Fractal ID data breach traced to 2022 hack of employee who reused password
Quick Take Decentralized identity startup Fractal ID published a postmortem detailing its recent data breach affecting about 6,300 customers, acknowledging that a compromised employee’s account was used to access internal systems. The employee’s credentials had been stolen using the popular Raccoon Infostealer malware as early as 2022, according to cybercrime intelligence firm Hudson Rock.
Decentralized identity startup and Know-Your-Consumer (KYC) verification provider Fractal ID has published a postmortem outlining the data breach that the company suffered on July 14. The company said the data breached "may include names, email addresses or phone numbers, wallet addresses, physical addresses, images and pictures of any uploaded documents" of about 6,300 users, or .5% of the users in Fractal ID's database.
The Berlin-based Fractal ID provides compliance assistance for at least eight crypto protocols including Polygon, Ripple and Near and counts over 250 companies among its clientele, according to its website .
The threat actor gained access to the system through a compromised employee's account. Because the employee had administrator-level access to the system, the hacker was able to "sidestep" internal data privacy systems, the company states, before an automated system notified an engineer and allowed them to shut out the attacker 29 minutes after the attack began.
The company noted that a party who claimed responsibility for the attack requested a ransom from the company, but the company declined to engage and instead contacted Berlin's cybercrime law enforcement. The company has also contacted affected users, according to its postmortem . The company outlined several measures it plans to take to defend against attacks in the future, including restricting which accounts have access to sensitive data and blocking requests to login from unknown IP addresses.
Initial hack dates back to 2022
The employee's machine was originally compromised all the way back in September 2022, according to researchers at cybercrime intelligence firm Hudson Rock. The machine was infected by the Raccoon 'infostealer,' a commonly available Malware-as-a-Service first observed in April 2019.
"While the computer was infected back in 2022, it appears the victim did not change their password, enabling the hackers to infiltrate an account and initiate the hack," the researchers wrote .
"The operator didn’t follow our opsec policies and training. We have put technical measures in place to ensure these cannot be sidestepped by any operators in the future. This was not the result of a software vulnerability," Fractal ID noted in its postmortem.
The U.S. Justice Department indicted a 26-year-old Ukrainian national, Mark Sokolovsky, in 2022 for conspiring to operate Raccoon Infostealer, which was allegedly leased to would-be hackers for as little as $200 a month in cryptocurrency. The FBI was able to identify "more than 50 million unique credentials and forms of identification (email addresses, bank accounts, cryptocurrency addresses, credit card numbers, etc.) in the stolen data from what appears to be millions of potential victims around the world," though the agency acknowledged that number is likely an undercount.
After failing to fake his death following the Russian invasion of Ukraine, Sokolovsky was extradited to the United States this past February. The U.S. government also set up a website where users can check if their credentials have been compromised.
Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
You may also like
New spot margin trading pair — HOLO/USDT!
FUN drops by 32.34% within 24 hours as it faces a steep short-term downturn
- FUN plunged 32.34% in 24 hours to $0.008938, marking a 541.8% monthly loss amid prolonged bearish trends. - Technical breakdowns, elevated selling pressure, and forced liquidations highlight deteriorating market sentiment and risk-off behavior. - Analysts identify key support below $0.0080 as critical, with bearish momentum confirmed by RSI (<30) and MACD indicators. - A trend-following backtest strategy proposes short positions based on technical signals to capitalize on extended downward trajectories.

OPEN has dropped by 189.51% within 24 hours during a significant market pullback
- OPEN's price plummeted 189.51% in 24 hours to $0.8907, marking its largest intraday decline in history. - The token fell 3793.63% over 7 days, matching identical monthly and yearly declines, signaling severe bearish momentum. - Technical analysts cite broken support levels and lack of bullish catalysts as key drivers of the sustained sell-off. - Absence of stabilizing volume or reversal patterns leaves the market vulnerable to further downward pressure.

New spot margin trading pair — LINEA/USDT!
Trending news
MoreCrypto prices
More








