{
	"id": "c8d4f8bc-d105-48fa-af44-6410a30b5f86",
	"created_at": "2026-04-06T00:16:46.299354Z",
	"updated_at": "2026-04-10T03:28:46.870293Z",
	"deleted_at": null,
	"sha1_hash": "6189809cbca4b632d1b4ad29d65844e60aee0174",
	"title": "E-commerce giant Mercado Libre confirms source code data breach",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 1204760,
	"plain_text": "E-commerce giant Mercado Libre confirms source code data breach\r\nBy Ax Sharma\r\nPublished: 2022-03-08 · Archived: 2026-04-05 17:06:29 UTC\r\nArgentinian e-commerce giant Mercado Libre has confirmed \"unauthorized access\" to a part of its source code this week.\r\nMercado additionally says data of around 300,000 of its users was accessed by threat actors.\r\nThe company's announcement follows a poll by the data extortion group, Lapsus$ in which they threatened to leak data\r\nallegedly stolen from Mercado and other prominent companies.\r\nhttps://www.bleepingcomputer.com/news/security/e-commerce-giant-mercado-libre-confirms-source-code-data-breach/\r\nPage 1 of 4\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/e-commerce-giant-mercado-libre-confirms-source-code-data-breach/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\nData of 300,000 MercadoLibre users accessed\r\nIn a press release and a Form 8-K filing seen by BleepingComputer today, MercadoLibre confirmed that a part of its source\r\ncode had been subject to unauthorized access.\r\nAdditionally, data of MercadoLibre's 300,000 users was accessed according to its initial analysis. At this time, it does not\r\nappear that Mercado's IT infrastructure was affected or that sensitive information has been compromised.\r\nIt is not clear at this time if the information of these 300,000 Mercado users was stored in one of the source code repos—a\r\npractice BleepingComputer has come across before when reporting on some data breach cases.\r\nThe company says it has activated security protocols and a thorough analysis is in progress.\r\n\"We have not found any evidence that our infrastructure systems have been compromised or that any\r\nusers' passwords, account balances, investments, financial information, or credit card information were obtained. We are\r\ntaking strict measures to prevent further incidents,\" says Mercado.\r\nHeadquartered in Buenos Aires, MercadoLibre makes up Latin America's largest e-commerce and payments ecosystem.\r\nThe company boasts a user base of around 140 million unique active users and is present across eighteen countries\r\nincluding Argentina, Brazil, Mexico, Colombia, Chile, Venezuela, and Peru.\r\nThe American arm of the company, Mercado Libre, Inc. operates online marketplaces including mercadolibre.com.\r\nLapsus$ claims to have breached 24,000 repos\r\nData extortion group Lapsus$ claims to have accessed 24,000 source code repositories of both MercadoLibre and Mercado\r\nPago, as seen by BleepingComputer.\r\nA Telegram channel run by Lapsus$ published a poll on March 7th, mockingly asking users to vote for the company whose\r\ndata Lapsus$ should leak next.\r\nThe list of alleged victims also includes Impresa and Vodafone. Lapsus$ states the poll will close on March 13th, 2022 at\r\n00:00.\r\nhttps://www.bleepingcomputer.com/news/security/e-commerce-giant-mercado-libre-confirms-source-code-data-breach/\r\nPage 3 of 4\n\nLapsus$ Telegram chat with alleged victims (BleepingComputer)\r\nThe development resembles Lapsus$'s last week's leak of 190 GB-large archives that the group claimed contained\r\n\"confidential Samsung source code.\" The same week, Samsung confirmed that threat actors had indeed breached its network\r\nand stolen confidential information, including source code present in Galaxy smartphones.\r\nExtortion groups like Lapsus$ breach victims but as opposed to encrypting confidential files like a ransomware operator\r\nwould, these actors steal and hold on to victims' proprietary data, and publish it should their extortion demands be not met.\r\nEarlier this month, Lapsus$ claimed responsibility for a data breach at the American chipmaker giant, NVIDIA. The breach\r\nresulted in the theft of more than 71,000 NVIDIA employee credentials, with some credentials leaked online.\r\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/e-commerce-giant-mercado-libre-confirms-source-code-data-breach/\r\nhttps://www.bleepingcomputer.com/news/security/e-commerce-giant-mercado-libre-confirms-source-code-data-breach/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/e-commerce-giant-mercado-libre-confirms-source-code-data-breach/"
	],
	"report_names": [
		"e-commerce-giant-mercado-libre-confirms-source-code-data-breach"
	],
	"threat_actors": [
		{
			"id": "be5097b2-a70f-490f-8c06-250773692fae",
			"created_at": "2022-10-27T08:27:13.22631Z",
			"updated_at": "2026-04-10T02:00:05.311385Z",
			"deleted_at": null,
			"main_name": "LAPSUS$",
			"aliases": [
				"LAPSUS$",
				"DEV-0537",
				"Strawberry Tempest"
			],
			"source_name": "MITRE:LAPSUS$",
			"tools": [
				"Mimikatz"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "d4b9608d-af69-43bc-a08a-38167ac6306a",
			"created_at": "2023-01-06T13:46:39.335061Z",
			"updated_at": "2026-04-10T02:00:03.291149Z",
			"deleted_at": null,
			"main_name": "LAPSUS",
			"aliases": [
				"Lapsus",
				"LAPSUS$",
				"DEV-0537",
				"SLIPPY SPIDER",
				"Strawberry Tempest",
				"UNC3661"
			],
			"source_name": "MISPGALAXY:LAPSUS",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "2347282d-6b88-4fbe-b816-16b156c285ac",
			"created_at": "2024-06-19T02:03:08.099397Z",
			"updated_at": "2026-04-10T02:00:03.663831Z",
			"deleted_at": null,
			"main_name": "GOLD RAINFOREST",
			"aliases": [
				"Lapsus$",
				"Slippy Spider ",
				"Strawberry Tempest "
			],
			"source_name": "Secureworks:GOLD RAINFOREST",
			"tools": [
				"Mimikatz"
			],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "52d5d8b3-ab13-4fc4-8d5f-068f788e4f2b",
			"created_at": "2022-10-25T16:07:24.503878Z",
			"updated_at": "2026-04-10T02:00:05.014316Z",
			"deleted_at": null,
			"main_name": "Lapsus$",
			"aliases": [
				"DEV-0537",
				"G1004",
				"Slippy Spider",
				"Strawberry Tempest"
			],
			"source_name": "ETDA:Lapsus$",
			"tools": [],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434606,
	"ts_updated_at": 1775791726,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/6189809cbca4b632d1b4ad29d65844e60aee0174.pdf",
		"text": "https://archive.orkl.eu/6189809cbca4b632d1b4ad29d65844e60aee0174.txt",
		"img": "https://archive.orkl.eu/6189809cbca4b632d1b4ad29d65844e60aee0174.jpg"
	}
}