• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 22nd, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Security
Malware

Hackers Use Malware To Steal Cisco, IBM and Oracle Certification Manager

November 26th, 2015 Ryan De Souza Malware, Security 0 comments
Hackers Use Malware To Steal Cisco, IBM and Oracle Certification Manager
Share on FacebookShare on Twitter

A certification tracking system (Credential Manager System) used by companies like Cisco, F5, IBM and Oracle has faced a data breach and sensitive data might have been accessed by the hackers.

An announcement made by Pearson VUE (Computer-Based Test (CBT) development and delivery) said a malware was placed on the server of the tracking system which allowed hackers to access sensitive data stored on the system.

The tracking system was used to issue official and diploma certifications to the professionals of various types.

Pearson VUE also clarified that Credential Manager System was the only thing that was exposed in this incident. A spokesperson from Pearson VUE said:

“Because the Credential Manager System is custom designed to fit specific customer requirements, we are working to understand how this issue may have affected each of our customers.”

[fullsquaread][/fullsquaread]

Initial checks have revealed there is no Credit card or Social Security numbers leaked and it seems the hacking attempt was made to carry out fraudulent transactions.

Tracking system’s servers have been taken offline and will not be restarted until Pearson get them malware and vulnerability free.

Thanks for your continued patience. We apologize that the Credential Manager system is down and are working hard to resolve the issue.

— Pearson VUE (@PearsonVUE) November 21, 2015

Latest tweet shows the PCM is back online:

PCM is back online for most programs! Check the Pearson VUE Facebook page for details. Thank you for your patience during the past week!

— Pearson VUE (@PearsonVUE) November 25, 2015

The Softpedia reports that initially Microsoft’s name was included in the companies affected by the attack, however, Microsoft said that the actual certifications are handled by Microsoft separately and not affected by the data breach.

  • Tags
  • breach
  • Certification
  • Cisco
  • Cyber Crime
  • hacking
  • IBM
  • Malware
  • Oracle
  • security
Facebook Twitter LinkedIn Pinterest
Previous article Armenian Group Hacks Azerbaijan Central Bank, Leaks A Trove of Data
Next article Whopping 1.2 Billion Credentials Leaked By Russian Hackers: FBI
Ryan De Souza

Ryan De Souza

Ryan is a London-based member of the HackRead's Editorial team. A graduate of Maths and physics with a passion for geopolitics and human rights. Ryan places integrity at the pinnacle of successful journalism and believes this is somewhat lacking in traditional media. Ryan is an educator who balances his time between family, social activism and humanitarian causes and his vice is Football and cars.

Related Posts
Shazam Vulnerability exposed location of Android, iOS users

Shazam Vulnerability exposed location of Android, iOS users

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Shazam Vulnerability exposed location of Android, iOS users
Security

Shazam Vulnerability exposed location of Android, iOS users

29
Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet
Security

Ongoing 'FreakOut' malware attack turns Linux devices into IRC botnet

73
Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping
Security

Signal, Google Duo, FB Messenger vulnerabilities allowed eavesdropping

96

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us