- itscybernews
- Posts
- How Dell was Breached
How Dell was Breached
An Insight into API Vulnerabilities
Recently, an individual responsible for a large-scale data breach at Dell detailed the method they employed to access customer records. This breach compromised the data of approximately 49 million customers, involving details such as warranty information, service tags, and customer names.
The hacker, known by the pseudonym Menelik, orchestrated this breach by manipulating a partner portal API intended for Dell's partners, resellers, and retailers. By creating multiple fake company profiles, Menelik bypassed the portal’s authentication processes, gaining access within just two days.
This portal was exploited to look up and scrape order information. Menelik crafted a program that automatically generated service tags, which were submitted to the portal to retrieve corresponding customer data. The lack of rate limiting on the portal facilitated the mass data extraction, allowing up to 5,000 requests per minute over a three-week period without detection.
The breach was extensive, affecting various Dell products, including millions of monitors, notebooks, and desktops across different lines such as Alienware, Inspiron, Latitude, and XPS.
Despite Menelik’s attempts to alert Dell to the vulnerability through emails in early April, there was no immediate response. The issue was not addressed until nearly two weeks later, around the same time the data was first offered for sale on a hacking forum. Dell has since acknowledged the breach and stated that they had detected the activity independently before Menelik’s notification and had engaged a third-party forensics firm to investigate.
This incident underscores the increasing challenges companies face with API security. As APIs become more prevalent in digital infrastructure, they also become prime targets for exploitation. This breach not only showcases the critical vulnerabilities but also highlights the necessity for stringent security measures, including robust authentication processes and effective rate limiting, to protect sensitive customer data.