Data leak

Dell customer data breach via partner portal API scraping

πŸ“… 2024-04-28 🏒 Dell partner portal API
Primary Source β†—

Incident Details

Threat actor ‘Menelik’ registered as a Dell partner using fake company information (access granted within 24–48 hours), then used automated tooling to enumerate 49 million customer records by brute-forcing 7-digit service tag numbers via the partner API. Data included names, physical addresses, Dell order details, service tags, and system serial numbers. No payment info, email addresses, or phone numbers accessed. Disclosed 10 May 2024. A separate employee breach in September 2024 exposed 10,800 employees’ internal IDs and employment status via a different Dell systems compromise.

Technical Details

Initial Attack Vector
CWE-284: Improper Access Control (unauthenticated/weakly authenticated partner portal API allowing automated enumeration of service tags)
Vendor / Product
Dell partner portal API

Timeline

  1. 2024-04-28 Breach occurred
  2. 2024-05-10 Publicly disclosed
  3. 2024-05-10 Customers notified