Adobe has confirmed that over 2.9 million of its customers might have been affected by a data breach and the hackers may have access to customer financial information. The company said on Thursday that it discovered what it calls "sophisticated attacks" on its networks. These attacks gave the attackers access to product source codes and customer information.

Earlier this week, Adobe said its product source code had been breached. The firm credited journalist Brian Krebs and researcher Alex Holden of Hold Security for helping it react to the case. After the breach, Adobe claimed it had no idea of any form of exploits towards its products because of the attacks.

Adobe announced on Thursday that customer information such as names, encrypted credit or debit card numbers, expiration dates and "other information" may have been accessed by hackers. However, the company has no evidence of any credit card data being exported from its system during the attack.

According to Adobe's Chief Security Officer Brad Arkin in an interview with Krebs on Security, "we are in the early days of what we expect will be an extremely long and thorough response to this incident." He went on to state, "We're still at the brainstorming phase to come up with ways to provide higher level of assurance for the integrity of our products, and that's going to be a key part of our response."

Adobe believes the attack took place sometime between mid-August and September 17. The company has reset the passwords of all customers whose credit card information, it believes, have been compromised in the attack. It has also alerted its customers so that they can take the necessary actions such as changing password.

At the moment, Adobe is investigating the breach along with the assistance of the federal law enforcement. It is not certain who is behind the attack, or what they plan on doing with whatever data that was collected from the attack.

The company will be releasing security updates next Tuesday for Adobe Acrobat and Adobe Reader. For more information, head over here.

ⓒ 2024 TECHTIMES.com All rights reserved. Do not reproduce without permission.
Join the Discussion