D-Link data breach is officially confirmed!
D-Link, the Taiwanese manufacturer of networking equipment, has recently released a statement confirming a data breach incident that transpired earlier this month. This D-Link data breach was exposed when an unidentified assailant claimed to have successfully infiltrated D-Link’s internal network and exfiltrated valuable assets.
Speaking on the development, the firm’s official statement said, “On October 1, 2023, someone posted an article in an online forum and claimed that the D-View system, a software monitoring tool for local networking devices and network administrators, was breached, and millions of users’ data were stolen.”
D-Link Data Breach, Firm Responded Quickly
In response to D-Link data hacking, an in-depth investigation was promptly initiated, involving both internal and external experts, including those from Trend Micro.
“We immediately shut down presumably relevant servers after being informed of this incident. We blocked user accounts on the live systems, retaining only two maintenance accounts to investigate any signs of intrusion further. Simultaneously, we conducted multiple examinations to determine if any leaked backup data remained in the test lab environment and disconnected the test lab from the company’s internal network,” the official statement said.
The extensive examination revealed a multitude of inaccuracies and exaggerations within the attacker’s claim. It became apparent that these distortions were deliberate and intentionally misleading, deviating significantly from the actual facts surrounding the D-Link data breach.
“The post claimed to have millions of user data. Based on the investigations, however, it only contained approximately 700 outdated and fragmented records that had been inactive for at least seven years. These records originated from a product registration system that reached its end of life in 2015,” said the firm Official statement.
Furthermore, the organization emphasized that there is no current evidence to suggest that the outdated data contained any user IDs or financial information. However, it was noted that during the D-Link data breach, some low-sensitivity and semi-public information, including contact names and office email addresses, was present within the compromised records.
How did the D-Link Data Breach occur?
The occurrence of the D-Link data breach is thought to have been initiated when an employee inadvertently became a target of a phishing attack, leading to unauthorized entry into obsolete and rarely accessed data. Even though the company’s systems complied with the information security standards of that time, it deeply laments this D-Link data hacking.
“The incident may have been caused by an employee falling victim to a phishing attack, resulting in unauthorized access to the long-unused and outdated data,” reads official statement.
What Threat Actor Claimed about D-Link Data Breach
Contrary to the company’s official statement, the cyber attacker provided evidence of their claims of D-Link data breach by posting 45 sample records with timestamps from 2012 and 2013. Some observers questioned the validity of this data, citing its age as a cause for suspicion.
The threat actor responsible for the D-Link data breach boasted on the forum, stating, “I have breached the internal network of D-Link in Taiwan, I have 3 million lines of customer information, as well as source code to D-View extracted from the system. This does include the information of MANY government officials in Taiwan, as well as the CEOs and employees of the company.” The attacker was offering D-Link Data Breach information for a steep price of US$500.

The D-Link data breach serves as a reminder of the ongoing challenges businesses face in safeguarding sensitive information in an increasingly digitized world. The cyberattack on D-Link highlights the importance of robust cybersecurity measures and vigilant employee training to prevent breaches and secure customer data.
D-Link is currently working to enhance its security practices and investigate the breach further.
Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.