Mozilla Data Leak Affects 76,000

E-Mail Addresses, Encrypted Passwords Exposed
Mozilla Data Leak Affects 76,000

Members of the Mozilla Developer Network, the software company's online development community, are being alerted about an accidental disclosure of e-mail addresses and encrypted passwords. Mozilla is best known for its Firefox web browser.

See Also: Why Active Directory (AD) Protection Matters

The company learned that a "data sanitization" process the Mozilla Developer Network was undergoing had been failing for a period of 30 days, starting around June 23, which resulted in the exposure of e-mail addresses of about 76,000 users and encrypted passwords of about 4,000 users on a publicly accessible server, Mozilla says.

While it's unclear what geographic locations were affected by the disclosure, the Mozilla Developer Network has contributors from 31 countries, according to the network's website.

"As soon as we learned of it, the database dump file was removed from the server immediately, and the process that generates the dump was disabled to prevent further disclosure," Mozilla says in an Aug. 1 blog. "While we have not been able to detect malicious activity on that server, we cannot be sure there wasn't any such access."

The encrypted passwords were salted, Mozilla says. "Still, it is possible that some MDN users could have reused their original MDN passwords on other non-Mozilla websites or authentication systems," the company says. "We've sent notices to the users who were affected."

Mozilla did not immediately respond to a request for additional information.


About the Author

Jeffrey Roman

Jeffrey Roman

News Writer, ISMG

Roman is the former News Writer for Information Security Media Group. Having worked for multiple publications at The College of New Jersey, including the College's newspaper "The Signal" and alumni magazine, Roman has experience in journalism, copy editing and communications.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.