• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

Yandex denies hack, blames source code leak on former employee

Bill Toulas by Bill Toulas
January 26, 2023
Reading Time: 3 mins read
0
Yandex denies hack, blames source code leak on former employee

Yandex office building

RELATED POSTS

Sextortionists are making AI nudes from your social media images

Over 60,000 Android apps secretly installed adware for past six months

Outlook.com hit by outages as hacktivists claim DDoS attacks

A Yandex source code repository allegedly stolen by a former employee of the Russian technology company has been leaked as a Torrent on a popular hacking forum.

Yesterday, the leaker posted a magnet link that they claim are ‘Yandex git sources’ consisting of 44.7 GB of files stolen from the company in July 2022. These code repositories allegedly contain all of the company’s source code besides anti-spam rules.

Yandex repository leaked on hacker forums
Yandex repository leaked on hacker forums (BleepingComputer)

Software engineer Arseniy Shestakov analyzed the leaked Yandex Git repository and said it contains technical data and code about the following products:

  • Yandex search engine and indexing bot
  • Yandex Maps
  • Alice (AI assistant)
  • Yandex Taxi
  • Yandex Direct (ads service)
  • Yandex Mail
  • Yandex Disk (cloud storage service)
  • Yandex Market
  • Yandex Travel (travel booking platform)
  • Yandex360 (workspaces service)
  • Yandex Cloud
  • Yandex Pay (payment processing service)
  • Yandex Metrika (internet analytics)

Shestakov also shared a directory listing of the leaked files on GitHub for those who want to see what source code was stolen.

“There are at least some API keys, but they are likely only been used for testing deployment only,” said Shestakov about the leaked data.

In a statement to BleepingComputer, Yandex said their systems were not hacked, and a former employee leaked the source code repository.

Buy JNews
ADVERTISEMENT

“Yandex was not hacked. Our security service found code fragments from an internal repository in the public domain, but the content differs from the current version of the repository used in Yandex services.

A repository is a tool for storing and working with code. Code is used in this way internally by most companies.

Repositories are needed to work with code and are not intended for the storage of personal user data. We are conducting an internal investigation into the reasons for the release of source code fragments to the public, but we do not see any threat to user data or platform performance.” – Yandex.

Exposure to hackers

BleepingComputer also discussed the leak with Grigory Bakunov, a former senior systems administrator, deputy chief of development, and director of spreading technologies at Yandex. who is very familiar with the leaked code, having worked at the tech giant between 2002 and 2019.

Bakunov explained that the motive of the data leak was political, and the rogue Yandex employee responsible for the data leak had not tried to sell the code to competitors.

The former senior executive added that the leak does not contain any customer data, so it does not constitute a direct risk to the privacy or security of Yandex users, nor does it directly threaten to leak proprietary technology.

Yandex uses a monorepo structure called ‘Arcadia,’ but not all of the company’s services use it. Also, even just to build a service, you need a lot of internal tools and special knowledge, as standard building procedures do not apply.

The leaked repository contains only code; the other important part is data. Key parts, like model weights for neural networks, etc., are absent, so it’s almost useless.

Still, there are a lot of interesting files with names like “blacklist.txt” that could potentially expose working services.

However, Bakunov told BleepingComputer that the leaked code creates the potential for hackers to identify security gaps and create targeted exploits. Bakunov believes this is only a matter of time now.

The former executive also commented on Yandex’s response, saying that the leaked code may not be identical to the current code used in the firm’s working services but might be up to 90% similar.

Therefore, thoroughly examining the leaked code could yield possible weak points at Yandex for threat actors.

Share54Tweet34Pin12
Bill Toulas

Bill Toulas

Related Posts

FBI warns of spike in ‘pig butchering’ crypto investment schemes
Cyber Security

Sextortionists are making AI nudes from your social media images

June 6, 2023
Android file manager apps infect thousands with Sharkbot malware
Cyber Security

Over 60,000 Android apps secretly installed adware for past six months

June 6, 2023
Microsoft Outlook outage prevents users from sending, receiving emails
Cyber Security

Outlook.com hit by outages as hacktivists claim DDoS attacks

June 6, 2023
Microsoft to pay $20 million for XBOX children privacy violations
Cyber Security

Microsoft to pay $20 million for XBOX children privacy violations

June 6, 2023
Dissecting the Dark Web Supply Chain: Stealer Logs in Context
Cyber Security

Dissecting the Dark Web Supply Chain: Stealer Logs in Context

June 6, 2023
Android December 2022 security updates fix 81 vulnerabilities
Cyber Security

Android security update fixes Mali GPU flaw exploited by spyware

June 6, 2023

Recommended Stories

Cisco discloses high-severity IP phone bug with exploit code

Over 19,000 end-of-life Cisco routers exposed to RCE attacks

January 20, 2023
Microsoft: Exchange Server 2013 reaches end of support in 90 days

Microsoft: Exchange Server 2013 reaches end of support in 90 days

January 12, 2023
New CryWiper malware wipes data in attack against Russian org

Lorenz ransomware gang plants backdoors to use months later

January 10, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    137 shares
    Share 55 Tweet 34
  • RedEyes hackers use new malware to steal data from Windows, phones

    136 shares
    Share 54 Tweet 34
  • New Windows Server updates cause domain controller freezes, restarts

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • North Korean hackers behind Atomic Wallet breach, finds intelligence firm
  • North Korean hackers behind Atomic Wallet breach, finds intelligence firm
  • Zenit World introduces token rewards program to celebrate 80,000 registrations

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?