• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.001 ■ Fall 2019 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

IT Firm Manager Arrested in the Biggest Data Breach Case of Ecuador’s History

September 23, 2019 by Penghui Ai 1 Comment

Ecuador authorities have captured its senior manager of IT counseling firm Novaestrat after the individual subtleties of nearly the whole population left uncovered online in what is the biggest data breach in the nation’s history.
The source of this breach is Novaestrat’s unsecured Elasticsearch server based in Miami. It contained 18GB reserve of information of government vaults, an automotive association, and an Ecuadorian national bank.
As a component of the investigation, Ecuadorian authorities said they had captured the administrator of Novaestrat William Roberto G, and held onto electronic hardware, PCs, stockpiling gadgets, and documentation during an attack at his home.
Given the security concerns encompassing the occurrence, the nation’s Minister of Telecommunications said legitimate actions would be made against the influenced foundations to endorse privately owned businesses in charge of damaging protection and publicizing individual data without approval.
The Minister of Telecommunications additionally said it is intending to pass another information security law in the nation, which they have been working for as far back as eight months, to ensure the individual information of its residents.

https://thehackernews.com/2019/09/ecuador-data-breach.html

Filed Under: Week 05: Metasploit Tagged With:

Reader Interactions

Comments

  1. Numneung Koedkietpong says

    September 26, 2019 at 11:25 am

    Hi Penghui,
    This seems a tremendous issue of data breach in Ecuador since planty of private and PII data such as full names, gender, dates and places of birth, phone numbers and addresses, to marital statuses, and national identification numbers were stolen and published online. Based on this problem, Ecuadorian officials should investigate and root-cause, perform risk assessment to establish efficient controls in order to protect, detect, and correct IT vulnerabilities.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (55)
  • Week 01: Overview (6)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (7)
  • Week 04: Network Mapping and Vulnerability Scanning (4)
  • Week 05: Metasploit (9)
  • Week 06: More Metasploit (8)
  • Week 07: Social Engineering (11)
  • Week 08: Malware (19)
  • Week 09: Web Application Hacking (14)
  • Week 10: SecuritySheperd (12)
  • Week 11: Intro to Dark Web and Intro to Cloud (10)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (6)
  • Week 13: WPA2 Enterprise and Beyond WiFi (11)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (9)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in