Roku Streaming service provider Roku has said that it has identified a second cyberattack that has impacted about 576,000 accounts.
The company said it detected the breach while investigating an attack earlier this year that affected 15,000 user accounts.
The company, which had more than 80 million active accounts, said the hackers did not gain access to any sensitive information such as full credit card numbers or other payment details.
Earlier this year, Roku said its security monitoring systems detected an increase in unusual account activity. It said unauthorized actors had accessed about 15,000 Roku user accounts using login credentials stolen from another source unrelated to Roku through a method known as “credential stuffing.”
Read more How can broadcast engineers keep pace with seismic shifts in the media tech landscape?
Credential stuffing is a type of automated cyberattack where fraudsters use stolen usernames and passwords from one platform and attempt to log in to accounts on other platforms. The method exploits the practice of individuals reusing the same login credentials across multiple services.
During further monitoring, Roku said it identified a second incident which impacted approximately 576,000 additional accounts.
Roku said that in less than 400 cases, malicious actors logged in and made unauthorised purchases of streaming service subscriptions and Roku hardware products using the payment method stored in these accounts.
Roku said it is implementing a number of controls and countermeasures to detect and deter future credential stuffing incidents.
This includes enabling two-factor authentication (2FA) for all Roku accounts, even for those that have not been impacted by these recent incidents.
The company said it would refund or reverse charges for accounts where it has determined unauthorised purchases have been made as part of the attack.
Read more Richard Johnston to step down as Chair of ScreenSkills
No comments yet