Software firm breached, hacker reportedly behind data leak of 60K vendor accounts

Share this article:
A hacker claims to have leaked vendor account information including encrypted passwords.
A hacker claims to have leaked vendor account information including encrypted passwords.

Software company Tom Sawyer has begun notifying customers that their information was compromised via a website database hack – and the hacker purportedly behind the intrusion has apparently leaked the stolen data online.

On Thursday, obtained a notification email sent to a Tom Sawyer customer impacted by the incident.

According to the correspondence, user names, email addresses, first and last names and encrypted passwords for customer accounts were compromised. In addition, contact information, such as the affiliated organization and work titles of customers, and addresses and phones numbers were exposed .

“We recommend you immediately confirm that you did not use your Tom Sawyer account password with any other account,” the Thursday email read. “If you did, you should change your password for those other accounts right away.”

The company said it took its website down while it worked to “improve its security and safety,” and would notify customers when it was back up.

As of Friday morning EST, there is still a message on alerting those wishing to log into their accounts that the site is experiencing “system maintenance” and “will be back up soon.”

On Sunday, a hacker going by the online alias Nairb, claimed on Twitter to have leaked the compromised data via A blog, CyberWarNews, reported the claims on Monday and after sifting through the data dump found that more than 60,000 vendor accounts appeared to have been exposed. reached out to Tom Sawyer, but did not immediately hear back from the company. The Berkeley, Calif.-based firm produces data visualization, layout and analysis component software for application developers.

Share this article:

Sign up to our newsletters

More in News

Report: SQL injection a pervasive threat, behavioral analysis needed

Report: SQL injection a pervasive threat, behavioral analysis ...

Long lag times between detection and resolution and reliance on traditional methods impair an organization's ability to combat SQL injection attacks.

WhatsApp bug allows for interception of shared locations

Researchers identified a vulnerability in WhatsApp that could enable an attacker to intercept shared locations using a man-in-the-middle attack, or a rogue access point.

Google tweaks its terms of service for clarity on Gmail scanning

The company is currently dealing with a lawsuit that challenges its email scanning practices.