Canva 2019 data breach: Difference between revisions
PixelRunner (talk | contribs) m PixelRunner moved page Canva 2019 Data Breach to Canva 2019 data breach: Misspelled title: Not in sentence case |
mNo edit summary |
||
| (One intermediate revision by one other user not shown) | |||
| Line 7: | Line 7: | ||
==[Incident]== | ==[Incident]== | ||
The attack was linked to a group known as GnosticPlayers. | The attack was linked to a group known as GnosticPlayers.<ref>{{Cite web|url=https://www.packtpub.com/en-us/learning/how-to-tutorials/canva-faced-security-breach-139-million-users-data-hacked-zdnet-reports|title=Canva faced security breach, 139 million users data hacked: ZDNet reports|first=Fatema|last=Patrawala|work=Packt|date=2019-05-28|access-date=2026-04-27}}</ref> The group claimed to exfiltrate data and offered it for sale on breached forums, with motives of financial gain. The breach was caused by credential stuffing and credential cracking.<ref>{{Cite web |last=Minh Hieu Nguyen Ba |last2=Bennet |first2=Jacob |last3=Gallagher |first3=Michael |last4=Bhunia |first4=Suman |title=A Case Study of Credential Stuffing Attack: Canva Data Breach |url=https://ieeexplore.ieee.org/document/9799087 |url-status=live |website=[[IEEE Xplore]] |publisher=[[IEEE]]}}</ref> Passwords were hashed with bcrypt; however, they were later decrypted. | ||
The data exfiltrated from the breach included: email addresses, real names, cities and countries of residence, public profile data, and partially hashed passwords (for users logged in directly with Canva, not externally). Payment data was not accessed. | The data exfiltrated from the breach included: email addresses, real names, cities and countries of residence, public profile data, and partially hashed passwords (for users logged in directly with Canva, not externally). Payment data was not accessed. | ||
===[Company]'s response=== | ===[Company]'s response=== | ||
Canva alerted users on May 25, 2019, to reset their passwords through email and in app alerts. To improve security, Canva introduced Multi-factor authentication (MFA), enhanced security measures (not specified), and regular security audits. | Canva alerted users on May 25, 2019, to reset their passwords through email and in app alerts. To improve security, Canva introduced Multi-factor authentication (MFA), enhanced security measures (not specified), and regular security audits.<ref>{{Cite web |last=Danielson |first=Lizzie |date=2025-11-14 |title=Canva Data Breach |url=https://www.huntress.com/threat-library/data-breach/canva-data-breach |url-status=live |website=[[Huntress]]}}</ref> | ||
==Lawsuit== | ==Lawsuit== | ||
Latest revision as of 01:36, 28 April 2026
❗Article Status Notice: This Article is a stub
This article is underdeveloped, and needs additional work to meet the wiki's Content Guidelines and be in line with our Mission Statement for comprehensive coverage of consumer protection issues. Learn more ▼
On May 24, 2019, Canva identified their systems were attacked and posted an announcement about the breach, urging users to change their passwords. 139 million users were affected, and information taken includes usernames, real names, email addresses, and location. 61 million users' data included password hashes, and for other users, Google tokens were taken. Seven months later, on the 11th of January 2020, Canva became aware of 4 million user passwords had been decrypted and shared online. Following the discovery, on the 12th of January Canva has forcefully reset the password of every user that had not changed it since the date of the incident.
Background
[edit | edit source]
[Incident]
[edit | edit source]The attack was linked to a group known as GnosticPlayers.[1] The group claimed to exfiltrate data and offered it for sale on breached forums, with motives of financial gain. The breach was caused by credential stuffing and credential cracking.[2] Passwords were hashed with bcrypt; however, they were later decrypted.
The data exfiltrated from the breach included: email addresses, real names, cities and countries of residence, public profile data, and partially hashed passwords (for users logged in directly with Canva, not externally). Payment data was not accessed.
[Company]'s response
[edit | edit source]Canva alerted users on May 25, 2019, to reset their passwords through email and in app alerts. To improve security, Canva introduced Multi-factor authentication (MFA), enhanced security measures (not specified), and regular security audits.[3]
Lawsuit
[edit | edit source]
Consumer response
[edit | edit source]
References
[edit | edit source]- ↑ Patrawala, Fatema (2019-05-28). "Canva faced security breach, 139 million users data hacked: ZDNet reports". Packt. Retrieved 2026-04-27.
- ↑ Minh Hieu Nguyen Ba; Bennet, Jacob; Gallagher, Michael; Bhunia, Suman. "A Case Study of Credential Stuffing Attack: Canva Data Breach". IEEE Xplore. IEEE.
{{cite web}}: CS1 maint: url-status (link) - ↑ Danielson, Lizzie (2025-11-14). "Canva Data Breach". Huntress.
{{cite web}}: CS1 maint: url-status (link)