• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Cyber Security Solutions, Compliance, and Consulting Services - IT Security

We offer It security management, data, network, & Information security services for protecting information & mitigating security risks to your organization.

  • Home
  • About Us
  • Solutions & Services
    • Security Governance
    • NETWORK SECURITY
    • CLOUD SECURITY
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

11 million stolen records of French users put up for sale online

By Robert Roohparvar | At March 27, 2021

March 27, 2021

11 million stolen records of French users put up for sale online

News of stolen data online is nothing new: it has been happening ever since users started connecting to the web and data leaks are actually a major issue in cybersecurity.

Recently, a user on a popular hacking platform claimed to possess 11 million French user records stolen from Apollo, a US-based digital marketing agency. The records have allegedly been put up for sale online and this puts the Apollo users as well as their employers at risk of phishing and cybersecurity attacks. The records include facets of information (mostly professional) about 10,930,000 French users whose data includes their full names, personal and professional email addresses, location coordinates of users and employers, social media profiles, phone numbers, workplace information including current and past employment positions, LinkedIn profiles, and more.

The hacker did not specify how they infiltrated Apollo’s database or whether they are in possession of just the French records or also data from a previous data breach at Apollo. 

Apollo is a digital marketing platform and software company that helps businesses identify and analyze new prospects for marketing purposes. The company is based in San Francisco and according to them, regular security audits and intrusion detection is conducted online to ensure maximum security. But back in 2018, threat actors had breached a database containing 200 million user records. When asked whether they could confirm the breach, Apollo had no comment ro make.

This security leak and exposure of sensitive information means that the data can be used in a variety of ways against the users and their employers:

  • Conducting phishing attacks.
  • Spamming the 11 million emails and phone numbers that were stolen.
  • Brute-forcing passwords of LinkedIn profiles and email addresses.
  • Attempting to break into professional email addresses in order to sabotage the corporate networks of users and their employers.

While the data does not seem to contain deeply sensitive information like social security numbers or credit card details, even email addresses are enough for a threat actor to wreak major havoc. Hackers who are particularly adept and determined can manage to combine information from stolen data from other platforms and breacges to put together a more comprehensive profile of victims – social engineering attacks, phishing, and even identity theft can come into play here.

If you happen to be in France and you are afraid that your data might be one of those that was stolen, here are a few steps you can take:

  • Change the passwords to your personal and professional email addresses and LinkedIn account.
  • Visit Apollo’s personal data removal page and submit an application to have your data or profile removed.
  • Enable two-factor authentication (2FA) on all your online accounts.
  • Don’t click on anything suspicious on the internet or in your email and don’t respond to anyone you don’t know.
  • Beware of phishing emails.
  • Use a password manager to create strong passwords for your accounts and secure them safely.

Remember, your security is important and your data is personal and no unauthorised person has the right to access it.

Filed Under: Cyber security news

Primary Sidebar

Archives

  • [+]Cloud security (12)
  • [+]Compliance (14)
  • [—]Cyber security news (96)
    • 03 security concerns for low-code and no-code development
    • 04 ways to improve your security posture in 2020
    • 05 ways malware can bypass endpoint protection
    • 11 million stolen records of French users put up for sale online
    • 2 Million Patients’ Data Compromised in Cyber Attack on Shields Healthcare Group
    • 2020: The year that cybersecurity went from reactive to proactive
    • 3 Huge Cyberattacks Show the True Extent of Cyber Crime
    • 30% of SMEs have no data security, says study
    • 4 Cybersecurity trends in 2019
    • 4 Reasons why website security is important
    • 40 Million User Records from Largest Commercial Bank in Ukraine Sold Online
    • 5 Methods to Make Customer Experience Safer
    • 95% of websites risk operating on outdated software with known vulnerabilities
    • All About Data Repository
    • America’s small businesses aren’t ready for a cyberattack
    • Attacker’s phish Office 365 users with fake voicemail messages
    • Attackers impersonate Zoom to steal Microsoft account credentials
    • Can We Rely On Cyber Insurance?
    • Changing Trends in Cybersecurity Training
    • Colonial Pipeline Forced to Pay $4.4m After Ransomware Attack
    • Common types of cybersecurity threats
    • Consumers Must Prioritize Safety Over Convenience
    • Coronavirus Used to Spread Malware
    • Cyber Crime is a Threat to the Energy Sector; Here’s Why
    • Cybercrime economy is worth $1.5 trillion in illegal profits: study
    • Cybercriminals are Capitalizing on Covid Vaccines to Launch Attacks
    • Cybercriminals are Resorting to Automated Attack Tools
    • Cybercriminals: Threat or Menace?
    • Cybersecurity Challenges for Businesses in 2022
    • Cybersecurity challenges for small businesses
    • Cybersecurity in the Aviation Industry
    • Cybersecurity: Guiding Principles for Board of Directors
    • Data of 1.3 million users leaked in Clubhouse security breach
    • Facebook Messenger Users Fall Victim to Scamming Attacks in Over 80 Countries
    • Five experimental cybersecurity trends your business needs to know about
    • Four major data breaches 2018
    • Four significant changes coming to cybersecurity in 2020 and beyond
    • Hacker Tries to Poison Water Supply of Florida Town
    • Hackers are outpacing defenses, a new report finds
    • Hackers are using famous file sharing services to hack email accounts
    • History of Cybersecurity and Hacking
    • Hospitals are becoming smarter than ever. But so are cybercriminals
    • Hostinger suffers from data breach and resets password for 14 million users
    • How AI can help you stay ahead of cybersecurity threats
    • How does spyware work?
    • How to Check if Your Data Was Leaked in Facebook's Huge Hack
    • HP Printers Are Vulnerable to Hacking
    • Measures taken by WhatsApp to avoid spam
    • New Act Passed Towards Securing the DHS Software Supply Chain
    • North Korea has been targeting threat researchers
    • One in three organizations suffered data breaches due to mobile devices
    • Phishing in 2020: Another Problem for an Already Difficult Year
    • Predictions of Future Cybersecurity Trends in 2020 and Onwards
    • Property firm cyberattack leaves home movers in the lurch
    • Protect backup from ransomware attacks and recover safely
    • Protecting against the changing cybersecurity risk landscape
    • Qbot Banking Malware is back with a new version
    • Russia-linked gangs attack US critical infrastructure most often
    • Scammers Add an Extra Worry for Travelers Post-COVID
    • School Re-Openings Disturbed by Ransomware Attacks
    • Spyware Pegasus Hacked Thousands of iPhones Globally
    • Supply Chain Cyber Attacks See a Troubling Rise
    • Syniverse Quietly Reveals 5-Year Data Breach
    • The 4 biggest ransomware attacks of the last five years
    • The 6 Biggest Cyberattacks of 2020
    • The Biggest Recent Data Breach Might Have Cost $58 Billion to Resolve
    • The Correlation Between Cyber Insurance and Increasing Cyber Risk
    • The majority of ransomware attacks are targeted at the United States
    • The Next Big Threat: Human Killing Cyberattacks
    • The rise of cryptojacking
    • The shortcomings of centralized server architecture
    • The Top 5 Cyber Security Breaches of 2017
    • Threat or Opportunity? Big Data and Cyber Security
    • Three trends shaking up multi-factor authentication
    • Top Cyber Power Revealed With the US at the Top of the List
    • Top five cybersecurity predictions for 2019
    • Two in three businesses faced insider attacks in 2020
    • Two-factor authentication explained
    • Unsecure Server Compromises 350 Million Emails
    • US insurance company has customer data leaked on a forum
    • US-based auto parts distributor has sensitive data leaked by cybercriminals
    • Use of OSINT tools for security and their functions
    • What are the Cyber Risks Posed by the Metaverse?
    • What is Encryption and its common types
    • What is information security? Definition, principles, and policies
    • What is Magecart? How it works and how to prevent it?
    • What is Typosquatting and How to Stay Safe
    • What the G7 Summit Means for the Future of US-Russia Cybersecurity
    • Which Industries at Higher Risk of Cyber Attacks in 2021
    • Who is Most Vulnerable to Cybercrime: New Report Reveals Surprising Insights
    • Why 2021 Could Witness an Outbreak of Ransomware Attacks
    • Why Cybersecurity Has to Be a CEO Level Matter
    • Why Do Cybercriminals Target Charities?
    • Why You Should be Concerned About How Phishing Attacks are Evolving
    • Will 5G improve mobile security?
    • World’s largest data breaches
  • [+]Cyber security threats (212)
  • [+]Cyber security tips (202)
  • [+]E-Commerce cyber security (3)
  • [+]Enterprise cyber security (2)
  • [+]Financial organizations cyber security (2)
  • [+]General (26)
  • [+]Government cyber security (2)
  • [+]Healthcare cyber security (4)
  • [+]Law Firms Cyber Security (3)
  • [+]Network security (3)
  • [+]Newsletter (1)
  • [+]Ransomware (6)
  • [+]Risk assessment and management (4)
  • [+]Security management and governance (5)
  • [+]System security (3)
  • [+]Uncategorized (14)
  • [+]Vendor security (10)

Footer

Infoguard Cyber Security

San Jose Office
333 W. Santa Clara Street
Suite 920
San Jose, CA 95113
Ph: (855) 444-6004

Irvine Office
19800 MacArthur Blvd.
Suite 300
Irvine, CA 92612

Recent Posts

  • A Multidimensional Systems Approach For Cybersecurity
  • How to Build a More Secure Cloud: 5 Strategies for 2022
  • Tips to Create a Solid Information Security Policy

Get Social

  • LinkedIn
  • Home
  • About Us
  • Solutions & Services
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

Copyright © 2022