Samsung, EY, Tesco, Lufthansa, Vodafone, T-Mobile companies’ partner hacked

Full SQL database is online. More details in this article.

This June 2022 a database belonging to a company, specialised on education of top managers has been leaked online. The incident has happened precisely on 21st June, 2022. The company on question is Fligby with a solution called “The Flow”, developed in partnership with a famous and renowned in the field of psychology, professor Mihaly Csikszentmihalyi.

As the company describes itself: “The producer of FLIGBY is ALEAS Simulations, Inc. ALEAS is an innovative serious gaming lab based in California and Central Europe, Hungary. The objective of the ALEAS Edutainment Philosophy is to effectively enhance all learning practices including skill development. Our operation is based on a threefold corporate philosophy: balance of simulation, adaptivity and game-based approach.

Computer games are one of the most empowering activities in the virtual world. They are meant to be fun. That’s why edutainment is the most effective method of learning today. Results are based on trial and error methodology: a direct link between learning efforts and results.”

Photo by rishi

The list of Fligby’s companies-clients is impressive: Janssen of Johnson&Johnson, KWS, Raiffeisen Bank, Samsung, Tesco, Novartis, Spar, T-Mobile, ExxonMobil, NN Group, UniCredit Bank, Lufthansa Technik AG, Whirlpool, OTPBank, Telenor, Tesa, EY, Vodafone, Groupama, Henkel, Qualcomm, Roto Frank, Essilor International, BW Offshore Ltd, Opera Ltd and others, including renowned high schools and universities all over the world.

Data leak details

Overall, almost 54k users have been affected by this data breach. The “flow_users”, arguably the most interesting table of the database, has the following keys:

`id`, `gender`, `first_name`, `last_name`, `email`, `password`, `mobile`, `job_title`, `country_of_origin`, `group_id`, `solution_provider_id`, `company_id`, `role_id`, `activation_id`, `reg_date`, `last_login_date`, `start_date`, `active_time`, `end_date`, `language`, `date_of_birth`, `company_name`, `company_category`, `company_subcategory`, `work_location`, `employees_number`, `leadership_level`, `manager_time`, `keep_informed`, `status`

The passwords in the database have been originally hashed, but appeared in the following weeks on an underground hacking forum in a cleartext form.

To sum up, in hackers possess such sensitive data as: full company’s top manager name, and the company of work, DoB, mobile phone number, email, used password, job title and language spoken. What a great pack for phishing as well as phone scam!

Kaduu Team urge you to stay vigilant and aware of data that has been leaked.

Stay up to date with exposed information online. Kaduu with its cyber threat intelligence service offers an affordable insight into the darknet, social media and deep web. 

Comments are closed.