome Web Store, as well as the discovery of a vast database containing hundreds of millions of stolen log-in credentials. The recent developments underscore rising risks associated with browser extensions and the continuing vulnerabilities in digital identity platforms. "A Google Chrome Web Store campaign is using over 100 malicious browsers that mimic tools like VPNs, AI assistants, and crypto utilities to steal cookies and execute remote scripts secretly. Though Google has removed many extensions identified, some still remain on the Web Store," said Andrew Costis, Engineering Manager of the Adversary Research Team at AttackIQ. "The campaign relies on malvertising strategies to trick users into clicking buttons that link to malicious browser extensions. The extensions connect the victim to the threat actor's infrastructure, allowing information to be stolen, as well as modifying network traffic to deliver ads, perform redirections, or serve as a proxy. "With some of these extensions still active on the Chrome Web Store, it is essential that individuals and organizations take appropriate precautions. Knowledge is key -- users should only trust proven, reputable publishers and familiarize themselves with lure website domains. Additionally, organizations should implement adversarial exposure validation tools to ensure their security systems are tested against malicious browser campaigns." The campaign's persistence highlights the challenges facing platform operators like Google in completely eradicating malicious content from widely used app stores. With new extensions and techniques emerging regularly, the risk to end users remains ongoing. Meanwhile, cybersecurity concerns have been exacerbated by the discovery of a database containing an estimated 184 million records of stolen log-in credentials. The database reportedly contains detailed access information for popular services, including Apple, Microsoft, Google, Facebook, Instagram, Snapchat, as well as various banking, healthcare, and government platforms across numerous countries. "What's most noteworthy is how this breach highlights the immense value of centralized identity platforms like Google, Okta, Apple and Meta to attackers. With over 184 million records exposed, threat actors can now launch widespread account takeover attempts across countless SaaS applications and cloud services that rely on these providers for authentication," sid Cory Michal, Chief Security Officer at AppOmni. "This is not surprising. Databases like this are regularly bought, sold, and repackaged on dark web forums like BreachForums. Massive credential dumps are part of an ongoing black market where breached data is commoditized and often aggregated from multiple incidents over time. What's new isn't the existence of the data, but the scale, the recency of some credentials, and the targeting of identity providers that are widely used to access SaaS and cloud services—making this breach especially potent for enabling downstream account takeovers. "This breach calls attention to a bigger issue. We increasingly run our personal and professional lives through online platforms and SaaS products, yet our digital identities are still largely protected by outdated, vulnerable methods like usernames, passwords, and easily phishable MFA methods. As long as these remain the primary means of access, attackers will continue to exploit them at scale with infostealer malware and phishing. This highlights the urgent need for adoption of stronger, phishing-resistant authentication methods, continuous identity monitoring, and a shift toward identity-centric security models. "It also reinforces the need for organizations to adopt an identity-centric security posture and monitor for malicious activity even when logins appear legitimate. In today's SaaS driven environments, users and systems authenticate from anywhere, often using federated identity providers like Apple, Google, and Meta. This makes identity a primary control point for security." Both incidents reveal the critical need for vigilance and adaptation in security practices, as threat actors continue to exploit outdated habits and overlooked vulnerabilities with increasing effectiveness and reach.

Kurrent unveils open-source MCP Server for AI-driven databases
Kurrent unveils open-source MCP Server for AI-driven databases

Techday NZ

time3 days ago

  • Techday NZ

Kurrent unveils open-source MCP Server for AI-driven databases

Kurrent has released its open-source MCP Server for KurrentDB, enabling developers to interact with data in the KurrentDB database using natural language and AI agents rather than traditional coding methods. The Kurrent MCP Server offers new functionalities, allowing developers not only to query data but also to create, test, and debug projections directly through conversational commands. This feature is not available in other MCP server implementations, establishing a novel approach to database interaction by integrating AI-driven workflows into the database layer. Central to this release is the introduction of a self-correcting engine, which assists in automatically identifying and fixing logic errors during the prototyping phase. This reduces the need for manual debugging loops, streamlining the development process significantly for users building or modifying projections. The software is fully open-source and released under the MIT license, with documentation and a development roadmap available on GitHub. This permits both enterprise users and open-source contributors to adopt, customise, and improve the KurrentDB MCP Server without licensing restrictions. Kurrent MCP Server supports natural language prompts for tasks such as reading streams, listing streams within the database, building and updating projections, writing events to streams, and retrieving projection status for debugging. These capabilities aim to make the visual and analytical exploration of data more accessible and conversational for users with varying levels of technical expertise. The MCP Server is compatible with a broad range of frontier AI models, such as Claude, GPT-4, and Gemini. It can be integrated with popular IDEs and agent frameworks, including Cursor and Windsurf. This compatibility enables developers to leverage their preferred tools while reducing friction points typically associated with traditional database interactions. Addressing the new approach, Kirk Dunn, CEO of Kurrent, said, "Our new MCP Server makes it possible to use the main features of the KurrentDB database, like reading and writing events to streams and using projections, in a way that's as simple as having a conversation. The system's ability to test and fix itself reduces the need for debugging and increases reliability. Copilots and AI assistants become productive database partners rather than just code generators, seamlessly interfacing with KurrentDB." The server's key functions are designed to reduce development times for database tasks, enabling a focus on higher-value project work. Eight core capabilities are available, including Read_stream, List_streams, Build_projection, Create_projection, Update_projection, Test_projection, Write_events_to_stream, and Get_projections_status. Each of these responds directly to natural language instructions provided by the developer or AI agent. Kurrent has highlighted opportunities for the open source community to participate in the MCP Server's ongoing development. Developers can contribute code, report or tackle issues, and suggest new features through the project's GitHub repository and discussion forums. Comprehensive educational resources and installation guides are intended to help developers quickly integrate the MCP Server with KurrentDB for various use cases. Lokhesh Ujhoodha, Lead Architect at Kurrent, commented, "Before, database interactions required developers to master complex query languages, understand intricate data structures, and spend significant time debugging projections and data flows. Now, everything agentic can interface with KurrentDB through this MCP Server. We're not just connecting to today's AI tools, but we're positioning for a future where AI agents autonomously manage data workflows, make analytical decisions and create business insights with minimal human intervention." Kurrent emphasises that its MCP Server aims to remove barriers historically associated with database development by supporting conversational, agent-driven workflows. This aligns with broader trends towards AI-native infrastructure in enterprise environments, where human and algorithmic agents increasingly collaborate to deliver data-driven business outcomes.

LexisNexis data breach exposes 364,000 personal records
LexisNexis data breach exposes 364,000 personal records

Techday NZ

time4 days ago

  • Techday NZ

LexisNexis data breach exposes 364,000 personal records

LexisNexis, a prominent global data analytics and legal intelligence provider, has confirmed a data breach impacting more than 364,000 individuals, raising significant concerns over the security of personal information held by data brokers. The breach, reportedly executed through a third-party platform used for software development, exposed a wide array of sensitive data, including names, dates of birth, phone numbers, addresses, email and postal details, driver's license numbers, and Social Security information. The exposure of such comprehensive personal data has triggered alarm among both customers and cybersecurity experts. LexisNexis serves a varied clientele, ranging from law enforcement agencies to automotive manufacturers, which means the implications of the breach extend across numerous industries and organisations. The breadth and depth of the data held by LexisNexis amplify the potential fallout from the incident. Andrew Costis, Engineering Manager of the Adversary Research Team at AttackIQ, commented on the breach, highlighting its origins and wider impact: "Legal AI and data analytics company LexisNexis has disclosed a data breach that has affected at least 364,000 people. An unknown hacker accessed customer data through a third-party platform that LexisNexis utilises for software development. The stolen data includes names, dates of birth, phone numbers, postal and email addresses, driver's license numbers, and Social Security information. Given the range of LexisNexis' customer base, which spans law enforcement agencies to vehicle manufacturers, the scope of individuals and organisations impacted is substantial." Costis further stressed the critical importance of security for data brokers: "Protecting the information of its customers is a necessity for any successful company. However, for data brokers like LexisNexis, who profit from collecting and selling huge amounts of personal and financial customer data, the need for airtight security measures is exponentially greater. One breach can often set off a chain reaction of mistrust from their client base, putting not just the company at risk, but their massive stockpile of customer data as well. A recent example of this effect can be seen in the recent 23andMe breach and subsequent bankruptcy." He called for more proactive defence strategies: "To protect valuable customer data, organisations must prioritise proactive defense, with a strong focus on threat detection and response. By utilising techniques like adversarial exposure validation, organisations can test their system's response to identify and address any vulnerabilities before they can be exploited." Steve Cobb, Chief Information Security Officer at SecurityScorecard, added analysis on the risks associated with third-party platforms: "The breach at LexisNexis Risk Solutions, involving unauthorised access via GitHub and the exposure of over 360,000 individuals' personal data, highlights a critical blind spot in third-party risk management." He pointed out the ongoing challenges LexisNexis faces with its data broker role: "LexisNexis has already faced scrutiny over data sharing relationships and has faced multiple lawsuits for its role as a data broker that collects and sells sensitive information. The immense volume of sensitive data that the company holds makes the integrity of every access point, including software development platforms, non-negotiable." Cobb emphasised the importance of treating third-party platforms with the same security rigour as core systems: "Third-party platforms are high-value assets used by organisations that demand the same level of security oversight as any core system. When enterprises treat them as afterthoughts, they open the door to cascading risk. In today's ecosystem, third-party risk isn't an external issue, but an internal vulnerability. The future of cyber defence hinges on operationalising visibility and integrating supply chain detection and response into the heart of security operations." LexisNexis has historically faced scrutiny over its data collection practices and the sharing of sensitive information. This latest breach may reinvigorate debate around the accountability of data brokers and the regulatory frameworks designed to protect individuals' privacy. As the volume and value of digital information continue to rise, the incident serves as a stark reminder of the responsibility data custodians bear to maintain the highest standards of security across all facets of their operations, including those managed by third-party suppliers.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store