Someone used a vulnerable email tool to validate previously breached records Credit: Thinkstock On Monday, DomainTools, an intelligence platform used by researchers around the globe, warned customers to change their passwords after a weekend incident correlated existing accounts with data previously exposed in some of this year’s largest data breaches.DomainTools is a one-stop shop for IP and DNS information, as well as historical records for domains and hosting.Researchers and journalists alike often find themselves turning to the service in order to connect the dots between a set of domains or hosting providers, or to track the origin of an IP address.Customers of DomainTools started receiving warnings Monday, which urged them to change their passwords after someone conducted what the company is calling a “high-volume user email harvesting campaign” the previous Sunday. The email harvesting was successful due to a vulnerable script on the DomainTools website that deals with email updates.“To the best of our knowledge, no DomainTools customer login and password combinations were compromised by this scripting effort. However, the campaign appears to have correctly matched a few hundred current or historic DomainTools account email addresses,” the DomainTools letter says. “We encourage DomainTools account holders to change their passwords as a precautionary security measure. From our investigation it appears the actor used email addresses from prior well-known breaches and ran those against our email update process. This campaign resulted in the DomainTools website confirming the existence of a limited number of user email addresses in our membership system. From there, the attacker could conceivably attempt login/password combinations sourced from those prior data dumps such as LinkedIn or Dropbox.” Salted Hash has reached out to DomainTools in order to determine the exact number of accounts exposed. The company’s letter says the system being exploited has since been patched, and they’ve added additional monitoring to prevent abuse.The DomainTools notice isn’t the first time the LinkedIn data breach has been tied to additional security incidents.Over the summer, industry sources told Salted Hash they’ve seen upwards of thirty instances where an organization has been compromised due to data on LinkedIn that was exposed.Earlier this month, Amazon reset customer passwords as a precaution after they discovered customers recycling their credentials.Mass collections of compromised records appear on the web daily, and sometimes the public is informed about them. More often than not however, they’re hoarded and traded among criminals online.Since September, LeakedSorce has added more than 300 million records to their database, a collection that spans nearly 2.5 billion records. Another popular service, ‘Have I been pwned?’ houses nearly 2 billion records itself. It should come as no surprise that someone would check a list of email addresses in order to determine all of the places where it’s used.The question is – why would they be checking for valid DomainTools accounts? Related content news Gwinnett Medical Center investigating possible data breach After being contacted by Salted Hash, Gwinnett Medical Center has confirmed they're investigating a security incident By Steve Ragan Oct 02, 2018 6 mins Regulation Data Breach Hacking news Facebook: 30 million accounts impacted by security flaw (updated) In a blog post, Facebook’s VP of product management Guy Rosen said the attackers exploited a flaw in the website's 'View As' function By Steve Ragan Sep 28, 2018 4 mins Data Breach Security news Scammers pose as CNN's Wolf Blitzer, target security professionals Did they really think this would work? By Steve Ragan Sep 04, 2018 2 mins Phishing Social Engineering Security news Congress pushes MITRE to fix CVE program, suggests regular reviews and stable funding After a year of investigation into the Common Vulnerabilities and Exposures (CVE) program, the Energy and Commerce Committee has some suggestions as to how it can be improved By Steve Ragan Aug 27, 2018 3 mins Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe