Connect with us

Hi, what are you looking for?

Tech & Science

Chess.com discloses recent data breach via file transfer app

The routine failure of traditional, perimeter-based security constructs against these threats is undeniable.

A trove of documents from I-Soon, a private contractor that competed for Chinese government contracts, shows that its hackers compromised more than a dozen governments, according to cybersecurity firms SentinelLabs and Malwarebytes
A trove of documents from I-Soon, a private contractor that competed for Chinese government contracts, shows that its hackers compromised more than a dozen governments, according to cybersecurity firms SentinelLabs and Malwarebytes - Copyright AFP/File Daniel LEAL
A trove of documents from I-Soon, a private contractor that competed for Chinese government contracts, shows that its hackers compromised more than a dozen governments, according to cybersecurity firms SentinelLabs and Malwarebytes - Copyright AFP/File Daniel LEAL

In September it was reported that the website Chess.com (the leading online chess platform) had again fallen victim to a data breach. First observed in June 2025, the threat actors continued to hold access to the application for two weeks, between June 5 and June 18. The recent issue has impacted a total of 4,541 individuals.

Unlike the previous November 2023 incident, where over 800,000 user records were scraped from its website by exploiting an API flaw and later posted on a hacking forum. This time, it was a result of an unnamed third-party app.

Looking into this cybersecurity challenge for Digital Journal is Mayank Kumar, Founding AI Engineer at DeepTempo, who states:“This recent attack on Chess.com is more than a pawn in a security game. While the impact seems minor, its true significance lies not in the volume of records lost but in its vector of compromise: a third-party file transfer application.”

Kumar  begins his analysis, noting: “The anatomy of any large-scale system reveals high volumes of such third-party integrations, where potential vectors range from a compromised API key or OAuth token with excessive permissions to a zero-day vulnerability within the vendor’s software stack.”

Considering the specific set-up, Kumar assesses: “In a distributed environment, each third-party integration acts as a trusted node, extending the internal network’s trust boundary to external, unaudited codebases and expanding the attack surface with every API call.”

In terms of the root cause, Kumar suspects: “The exfiltration of PII by an external application is a clear indicator of a failure to enforce the principle of least privilege, likely stemming from a lack of granular control over service account credentials. This exfiltrated data should not be dismissed as low-impact; it constitutes high-fidelity intelligence for the reconnaissance phase of the cyber kill chain. Threat actors can leverage this information to execute sophisticated social engineering attacks designed to bypass MFA, such as SIM-swapping or targeted requests to IT help desks, ultimately facilitating lateral movement and privilege escalation.”

Dealing with the weakness further, Kumar finds: “The routine failure of traditional, perimeter-based security constructs against these threats is undeniable.”

In terms of preventative measures, Kumar recommends: “A robust defensive posture necessitates a Zero-Trust architecture, implemented through concrete technical controls like workload micro-segmentation and an identity-aware proxy to enforce context-based access policies on a per-request basis.”

He further advises: “This architecture must be instrumented with adaptive behavioural anomaly detection, which can baseline normal activity and flag the exfiltration of 4,500 user records as a high-confidence indicator of compromise, drastically reducing attacker dwell time. The paradigm has shifted from defending a static perimeter to neutralizing threats deep within the security infrastructure itself.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Entertainment

Veteran actresses Maureen McCormick ("The Brady Bunch") and Sharon Lawrence ("NYPD Blue") play pen pals in the Off-Broadway production of “Pen Pals,” which is...

Tech & Science

A swarm of AI "crawlers" is running rampant on the internet, scouring billions of websites for data to feed algorithms at leading tech companies.

Business

A pair of swivelling, human-like robotic arms, built for physical AI research, mirror the motions of an operator in a VR headset.

Tech & Science

Big tech platforms, including TikTok and Netflix, are all looking to add video podcasts to their content, a rapidly growing format.