April 23, 2025
Trending News

The source code of most of the Russian “Yandex” services leaked to the network

  • January 27, 2023
  • 0

The total size of the leak was 44.7 gigabytes in compressed form. “Yandex” has already confirmed the fact of the leak, while the media reported that the data

The source code of most of the Russian “Yandex” services leaked to the network

The total size of the leak was 44.7 gigabytes in compressed form. “Yandex” has already confirmed the fact of the leak, while the media reported that the data was leaked by someone from the company itself.

what is known

Codes are organized with comments and documentation. The distribution includes separate archives (.tar.bz2) whose names can be used to identify specific Yandex services. Contain:

  • Search engine and indexing bot,
  • “Yandex.Maps”,
  • Voice assistant “Alice”,
  • “Yandex.Taxi”,
  • Advertising service “Yandex.Direct”,
  • “Yandex.Poshta”,
  • “Yandex.Disk”,
  • “Yandex.Market”,
  • “Yandex.Travel”,
  • “Yandex360”,
  • “Yandex. Cloud”,
  • “Yandex.Pay”,
  • “Yandex. Metric”.
  • The files also contain the server portion of most of the company’s other services and Solomon’s internal diagnostics.

The dump is distributed via torrents and all leaked files are dated February 24, 2022. At the same time, the hackers who leaked it say they uploaded the archive in July 2022.

Already in the press service of “Yandex” He confirmed the fact of the leak, emphasizing that the company has not been hackedand repositories are only required to work with code and are not designed to store users’ personal data. Experts who analyzed the leak really did not find any information about users there.

“Yandex” is not hacked. Security service “Yandex” discovered code fragments from internal repository in public access. But their content is different from the current version of the repository used in Yandex services.
– company representatives comment.

According to experts, the leaked data, unfortunately, does not pose a great danger to Yandex, because it does not contain the essential elements necessary, for example, to gain access to the systems. But even this code allows hackers to search for potential vulnerabilitiesthen to attack the services.

Source: 24 Tv

Leave a Reply

Your email address will not be published. Required fields are marked *