disney+ phone

Disney+ Customer Accounts Found For Sale on Dark Web As Users Complain of Hacking

The company says there is no evidence of a security breach, but researchers suspect that account information was stolen using lists of previously hacked emails and passwords.

Though Disney claims there has not been a security breach, thousands of customers who purchased subscriptions to the new Disney+ streaming platform say that their accounts have been hacked and taken over in the days since it launched.

Disney+ has suffered technical issues since it went online on Nov. 12, with several people having issues ranging from being locked out of accounts to long lag times. A report by the tech site ZDNet found that shortly after subscribers complained on social media, thousands of user accounts went on sale on the dark web for $3 and even for free.

Other news outlets have confirmed the report, including BBC News, which hired its own cybersecurity researchers to conduct an investigation searching for customer accounts on the dark web. More than 4,000 customer accounts were being sold in the BBC investigation.

Users say that they have had repeated issues reaching customer support about their compromised accounts, and Disney+ said as recently as Tuesday that its systems had not been hacked.

 

 

“Disney takes the privacy and security of our users' data very seriously and there is no indication of a security breach on Disney+," a spokesman told BBC.

Jason Hill, a cybersecurity researcher for CyberInt, told the news outlet that it appears that the accounts were stolen because users tend to use the same emails and passwords for different sites. In turn, malicious actors were able to take lists of account information from previous hacks and try them on Disney+, allowing them to change passwords and take over the accounts.

Jonathan Deveaux, the head of enterprise data protection at comforte AG, pointed out that there is no evidence that there has been a data breach within the Disney cybersecurity program. But that does not rule out a “mass effort” by hackers to use previously stolen user IDs and passwords on the streaming platform, he said.

“What is missing from the Disney+ security service is multi-factor-authentication,” Deveaux said, referring to a method of allowing access to an account only after two or more pieces of evidence (including a phone number) are confirmed while logging in. “MFA does not guarantee that only the authorized user is indeed accessing the service, but it does help slow down or reduce the likelihood of bad-actors gaining access with only user ID and password credentials.”

While Disney’s servers may not be compromised, their users are suffering the consequences of previous hacks. Cybersecurity experts recommend using different passwords for every subscription service in order to prevent bad actors from re-using the stolen data on other sites.

“Disney did not do anything wrong per se, but they could elect to look at increasing their security posture by upgrading their authentication program,” Deveaux said.

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3