Data leak
Dell customer data breach via partner portal API scraping
Primary Source βIncident Details
Threat actor ‘Menelik’ registered as a Dell partner using fake company information (access granted within 24β48 hours), then used automated tooling to enumerate 49 million customer records by brute-forcing 7-digit service tag numbers via the partner API. Data included names, physical addresses, Dell order details, service tags, and system serial numbers. No payment info, email addresses, or phone numbers accessed. Disclosed 10 May 2024. A separate employee breach in September 2024 exposed 10,800 employees’ internal IDs and employment status via a different Dell systems compromise.
Technical Details
- Initial Attack Vector
- CWE-284: Improper Access Control (unauthenticated/weakly authenticated partner portal API allowing automated enumeration of service tags)
- Vendor / Product
- Dell partner portal API
Timeline
- 2024-04-28 Breach occurred
- 2024-05-10 Publicly disclosed
- 2024-05-10 Customers notified