The Life360 safety and location services provider claims it was the target of an extortion attempt after a threat actor breached and stole critical data from a Tile customer support website.
The company disclosed that an attacker infiltrated a Tile customer support portal, allowing it to acquire access to various details, such as names, addresses, email addresses, phone numbers, and device identification numbers.
Moreover, the company assured everyone that the disclosed data does not include sensitive details, such as credit card numbers, passwords or log-in credentials, location data, or government-issued identification numbers, since the Tile customer support platform did not store such data.
In addition, a company representative stated that they believe this incident was limited to the specific Tile customer support data.
The Life360 breach resulted in a credential heist.
Life360 did not disclose how the threat actor gained access to its platform, but it did claim that it had taken precautions to secure its systems from similar attacks and had notified the extortion attempts to relevant law enforcement agencies.
Furthermore, the corporation has included in its advisory when it discovered the hack or how many consumers were affected by the data breach. On the other hand, a spokesperson for the affected platform refused to answer any inquiries, stating that the company is investigating the incident and has yet to provide any updates.
While Life360 did not disclose details about the purported breach, a local media outlet reported that the hacker used what are thought to be stolen credentials from a former Tile employee to access various Tile systems.
A threat actor also claimed that one compromised tool helps it find Tile customers based on their phone numbers or private hash IDs. In contrast, others allow creating admin users, sending alerts to Tile users, and transferring Tile device ownership.
However, the attacker stole Tile customer names, addresses, email addresses, phone numbers, and device-identifying numbers via a different method, issuing millions of requests without being discovered.
It is unclear whether the threat actor will leak the stolen credentials. Still, this type of product is frequently sold on hacking forums and dark web markets to improve the threat actor’s reputation.
Therefore, potentially affected individuals should be wary of unsolicited communications as the threat actor may use them for other illicit activities, such as fraud or phishing.
