Globant Systems Breached

  • By Steven
  • Published: Apr 05, 2022
  • Last Updated: Apr 05, 2022

A representative from Globant has admitted an unauthorized party has accessed the company’s internal data system. All in all, about 70 gigabytes of the company’s data has been leaked onto the internet. Here’s a quick look at the details of the hack.

Who is Responsible for the Globant Hack?

The hacking collective referred to as “Lapsus$” is claiming responsibility for the digital attack against Globant. The hacking collective obtained unauthorized access to Globant’s code repository. The hack is a bit surprising as it comes on the heels of police in the United Kingdom cracking down on digital attacks. The police shocked many in the cyber security community with the arrest of Lapsus$ hackers.

Nearly half a dozen of the hacking group’s members were taken into custody. However, Lapsus$ members quickly took to the web to state that they had returned from what they referred to as a “vacation” to post Globant’s sensitive data to the internet. The Globant information was leaked to the hacking collective’s Telegram channel.

What Information was Stolen?

Though Globant representatives have not gone into detail about the type of information stolen from its systems and leaked onto the web, the software development specialist has admitted the hack was quite extensive. Initial reports indicate the company’s administrator credentials for DevOps platforms were leaked onto the web. Administrator credentials are especially valuable and sensitive in the context of digital security as they unlock entryways into the platforms used for development operations.

The company’s GitHub, Crucible, Confluence, and Jira credentials were leaked as a result of the hack. The company also admitted the hackers obtained access to the code repository with important source code tied to its most valued clients. However, Globant’s public relations team insists only a “limited section” of the code repository was accessed.  

What is Globant’s Response to the Hack?

Globant has activated its internal security protocols in response to the digital attack. The company is now performing an exhaustive investigation into the hack. Globant representatives also put out a statement indicating that the information obtained in the hack was primarily limited to specific source code and documentation pertaining to a handful of projects for only a couple of clients. The statement also indicated the company had not identified evidence that shows other components of the infrastructure systems or the systems of clients were affected.

Globant’s digital security team is now implementing measures to prevent additional data security incidents. However, the company did not respond to an information request submitted by the Information Security Media Group.  

Is the Threat Still Present?

Lapsus$ hackers posted more than 718 KB of data to its Telegram channel last week. The data leak included client source code. The Globant source code might not be compromised, yet it appears as though the software’s source code for customers has been breached. The threat is especially problematic when the size of Globant customers is considered.  

Globant clients range from Royal Caribbean to Electronic Arts, Santander Bank, and the Argentina Health Ministry. However, none of these companies has indicated their data has been compromised in the Lapsus$ hack.  

The Globant hack is still a developing story. Stay tuned for additional details about the extent and depth of the hack that will likely be revealed in the days ahead.

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

What You Need to Know about the Delta Dental Data Breach

What You Need to Know about the Delta Dental Data Breach

Delta Dental is a dental insurance provider serving over 90 million Americans. It offers coverage in all 50 states, Puerto Rico, and Washington, D.C. The company was established in 1966 in California as part of the Delta Dental Plans Association.

What You Need to Know about the Hot Topic Data Breach

What You Need to Know about the Hot Topic Data Breach

Hot Topic plays in the fashion, apparel, and shoe industry as a retailer of music-influenced apparel and accessories, such as jeans, tops, belts, dresses, pajamas, sunglasses, jewelry, and tees.

Google Voice Scams: What They Are and How to Stay Safe

Google Voice Scams: What They Are and How to Stay Safe

Google Voice scams continue to pose a risk for users of this service. Scammers continuously attempt to lure users into divulging their verification PIN code.

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close