HR software PageUp has been compromised by malicious software
According to ZDNet, PageUp, an Australian-based human resource (HR) software company, has confirmed that its IT infrastructure was found to have abnormal activity last month, which may lead to leakage of customer data.
According to the information displayed on the PageUp company’s official website, the company’s main business is to provide customers with HR software-as-a-service, allowing customers to recruit from anywhere in the world through a unified talent management platform. Employees are trained, trained and managed. The platform currently has more than 2 million active users and covers more than 190 countries worldwide.
The company has branches in many countries and regions around the world, including New York, United Kingdom, London, Singapore, Philippines, Manila, Hong Kong, China, Sydney, Australia, and Melbourne. Its large clients include the chocolate brand Lindt, Australia’s largest logistics company LinFox, the Reserve Bank of Australia (RBA), Zurich Insurance and Victoria University.
On May 23, after discovering that the system was infected with malware, the company immediately conducted an in-depth investigation. After a five-day investigation, the company said that its concerns have been confirmed, and some indicators in the survey results indicate that some customer data are likely to have been leaked.
The company said in a statement: “If any personal data has been affected it could include information such as name and contact details. It could also include identification and authentication data e.g. usernames and passwords which are encrypted (hashed and salted). There is no evidence that there is still an active threat, and the jobs website can continue to be used. All client user and candidate passwords in our database are hashed using bcrypt and salted; however, out of an abundance of caution, we suggest users change their password.”
Karen Cariss, the company’s chief executive officer, and co-founder emphasized that both the signed employment contract and the resume are stored on different infrastructures and there is no evidence that the infrastructure on which the files were stored was destroyed. He also said that PageUp has been working with international law enforcement agencies, government agencies and independent security experts to fully investigate the matter. Therefore, it is not yet possible to provide more details on what information is affected.
“Since becoming aware of unauthorised access we have been urgently analysing the impact and consequences of this incident and have engaged independent digital forensic expertise, who have been attempting to identify what, if any personal data may have been accessed. That said, we can share that the source of the incident was a malware infection. The malware has been eradicated from our systems and we have confirmed that our anti-malware signatures can now detect the malware. We see no further signs of malicious or unauthorised activity and are confident in this assessment.“
Telstra, an Australian telecommunications service provider, also issued a statement regarding the PageUp incident, stating that in most cases the personal information that may be affected is the applicant’s name, telephone number, application history, and email address. For those who apply for success, the data in the PageUp system may include a date of birth, employment details, employee number (if present or former), pre-employment check results, and arbitration details.
PageUp also stated that it had contacted the Australian Cyber Security Center (ACSC), the Australian Computer Emergency Response Team (CERT), the Australian Information Commissioner’s Office (OAIC) and the National Cyber Security Center (NCSC) on the matter and suggested The user changes his own password.