Houston Astros Security Breach Revealed Inside Trade Data

Houston Astros Security Breach Revealed Inside Trade Data

There’s nothing like a baseball game to quench the long, hot days of summer…sippin’ on an ice cold drink, eating a ballpark hotdog and the sound of the bat cracking as it strikes the ball. But, as the game of baseball heats up, so do the activities of hackers.Houston Astros Security Breach Revealed Inside Trade Data

The Houston Astros reacted promptly and sternly after confidential information containing internal correspondence between team officials regarding trade talks with other clubs was released into cyber space. The club learned of this security breach about a month ago, when information was released through a website that allows users to anonymously share hacked information. Deadspin.com, another website, picked up the information and “helped” to make it even more known.

For the past four years, the Astros have been extremely busy at the Trade Deadline, so they have obviously been involved in major discussions with other clubs, sharing information that is very intriguing to hackers. In this case, hackers stole detailed information of internal trade discussions concerning several players, including Jose Veras and Bud Norris, directly from “Ground Control,” the Astros’ internal database.

Jeff Luhnow, the Astros’ general manager, has contacted the other teams and players that were mentioned in the hacked data and overall, they have been understanding and supportive. Just as baseball is a team sport that takes multiple players to achieve greatness, so too, is the war on cybercrime.

Working with MLB security and the FBI, the Astros intend to prosecute all involved with this data hack, but in the meantime, they have taken measures to improve their database’s security.

Image Credit: Daniel M. Silva / Shutterstock.com

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.