Drake reports 300k breach to Oz watchdog, but says no risk to affected

Hacked recruiter stays mum on number of Australians and New Zealanders caught in ransom standoff.

The Australian office of hacked recruiter Drake International say details in a candidate database stolen by hackers last week posed no risk to affected individuals -- but it has nonetheless reported the breach to the Australian Information Commissioner’s Office.

“Drake International has notified The Office of the Australian Privacy Commissioner and Privacy Commissioner’s Office (New Zealand) of the security breach and we are taking steps to notify affected clients and candidates in Australia and New Zealand,” Drake’s Australian national marketing manager Alexandra Tidy told CSO.com.au by email.

The firm’s Canadian headquarters confirmed last week that hackers had made off with a database said to contain details of over 300,000 candidates from Australia, New Zealand, the UK and Canada. The breach occurred on the January 7, according to Tina.

The hackers had demanded a US$50,000 payment by the end of last week in exchange for not publishing it on the Web.

Drake refused to negotiate with the hackers who on Sunday published the database on Multiupload.nl, noting on Twitter that they had "1000s of email/password combos" -- potentially valuable to hackers if the candidates had used the same combinations for other online services.

The URL however has been taken down for a breach of terms while the MD5 hash of the file it hosted was removed upon a takedown request. CSO.com.au has been unable to locate a copy of the database, which the hackers claimed included email/passwords combinations, candidate's referees, phone contacts and details about some of Drake's clients.

Drake’s Tina said these details did not pose a risk to those affected by the breach.

“Drake International wishes to stress that the data security breach was limited in scope and does not pose a risk to affected individuals,” Tidy said in an email.

“Our databases do not store personal\business tax identification numbers, government identification numbers nor any personal\business banking details.”

A small snippet of details released by the hackers last week suggests the database did not contain as much detail as a leak last year of finance sector IT recruiter ITWallStreet.com, which was said to contain 50,000 candidates’ user names and passwords, in addition to logs of phone calls made between recruiters and candidates and email exchanges.

Tidy would not disclose how many Australians were amongst the 300,000 affected by the breach, besides that their numbers were “small in comparison to the overall numbers of our candidates and clients.”

“Drake International is not at liberty to disclose such information to you as we are still in the process of notifying the affected individuals,” she said.

Join the CSO newsletter!

Error: Please check your email address.
Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Liam Tung

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place