investigators codecov 29k aprilsatterreuters

The investigation into the data breach found that 5.1 million records were taken from the investigators’ database.

In the aftermath of the breach

29k April has been found to be on the security team for the Hacking Team. She had to look into claims that an internal system had been broken into.
The investigation has found that on April 29, an unknown hacker sent an email to Hacking Team’s system administrators about the data breach and asked for a ransom. The files that were taken were on a Dropbox account that the email linked to. When the security team at Hacking Team got this email, they started looking for signs that someone had hacked into their systems. They also tried to get in touch with April, but she was out of town at the time.
When our security team looked at the stolen data, they couldn’t find any signs that the Hacking Team’s networks had been broken into. Instead, it seemed like April was tricked into giving up her passwords, which were then used to get into her own email account. We think that the hacker got into April’s network by sending her an email with a malicious link or attachment or by getting her to click on a fake website URL. This left her laptop open to attack, and he was able to get into her network.


April 29, 2019

We are still looking into what happened in March 2019. We found that the release from April 29 had more than 5,100 lines of code, while the release from April 4 only had 1,400 lines of code. This happened at a time when we think one or more files related to our test suite were changed on purpose in a way that would hurt performance.

investigators codecov

Taking a look at Codecov

29k April




Investigators are trained professionals who can help you figure out what happened to your data. After a data breach, many companies and people have asked for our help. We can help if you think someone may have broken into your business. Or, if you think that your company has been hacked, we can help. We have worked with law enforcement and government agencies for a long time to look into breaches and find proof. Please contact us as soon as possible to find out how we can help.

Leave a Reply

Your email address will not be published. Required fields are marked *