The Russian hacker, hiding under the nickname w0rm , has posted on his Twitter link to the company's internal JIRA (or rather, to the FishEye code change tracker) and data to access it.
Yota pays great attention to the safety and security of data. Judging from the published information, the w0rm account gained access to the test environment of auxiliary systems of the modem product. This system is in no way connected with billing, or with the personal data of Yota customers, or with any other data affecting the security and performance of the systems. And the user, despite his statements, did not make any changes to the code.
The changes made were made by the actual developer, while the w0rm account simply set the developer's name for himself to make a screen and give what he wanted to be true. At the moment, external access to the test environment is already closed. This forgery of information does not affect the business and safety of clients.
Source: https://habr.com/ru/post/356996/
All Articles