IT Giant Globant Confirms Source Code Repository Breach


IT giant Globant has confirmed suffering a data breach after the notorious hacker group Lapsus$ leaked tens of gigabytes of data allegedly stolen from the company.

Earlier this week, the hackers made public roughly 70 Gb of source code allegedly belonging to Globant customers. Folder names suggest that some of the source code belongs to major companies, including Apple and Facebook.

Globant source code leak

The group has also published a list of usernames and passwords that they claim can be used to access various development platforms used by Globant.

In a statement issued on Wednesday, Globant said it has activated security protocols and launched an investigation after detecting unauthorized access to a “limited section” of its code repository.

“According to our current analysis, the information that was accessed was limited to certain source code and project-related documentation for a very limited number of clients. To date, we have not found any evidence that other areas of our infrastructure systems or those of our clients were affected,” Globant stated.

The company has more than 23,000 employees and a presence in 18 countries. Its customers include Google, Electronic Arts, and Rockwell Automation.

Lapsus$ has taken credit for attacks on several other major companies, including Microsoft, Okta, Samsung, Vodafone, Ubisoft and NVIDIA.

[ READ: The Chaos (and Cost) of the Lapsus$ Hacking Carnage ]

These companies have confirmed suffering a data breach after the hackers made public large amounts of information, but most of the victims said the hackers’ claims were exaggerated.

Lapsus$ announced targeting Globant less than a week after authorities in the United Kingdom said they had arrested seven people — aged 16 to 21 — who are believed to be linked to the group.

Lapsus$ is a financially motivated group that steals data from major organizations — in many cases source code — and demands a ransom to prevent the stolen files from getting leaked.

The cybercriminals mainly rely on social engineering, hacking employee accounts, SIM swapping, and insiders to achieve their goals, often naming and shaming victims on a Telegram channel.

Related: Car Parts Giant Denso Targeted by Ransomware Group

Related: Hacktivists Leak Data Allegedly Stolen From Russian Energy Giant Transneft

Related: Cookware Distribution Giant Meyer Discloses Data Breach

view counter

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Previous Columns by Eduard Kovacs:
Tags:



Don't forget to share

You may also like...

Leave a Reply

Your email address will not be published.