Canva 2019 data breach: Difference between revisions
No edit summary |
Incident Section, Companys Response |
||
| Line 7: | Line 7: | ||
==[Incident]== | ==[Incident]== | ||
The attack was linked to a group known as GnosticPlayers. [https://www.sophos.com/en-us/blog/millions-of-canva-users-data-stolen-as-gnosticplayers-strikes-again] The group claimed to exfiltrate data and offered it for sale on breached forums, with motives of financial gain. The breach was caused by credential stuffing and credential cracking. [https://ieeexplore.ieee.org/document/9799087] Passwords were hashed with bcrypt; however, they were later decrypted. | |||
The data exfiltrated from the breach included: email addresses, real names, cities and countries of residence, public profile data, and partially hashed passwords (for users logged in directly with Canva, not externally). Payment data was not accessed. | |||
===[Company]'s response=== | ===[Company]'s response=== | ||
Canva alerted users on May 25, 2019, to reset their passwords through email and in app alerts. To improve security, Canva introduced Multi-factor authentication (MFA), enhanced security measures (not specified), and regular security audits.[https://www.huntress.com/threat-library/data-breach/canva-data-breach] | |||
==Lawsuit== | ==Lawsuit== | ||
Revision as of 20:12, 24 March 2026
❗Article Status Notice: This Article is a stub
This article is underdeveloped, and needs additional work to meet the wiki's Content Guidelines and be in line with our Mission Statement for comprehensive coverage of consumer protection issues. Learn more ▼
On May 24, 2019, Canva identified their systems were attacked and posted an announcement about the breach, urging users to change their passwords. 139 million users were affected, and information taken includes usernames, real names, email addresses, and location. 61 million users' data included password hashes, and for other users, Google tokens were taken. Seven months later, on the 11th of January 2020, Canva became aware of 4 million user passwords had been decrypted and shared online. Following the discovery, on the 12th of January Canva has forcefully reset the password of every user that had not changed it since the date of the incident.
Background
[Incident]
The attack was linked to a group known as GnosticPlayers. [1] The group claimed to exfiltrate data and offered it for sale on breached forums, with motives of financial gain. The breach was caused by credential stuffing and credential cracking. [2] Passwords were hashed with bcrypt; however, they were later decrypted.
The data exfiltrated from the breach included: email addresses, real names, cities and countries of residence, public profile data, and partially hashed passwords (for users logged in directly with Canva, not externally). Payment data was not accessed.
[Company]'s response
Canva alerted users on May 25, 2019, to reset their passwords through email and in app alerts. To improve security, Canva introduced Multi-factor authentication (MFA), enhanced security measures (not specified), and regular security audits.[3]
Lawsuit
Consumer response