RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

ARTEK

Company

width=200px

Owners:
Nikamed

Content

Owners

"ORTEKA" - a network of orthopedic salons.

At the beginning of 2019, the network has more than 200 salons and development continues.

ORTEKA salons are open not only in Moscow, but also in the cities: St. Petersburg, Yekaterinburg, Perm, Novosibirsk, Omsk, Voronezh, Sochi.

History

2024: Data breach of hundreds of thousands of customers

In early March 2024, it became known that the IT infrastructure of the Orteka orthopedic salon network (orteka.ru) was subjected to a hacker attack. As a result of the hack, the data of hundreds of thousands of customers was leaked.

The complete database contains information about buyers: this name and surname, delivery address, hashed password, gender, etc. In addition, the dump includes information about orders and loyalty cards - approximately 3.8 million unique phone numbers and 428 thousand unique email addresses. At the same time, not all information is posted publicly on the Internet. The hackers revealed only the information contained in the feedback form.

The IT infrastructure of the Orteka orthopedic salon network (orteka.ru) was hacked

Sergei Polunin, head of the group for protecting infrastructure IT solutions at Gazinformservice, notes that such leaks from medical institutions always raise additional questions, because on the one hand, "this is personal data that must be protected properly, and on the other, medical information that is extremely sensitive and can be used to blackmail or design targeted phishing attacks."

Kaspersky Lab notes that unlike 2022, when specialized shadow forums were the main channel for the spread of public leaks, in 2023 it became the Telegram messenger. It was in this service that the majority (67%) of all ads were identified. The bulk of the compromised data (71%), which were publicly available in 2023, date back to this year. More than half (55%) of the bases studied became public within a month after the estimated date of unloading from the company's systems. Attackers can use compromised accounts to gain access to corporate resources of victim companies.[1]

Notes