Bienvenue dans le rapport hebdomadaire de Data Breach de GearBrain, une collection de violations bien connues des bases de données commerciales où l’accès non autorisé à vos informations personnelles a eu lieu. La fréquence de ces introductions par effraction semble augmenter, donc chaque semaine nous mettons à jour notre rapport avec les dernières nouvelles sur les derniers pirates et des liens vers où vous pouvez agir – que vous soyez préoccupé par votre vie privée ou non. Cette semaine, Princess Cruises (oui, Princess Cruises) a reconnu une faille de sécurité sur son site au printemps dernier qui a rendu visibles les informations sur les passagers, le personnel et l’équipage. TrueFire, un site Web qui propose des leçons de guitare et des guides, a découvert que ses plus d’un million de clients ont été piratés pendant plus de six mois et ont attaqué le ministère de la Santé et des Services sociaux dimanche et lundi – alors que le monde poursuit sa lutte contre le virus mondial.
Semaine 16 mars 2020: Princess Cruises
La princesse Cruise a été reconnue comme une infraction pendant plus de trois mois en 2019
La compagnie de croisière appartenant à Carnival Corp, comme si Princess Cruise n’avait pas eu assez à faire après avoir été fermée par un coronavirus, a maintenant admis qu’une faille de sécurité potentielle avait affecté son système du 11 avril au 23 juillet 2019. Après avoir reçu l’accès aux comptes de messagerie des employés, Princess Cruises a déclaré a ensuite vu des informations sur les autres membres d’équipage, les employés et les invités les plus enthousiastes. La sécurité sociale, les numéros de passeport, les informations sur le permis de conduire, les informations de compte et bien plus étaient peut-être visibles. L’entreprise a publié des détails sur son site Web et a encouragé toutes les parties intéressées à contacter l’entreprise. En attendant, commencez à utiliser le vérificateur de mots de passe – tout en changeant également ces mots de passe. Oui encore.
Leçon de guitare TrueFire a découvert des failles de confidentialité affectant plus d’un million de ses clients
TrueFire, un site Web qui propose des leçons de guitare et des guides en ligne, a constaté qu’il y avait une infraction qui a duré environ six mois – d’août 2019 à janvier 2020. En conséquence, les informations personnelles de plus d’un million d’utilisateurs, y compris les numéros de carte de crédit, les noms, les adresses et même les codes de sécurité, entre autres.Rien sur le site ne donne la moindre indication d’une violation que TrueFire prétend avoir trouvée le 10 janvier 2020. Mais il a envoyé des lettres aux personnes concernées, selon Guitar.com, qui a déclaré avoir entendu parler de l’un des utilisateurs.
Ministère de la santé et des services sociaux
Il a été piraté plus tôt cette semaine, selon le département américain de la Santé et des Services sociaux
Le département américain de la Santé et des Services sociaux a déclaré qu’il avait passé dimanche et lundi à lutter contre son système pour un pirate informatique, a rapporté le New York Times. Le département a déclaré lundi que l’attaque n’avait pas fonctionné – mais à un moment où les groupes de santé du monde entier tentent de lutter contre le coronavirus, la société était au moins inopportune. Les responsables tentent de découvrir qui attaquait les entreprises susceptibles d’influer sur la propagation du virus. Mais les experts ont déjà averti que les cybercriminels avaient tenté d’exploiter les craintes du coronavirus pour propager des logiciels malveillants.
Semaine du 9 mars: huit millions d’espaces commerciaux eBay et Amazon dévoilés
La principale histoire de cette semaine est une base de données qui a été accidentellement publiée et contient huit millions de dossiers d’achat d’Amazon eBay, PayPal, Shopife et Stripe. Les informations trouvées dans un moteur de recherche régulier ont révélé par erreur un tiers anonyme. une entreprise frontalière qui effectue une analyse transfrontalière de la taxe sur la valeur ajoutée (TVA). La plupart des informations provenaient de magasins en ligne au Royaume-Uni et en Europe et comprenaient des noms, des adresses de livraison, des adresses e-mail, des numéros de téléphone, des produits achetés, des paiements, des numéros de commande, des liens vers les factures Stripe et Shopify et les quatre derniers chiffres de votre carte de crédit. numéros. Les moteurs de recherche ont exploré une base de données non chiffrée le 2 février, qui a été découverte un jour plus tard par la société de cybersécurité Comparitech, immédiatement avertie par Amazon. Le propriétaire a ensuite fermé la base de données le 8 février.
Le gouvernement néerlandais perd des données sur 6,9 millions de donneurs enregistrés
Les disques durs des ordinateurs externes qui ont stocké 6,9 millions de données de donateurs enregistrés de février 1998 à juin 2010 ont été déclarés perdus cette semaine. Utilisées pour la dernière fois en 2016, les paires de stations ont été placées dans un coffre-fort, mais cette semaine, le ministre néerlandais de la Santé, du Bien-être et des Sports a admis avoir disparu plus tôt en 2020, rapporte ZDnet. . Bien que des responsables néerlandais soient portés disparus, ils ont affirmé que les informations n’avaient pas encore été utilisées pour usurpation d’identité ou fraude.
Whisper, l’application de partage secret, révèle 900 millions de registres d’utilisateurs
Whisper, autrefois une application pour smartphone extrêmement populaire où les utilisateurs peuvent partager des secrets de manière anonyme, a depuis des années laissé des informations privées et sensibles sur des centaines de millions de personnes dans une base de données publique. La base de données sans mot de passe, accessible à tous, comprenait les surnoms et l’âge, le sexe, l’origine ethnique, l’emplacement et les informations sur les groupes auxquels ils appartenaient dans l’application. De nombreux groupes de discussion de Whisper traitaient du sexe et de l’orientation. , Avec 3 millions d’utilisateurs déclarant leur tranche d’âge 15. Se décrivant comme «l’endroit le plus sûr sur Internet», Whisper, sorti en 2012, est disponible pour iOS et Android, et bien qu’il ne soit pas si populaire aujourd’hui, il comptait 3 milliards de pages vues par mois à la fin de 2013. La plupart de ses utilisateurs ont entre 18 et 24 ans, principalement des femmes, et en plus de leurs ordinateurs personnels, les données comprenaient les coordonnées GPS de l’endroit où chaque utilisateur a envoyé son message le plus récent.
Semaine du 2 mars 2020: Virgin Media révèle des données pour près d’un million de personnes
Près d’un million de personnes ont été disponibles en ligne pendant dix mois sur Virgin Media, a annoncé jeudi la société. Même si les mots de passe et les informations financières n’étaient pas inclus, les numéros de téléphone, la date de naissance, les adresses e-mail et les adresses personnelles étaient stockés dans une base de données. Virgin Media a déclaré que la base de données était Virgin Media a déclaré avoir fermé l’accès à la base de données, mais avant de découvrir certains détails étaient « un accès non autorisé ». Selon l’entreprise, elle avait déjà notifié 900 000 personnes impliquées qui semblaient recevoir des SMS.
Le pirate T-Mobile utilise les informations des clients et des employés
Ce que T-Mobile appelle des «attaques malveillantes» compromet les détails des clients et des employés. Les pirates ont accès aux informations de compte de messagerie qui incluent les noms, adresses, numéros de téléphone, numéros de compte, plans de tarification et informations de facturation des clients. Qu’est-ce qui n’était pas impliqué? Carte de crédit et ID de sécurité sociale.T-Mobile a déclaré avoir pu arrêter l’attaque. Alors qu’ils essaient d’obtenir des clients à part entière, ils encouragent les gens à tendre la main s’ils veulent savoir si leurs coordonnées ont été impliquées dans le piratage. Il est important de noter que T-Mobile déclare ne disposer d’aucune preuve que les informations collectées sont « mal utilisées » pour le moment.
J.Crew piraté en 2019, dit la société maintenant
Le détaillant J.Crew est peut-être connu pour son équipement de coiffure, mais cette fois, l’entreprise a été victime d’un autre type de piratage, qui a laissé des détails financiers à révéler aux clients. L’attaque a eu lieu vers avril 2019 et J.Crew informait désormais les clients du problème. Les numéros de carte de crédit, les dates d’expiration, les quatre derniers chiffres, le type de carte de débit utilisé, les adresses e-mail et physiques ainsi que les mots de passe sont dangereux. Que devez-vous faire? Ce que vous devez toujours faire – changer. Vous. Mot de passe.
24 février 2020, Semaine: Clearview AI
La firme controversée de reconnaissance faciale Clearview AI a contacté des clients cette semaine pour admettre que l’intrus avait volé la liste complète des clients. La société a reçu un rapport détaillé du New York Times en janvier, affirmant avoir recueilli plus de trois milliards de vues de membres du public en les détournant sur des comptes de médias sociaux publiquement visibles sur Facebook, Twitter, YouTube, LinkedIn. et d’autres – violation de leurs conditions. Clearview a déclaré dans un communiqué que ce vol de données faisait désormais partie de la vie. En plus de la liste des clients, des informations ont également été fournies sur le nombre de Clearviews que chaque client avait et le nombre de fois qu’il avait cherché dans la base de données d’images.
Cette semaine, Samsung a également admis avoir révélé les détails personnels de 150 clients sur son site Web britannique. L’étrange fuite d’informations a été accusée d ‘ »erreur technique » et les informations exposées comprenaient des noms, des numéros de téléphone, des adresses postales et électroniques et des commandes antérieures via la boutique en ligne de Samsung au Royaume-Uni. Les clients concernés seront contactés, a déclaré Samsung.
Slickwraps, une entreprise qui fabrique des skins en vinyle personnalisés pour téléphones et autres appareils, a admis cette semaine avoir été victime de la sécurité de l’information. L’accès est intervenu après que les clients de Slickwraps ont signalé avoir reçu un e-mail prétendant provenir d’une entreprise mais en réalité écrit par un pirate qui avait accès à une base de données clients. L’e-mail semble avoir été envoyé à 377 428 adresses et l’expéditeur a affirmé qu’il avait accès à la base de données des clients Slickwraps en lisant un message Medium maintenant supprimé, écrit par un pirate en apparence différent. Il a expliqué comment ils avaient accédé à la base de données grâce à la vulnérabilité. Dans un message de blocage, Slickwraps a signalé que les informations étaient incorrectes. abus public », qui comprenait des noms, des adresses postales et e-mail. Cependant, il a rassuré les clients que leurs informations financières étaient inaccessibles.
Semaine du 17 février 2020: des informations sur MGM Resorts apparaissent sur le site de piratage
Vous ne pouvez jamais être complètement incassable, comme le découvrent maintenant certains anciens clients du MGM Resort. La chaîne a annoncé cette semaine que plus de 10,6 millions de clients avaient été exposés à une violation de données en 2019 et ont maintenant une grande partie de leurs informations personnelles sur un forum de hackers – appelé des numéros de téléphone et même des dates de naissance. La base de données provient de clients qui ont séjourné dans les complexes MGM avant 2017, et ils incluent des noms bien connus de Justin Bieber sur Twitter à Jack Dorseye. Initialement, MGM Resorts a contacté ceux qui avaient été initialement affectés par la violation en août 2019.
US Department of Defense (Oui, vraiment)
Une agence du département américain de la Défense (DoD) a fait l’objet de failles de sécurité pouvant inclure son numéro de sécurité sociale. Le département, la Defense Information Systems Agency – ou DISA – a contacté les violations qui ont eu lieu entre la mi-février et mai-juillet 2019, rapporte Reuters, qui a vu la lettre envoyée par l’agence. Le rôle de la DISA, selon son site Internet, est de contrôler la manière géré et transmis au DoD, y compris des messages au président.
ISS World piraté
ISS World, un fournisseur de services de nettoyage, de restauration, de gestion et autres services d’assistance, a été victime de logiciels malveillants, a indiqué la société sur son site Web. Bien que les informations sur les clients ne semblent pas être affectées pour le moment, ses sociétés de services informatiques sont susceptibles de trouver ces options sombres car ISS a une « licence désactivée », selon .ISS possède des sociétés dans le monde entier, y compris la restauration basée aux États-Unis. Guckenheimer et une autre entreprise de restauration au Chili, Apunto.
Semaine 10 février 2020: Estée Lauder
Cette semaine, des chercheurs en sécurité ont découvert une énorme base de données clients totalement non protégée appartenant à la société américaine de cosmétiques Estée Lauder sur Security Discovery. La base de données contenait plus de 440 millions d’éléments de données, tous affichés en texte clair. Ces entrées comprenaient des adresses électroniques, des références, des documents internes, des adresses IP, des informations de stockage et d’autres informations qui semblent provenir d’un système de gestion de contenu appartenant à l’entreprise. Les informations client n’ont pas été compromises, mais la fuite accidentelle de tant d’informations commerciales reste une préoccupation majeure. Estée Lauder a déclaré dans sa déclaration: « Le 30 janvier 2020, nous avons été informés qu’un nombre limité d’adresses e-mail de non-consommateurs de la plate-forme de formation étaient temporairement disponibles via Internet. Cette plate-forme de formation n’était ni devant les consommateurs ni contenait des informations sur les consommateurs. utilisation non autorisée. »
Le groupe sud-africain de services financiers Nedbank a déclaré cette semaine qu’il enquêtait sur la sécurité des informations avec Computer Facilities, une société de marketing direct. Le matériel informatique envoie des SMS et des informations de marketing par e-mail aux clients au nom de Nedbank et d’autres clients.
Dans sa déclaration, Nedbank a expliqué comment « certaines des informations potentiellement compromises sur l’ordinateur contenaient des informations personnelles (noms, numéros d’identification, numéros de téléphone, adresses physiques et / ou e-mail) de certains clients de Nedbank ».
La société souhaite attirer l’attention sur le fait que les systèmes ou les comptes bancaires de Nedbank n’ont été « compromis » en aucune façon. Des experts en médecine légale ont été embauchés pour effectuer la recherche, a déclaré Nedbank.
L’identité d’un enfant de neuf ans a été volée après une violation de données
Enfin, un exemple de ce qui peut arriver si vos informations personnelles sont compromises. Une récente violation de données avec la société Oregon’s Health Share a entraîné le vol d’un garçon de neuf ans. Il a ensuite ouvert illégalement une carte bancaire américaine en son nom. La carte est arrivée au domicile familial peu de temps après que la mère du garçon a eu connaissance de la violation de données. En parlant des nouvelles de Street 2, Kristen Matthews a déclaré: « Ce n’est pas OK, surtout pour les enfants. Ce n’est pas OK. J’ai immédiatement commencé à voir du rouge parce que je n’ai jamais rien signé ici. » Le compte a ensuite été fermé par US Bank. , mais l’affaire sert à indiquer comment les informations personnelles volées ou divulguées peuvent être utilisées. Matthews a ajouté: « Cependant, il y a d’autres victimes. D’autres cartes peuvent être envoyées aux gens. »
Semaine du 3 février 2020: ne cliquez pas sur l’attaque de phishing par coronavirus
Les pirates utilisent la peur du coronavirus. La nouvelle attaque de phishing est conçue pour ressembler à un e-mail de l’Organisation mondiale de la santé. Inutile de dire que le message ne vient pas de l’Office des Nations Unies, mais plutôt d’une tentative pour que les gens cliquent sur un lien qui les mène à une fenêtre pop-up, leur demandant de taper leur adresse e-mail et leur mot de passe selon Sophos. le message contient en fait un certain nombre d’erreurs grammaticales – quelque chose à surveiller si vous recevez un e-mail d’un groupe officiel comme l’Organisation mondiale de la santé. Il y a aussi des mots mal orthographiés. Bien que les gens soient préoccupés par le coronavirus, cliquer sur le lien par e-mail – que vous n’avez pas demandé – n’est toujours pas la meilleure façon de procéder. Au lieu de cela, nous vous recommandons d’aller directement sur différents sites Web, et non via un lien.
La violation de l’influence d’Ashley Madison semble toujours
La nouvelle attaque affecte ceux dont les noms, mots de passe, informations de carte de crédit et numéros de téléphone ont été piratés il y a cinq ans par la violation de données d’Ashley Madison. Aujourd’hui, quelque 32 millions de comptes ont été ciblés – personnellement – par des escroqueries par e-mail qui menacent d’exposer des personnes si elles ne paient pas la rançon Bitcoin, selon Threatpost, pointant un message de Vade Secure qui a découvert l’arnaque. La demande est d’environ 1165 $ en Bitcoin caché comprend également un code QR que les filtres de messagerie n’aiment pas souvent. Le courrier électronique nécessite un paiement dans les six jours, sinon les coordonnées de la personne seront publiées. Vade Secure en a vu des centaines au cours de la semaine dernière et prévoit d’en voir davantage dans les mois à venir.
Des milliers de personnes enfreignent la règle du St. Louis Community College
Plus de 5100 personnes ont été affectées par une erreur de confidentialité au St. Louis Community College dans le Missouri, y compris des détails tels que les dates de naissance, les numéros IS universitaires, les noms, les adresses, les numéros de téléphone, les adresses e-mail et 71 personnes avec leur numéro de sécurité sociale. site de nouvelles locales KSDK.com. Le corps étudiant a raconté aux gens un piratage via une entreprise de phishing et qu’ils avaient pu refermer leurs comptes dans un délai d’environ 72 heures. Bien que l’école ait indiqué qu’elle contactera les participants au piratage, tous étudiants ou affiliés à l’université, ils doivent également être contactés.
Semaine du 27 janvier 2020: Wawa Inc.
En décembre 2019, Wawa, un magasin de carburant et de dépanneur américain, a admis avoir été victime d’une violation de la vie privée de neuf mois qui avait entraîné le vol d’informations sur la carte client. Il est désormais allégué que ces enregistrements de cartes volées sont vendus en ligne.
Les dossiers des clients de Wawa seraient un énorme élément parmi les 30 millions de comptes de cartes dans plus de 40 États qui sont proposés à la vente. Ils proviendraient « d’une nouvelle infraction massive à l’échelle nationale », rapporte Krebs sur la sécurité.
Les informations divulguées dans l’infraction comprennent les numéros de carte bancaire et de crédit, les dates d’expiration et les noms des titulaires de carte. Les numéros PIN et CVV n’ont pas été divulgués, a affirmé Wawa.
Nous encourageons les lecteurs à utiliser Wawa pour surveiller les notifications de leur carte et signaler les événements suspects à leur banque ou à l’émetteur de la carte.
Les Nations Unies
Cette semaine, il a été signalé que les Nations Unies étaient soupçonnées d’être victimes d’une cyberattaque parrainée par le gouvernement en juillet, mais n’ont pas informé le public ni influencé les travailleurs.
Selon des documents confidentiels divulgués au nouveau service humanitaire, l’attaque aurait pu toucher jusqu’à 4 000 travailleurs des Nations Unies. Les informations dangereuses comprenaient les dossiers du personnel, l’assurance maladie et les informations sur les contrats commerciaux.
Il est signalé que les pirates informatiques ont eu accès aux informations par manque de Microsoft SharePoint et ont utilisé des logiciels malveillants pour collecter des informations à partir des serveurs des Nations Unies dans trois de ses bureaux européens. On a demandé au personnel de changer son mot de passe mais on ne lui a pas expliqué pourquoi.
En 2019, les violations de données ont augmenté de 17%
Le rapport final de la semaine dernière du Identity Theft Resource Center a révélé que la violation de données aux États-Unis avait augmenté de 17% en 2019, contre 1473 en 2018.
Selon le rapport, 164 683 455 livres sensibles ont été découverts en 2004, soit 65% de plus qu’en 2018. Il est particulièrement intéressant de savoir comment la violation de données de Marriott pour 2018 a représenté 383 millions des 471 millions de documents volés dans l’année, ce qui montre une augmentation significative du vol de données. en 2019.
« L’augmentation des violations de données en 2019, sans surprise, est grave », a déclaré Eva Velasquez, PDG du Identity Theft Resource Center. « Il semble que 2018 ait été une anomalie en termes de violations de données signalées et de nombre d’enregistrements divulgués. Au cours de l’année de référence 2019, il y aura un retour au nombre toujours croissant d’infractions et au nombre d’enregistrements divulgués. »
Semaine du 20 janvier 2019: Microsoft dévoile 250 millions d’enregistrements
Microsoft a laissé 250 millions d’enregistrements ouverts – et l’a admis dans un article de blog. La violation, ouverte du 5 décembre 2019 au 31 décembre 2019, contenait des détails sur « l’analyse des cas de support », a déclaré la société, et les informations personnelles ont été « modifiées ». Bien que Microsoft ne dise pas combien d’enregistrements étaient impliqués, le site Comparitech, qui prétend avoir divulgué l’infraction, a signalé qu’il y avait 250 millions d’enregistrements. À l’intérieur se trouvaient des informations provenant de représentants et de clients de 2005 – bien avant le 5 décembre 2019, ce que Microsoft a reconnu dans un communiqué. Et ils ont contacté Microsoft le 29 décembre 2019, ont-ils déclaré. Microsoft elle-même a qualifié la situation de « mauvaise configuration » et que « les informations personnellement identifiables » n’ont pas été divulguées au monde extérieur. Cependant, les adresses IP et les emplacements étaient visibles.
THSuite Cannabis Pharmacy Violation
Le système de point de vente utilisé par les distributeurs de cannabis est entré dans une faille de confidentialité – dans certains cas, laissant aux acheteurs des informations sur le nom des anniversaires et parfois avec le nom de l’employé qui les a aidés, selon un nouveau rapport de VPN Mentor. Plus de 85 000 fichiers ont été découverts et contenaient plus de 30 000 disques de Amedicanna Dispensary, Colorado Grow Company et Bloom Medicinals. Mais VPN Monitor a averti que d’autres fournisseurs pourraient avoir été impliqués. Les données cassées différaient entre les différentes unités. Mais dans certains cas, les signatures des clients ont été détournées avec des dates de naissance et des pièces d’identité médicales. VPN Mentor a suivi la brèche dans un compartiment Amazon S3 non assuré. La base de données a été fermée le 14 janvier 2020. Mais chacun des trois clients des médecins devrait surveiller leur courrier électronique pour d’éventuelles attaques de phishing.
L’UPS Store divulgue les dossiers financiers et les identifiants des clients
UPS envoie des courriels à ses clients, admettant que les dossiers de certains clients dans une centaine de magasins ont été exposés par piratage par phishing. L’attaque a impliqué des détails dans des courriels envoyés à UPS pour impression et, dans certains cas, une pièce d’identité émise par le gouvernement et même certaines informations financières. La violation s’est produite entre le 29 septembre 2019 et le 13 janvier 2020, lorsque le pirate a pu accéder aux comptes de messagerie du magasin UPS. La société a déclaré qu’elle utiliserait un tiers de l’entreprise de cybersécurité pour enquêter sur l’affaire. Entre-temps, UPS fournit gratuitement une assistance de suivi du crédit et d’identification aux clients éligibles.
Equifax a décidé d’annuler au moins 380,5 millions de dollars d’indemnisation pour les victimes de la violation de données de 2017 qui menaçait 147 millions de consommateurs américains.
La société prévoit également de dépenser 1 milliard de dollars pour renouveler sa sécurité au cours des cinq prochaines années. Les consommateurs qui pensent avoir été victimes de l’infraction disposent d’une semaine (à partir du 15 janvier) pour déposer une demande d’indemnisation. Le montant obtenu dépend du nombre de personnes archivées.
Equifax a blâmé un cas en 2017 où des informations personnelles, y compris des numéros de sécurité sociale, ont endommagé un composant de serveur malveillant auquel un correctif était disponible à l’époque mais n’a pas été appliqué.
L’argent est utilisé pour payer les services de contrôle de crédit aux consommateurs concernés, et les individus peuvent avoir droit à une compensation allant jusqu’à 20 000 $, mais uniquement s’ils peuvent prouver qu’ils ont été financièrement affectés par la violation de la vie privée.
Les parents orientés application et nouveaux, conçus pour cataloguer les photos et vidéos de bébés, ont laissé des masses d’informations exposées sur un serveur non sécurisé pour que tout le monde puisse les voir. Une application appelée Peekaboo s’est révélée révéler plus de 100 Go d’informations, y compris les adresses e-mail des utilisateurs, mais aussi des photos et des vidéos de bébés.
Le serveur non sécurisé a révélé environ 800 000 adresses e-mail et environ 30 pieds d’informations de localisation précises, révélant efficacement où les gens avaient utilisé l’application sur leur smartphone. Un serveur non sécurisé a trouvé Dan Ehrlich à Twelve Security.
Ehrlich a déclaré à BankInfoSecurity: « Je n’ai jamais vu un serveur aussi ouvertement ouvert. Tout était étrange et incertain sur le serveur, le site Web de la société et l’application iOS / Android. »
Le développeur a depuis sécurisé le serveur et a annoncé qu’il analysera son système pour tout autre problème de sécurité.
La banque ouest-australienne P&N Bank a informé ses clients cette semaine d’une atteinte à la vie privée qui a révélé leurs informations personnelles. Les informations utilisées illégalement comprennent les noms de clients, les adresses, les adresses e-mail, les numéros de téléphone, les tranches d’âge, les numéros de compte et les soldes des comptes.
D’autres dossiers personnels, tels que les identifiants et les numéros de carte de crédit, n’ont pas été utilisés, a indiqué la banque, ajoutant qu’elle pensait que les informations avaient été ciblées vers le 12 décembre ou autour de la mise à niveau du serveur. La société embauchée par la banque pour héberger aurait été le point de départ des attaquants, a déclaré ZDnet.
A ce stade, la Banque souligne qu’aucun compte ou fonds client n’a été traité ou compromis. Nous travaillons actuellement avec les forces de l’ordre et les autorités fédérales pour enquêter sur ce qui s’est passé. On ne sait pas encore combien de clients ont été touchés.
Semaine du 6 janvier 2020: la ville de Las Vegas
Annoncée par KTNV, une chaîne locale, lors du lancement de la plus grande exposition technologique au monde, CES 2020, sa ville hôte a annoncé qu’elle avait en fait été exposée à des failles de confidentialité. La violation réelle s’est produite à 4h30 heure locale et Las Vegas a averti que certains services pourraient être interrompus en conséquence. Mais mercredi, la ville avait tout précisé et a tweeté qu’elle pensait qu’aucune information n’avait été prise ou perdue, mais qu’elle ne pouvait toujours pas montrer comment la violation s’était produite et qui était responsable.
Google paie 7,5 millions de dollars
Google paie 7,5 millions de dollars pour les fuites de données de son ancienne plateforme Google+, qui remonte à 2018, selon la loi 360. Mais l’entreprise n’a rien dit à personne pendant sept mois.
La société mère Bubba Gump piratée
Landry est la société mère de Joe’s Crab Shack, Bubba Gump Shrimp Co. et Morton’s The Steakhouse. Signaler des violations de données dans les restaurants de ses machines, a déclaré la société. Selon Landry, «dans certains cas», les logiciels malveillants de saisie des commandes, et non les systèmes de trop-payés, ont pu collecter des informations sur les cartes de débit même si elles n’étaient pas nommées. Ces choses se sont produites dès le 18 janvier 2019, mais ont pris fin le 17 octobre 2019. Bien sûr, quiconque entre dans la chaîne Landry doit faire attention à ses cartes de crédit.
30 décembre 2019: la base de données Wyze n’était pas chiffrée
Wyze, un fabricant de caméras de sécurité, de capteurs et d’ampoules, a laissé des millions de clients exposés et exposés à leurs serveurs, y compris leurs noms de caméras de sécurité, adresses e-mail et surnoms. Ces détails n’étaient pas chiffrés et toute personne connaissant l’emplacement de la base de données aurait pu collecter les informations. Les clients Wyze doivent être conscients d’éventuelles attaques de phishing – et même si les mots de passe n’apparaissent pas, ils doivent de toute façon modifier leur code de sécurité Wi-Fi.
Charges de la ville d’Aurora
La ville d’Aurora du Colorado a averti ses clients de l’eau que toute personne utilisant le système de paiement Click2Gov peut avoir enfreint son nom et son adresse de facturation sur les cartes utilisées jusqu’au numéro et à la date d’expiration. Les clients qui ont utilisé le système en ligne entre le 30 août et le 14 octobre 2019, de manière ponctuelle ou récurrente, peuvent faire la différence. La ville prévoit de lancer un autre système de paiement et également de créer un site Web pour les personnes qui souhaitent plus d’informations.
Systèmes de santé du Sinaï
Le Chicago Tribune affirme que des milliers de dossiers de patients sur les systèmes de santé du Sinaï – y compris l’hôpital Mount Sinai de Chicago – ont été violés. Deux comptes de messagerie d’employés ont été piratés et auraient pu être vus à travers leurs noms, adresses, dates de naissance, numéros de sécurité sociale et informations de santé. Les personnes susceptibles d’être touchées ont reçu des lettres du système.
Semaine 23 décembre 2019: Wawa: une petite atteinte à la vie privée avec votre café
Wawa, une chaîne de dépanneurs connue sur la côte est des États-Unis, a découvert des logiciels malveillants sur le système qu’elle utilisait pour collecter les informations de carte de crédit et d’autres paiements. Le malware a transféré les numéros de carte de crédit, les noms et autres informations des machines disponibles dans le commerce, y compris les pompes à essence. Cependant, les distributeurs automatiques de billets n’étaient pas impliqués, a indiqué la société. Jokainen 850 Wawa -paikasta kärsi ja rikkomus todennäköisesti jatkuu ainakin 4. maaliskuuta 2019 joulukuun 12. päivään, jolloin Wawa pystyi lopettamaan hyökkäyksen. Yrityksen mukaan se tavoittaa kaikki haittaohjelmien vaikutukset omaava yritys ja tarjoaa ilmaisia palveluita, kuten identiteettivarkaustarpeita, mukana oleville ihmisille. He ovat myös pyytäneet FBI: tä osallistumaan.
Facebook: Nimiä, puhelinnumeroita ja käyttäjätietoja rikottu
Viimeisin Facebook-tietojen rikkomus sisältää 267 miljoonaa Facebookin käyttäjätunnusta, puhelinnumeroa ja ihmisten nimeä, jotka näkyvät tietokannassa kaikkien nähtävissä. Tietotekniikan löysi tietoturvatutkija Bob Diachenko Comparitechistä. Hän uskoo, että se on kerätty sivuston laittomalta kaavailulta. Tietojen raaputtaminen on yksi tapa, jolla ihmiset voivat kerätä tietoja verkkosivustolta, jota käytetään yleensä saamaan paljon tietoa , joka voidaan sitten siirtää toiseen sivustoon tai toiseen tiedostoon. Tämä tehdään yleensä ohjelmalla tai botilla. Facebookin tietojen tapauksessa se siirrettiin hakkerifoorumiin, kertoo Comparitech, jonka ihmiset voivat ladata. Käyttäjätunnuksia ja puhelinnumeroita voidaan sitten käyttää tietojenkalasteluhyökkäyksiin ihmisiä vastaan.
Soittoäänet: Yli 3500 online-käyttäjän kirjautumistiedot
3 672 renkaan käyttäjän kirjautumistiedot – sähköpostit, salasanat, kameroiden nimet ja aikavyöhykkeet – ovat ilmestyneet verkkoon. Yhtiö kuitenkin väittää Buzzfeed News -sivuston välityksellä, että tiedot eivät tule rikkomuksesta, vain muutaman päivän kuluttua siitä, kun tarina murtui siitä, että joku murtautui jonkun kodin rengaskameraan ja puhui 8-vuotiaalle lapselle.Ring sanoo, että yksityiskohdat ovat tosiasiallisesti tietoja, jotka on kerätty muista online-tietokannoista ja sitten kokeiltu omissa järjestelmissä. Yhtiö kannustaa ihmisiä käyttämään kaksifaktorista todennusta laitteidensa suojaamiseksi.
Viikko 16. joulukuuta: NexusMods: Hakkeri ei pelannut pelejä
Pelisivusto NexusMods hälyttää käyttäjiä 8. marraskuuta 2019 lähtien tapahtuneesta tietorikkomuksesta, jonka ansiosta hakkeri näki tietueet joistakin plaatereista. Sivusto, joka vaatii pelaajien rekisteröitymistä ennen kuin ladataan pelejä, kuten Skyrim ja Fallout, haluaa ihmisten tietävän, että vaikka he pystyivät sammuttamaan tukiaseman, yksityiskohdat, kuten sähköpostiosoitteet, salasanan tiivisteet ja suolat, ovat saattaneet nähdä. He lähettivät uudet tiedot 19. joulukuuta 2019. Salasanan suolat ovat satunnaisdatan bittejä, jotka lisätään salasanalle, kun taas salasanan hajautusmuutos muuttaa salasanan toiseksi merkkijonoksi. Yhtiö pyytää käyttäjiä pitämään silmänsä auki tietojenkalastelua varten ja vaihtamaan myös uuteen käyttäjäympäristöönsä, jonka he ovat käynnistäneet – ja kyllä, tietysti, vaihda salasanasi.
LifeLabs maksoi lunnaat
Kanadan lääketieteellinen laboratorio LifeLabs maksoi hakkereille saadakseen takaisin omat tiedot yli 15 miljoonasta asiakkaasta. Otettuihin yksityiskohtiin sisältyivät nimet, kotiosoitteet, terveyskorttien numerot, syntymäajat, käyttäjätunnukset ja salasanat. Ontariossa asuvien 85 000 ihmisen lääketieteellisten testien tulokset.LifeLabs ei sano, minkä summan he maksoivat tietojensa saamiseksi, mutta he tweettivät, että « lainvalvontatutkimus on käynnissä », Torontossa toimiva yritys kirjoitti. He tekevät myös yhden vuoden ilmaisen tunnistusvarkauden ja seurannan asiakkaille.
Zynga: Keitä ei hakkeroitu?
Although Words With Friends maker Zynga admitted months ago about the hack of their data base (which we highlighted as one of our 12 all times worst data breaches for 2019) the actual number of accounts that had been breached wasn’t known. They are now.According to Have I Been Pwned, the Zynga breach affected 172,869,660 unique accounts and included email addresses, user names and also passwords plus some Facebook IDs and phone numbers if they had been shared with Zynga. Have I Been Pwned calls this 10th largest breach it’s ever seen. While it’s nice to be tops in something, this may not be how Zynga wants to be ranked.
Week of December 9, 2019: Half a million payment cards for sale
This week, researchers discovered a dark web marketplace offering 460,000 payment card records up for sale. Split into two databases, the records were claimed to be 85-90 percent valid, meaning they could be used to buy goods where the card doesn’t need to be physically present, such as online.The records predominantly came from Turkish banks, and was priced at $550,000. According to Bleeping Computer, the data was likely stolen during a cyber attack, rather than physically taken from the cards using a hacked payment terminal. Phishing could also be a way to obtain this data.There isn’t much you can do to prevent an online store from having its customer card data stolen. But what you can do is keep a close eye on your banking records, and immediately report any suspicious transactions to your bank. In most cases, your money can be returned, and the bank will issue a new card with fresh credentials.
City of Hamilton, Canada
Residents of Hamilton, Ontario were warned this week about a « potential privacy breach » in which billing data for water utility accounts may have been accessed by a third party.Water-related services – including meter readings, plus billing and payment data, names, addresses and tax assessment roll numbers – may have been exposed. The city said customers should maintain a « normal level of vigilance », and that the Information and Privacy Commissioner (IPC) has been contacted.Customers are asked to monitor their accounts closely for any unusual transactions.
750,000 birth certificates exposed online
Finally this week, a UK security firm discovered a massive database of 750,000 US birth certificates which were sitting on an unsecured server. Hosted by Amazon Web Services (AWS), the server has no password and could be accessed by anyone who knew its location, reports InfoSecurity.The company who owns the data hasn’t been named because they are yet to respond to attempts by security researchers to contact them. The company provides a service where US citizens can request copies of birth and death certificates from state governments.The exposed data includes applicant names, along with their date of birth, street address and email address, phone number, and other data like previous addresses and names of family members. This data – especially that of children – can be highly valuable, as it gives hackers the ability to open bank accounts and other services in their name.
Week of December 2, 2019: Nebraska Medicine
Nebraska Medicine, a network of hospitals across the state including in Omaha, has been breached by one of its own workers, the company disclosed. The breach is extensive and includes medical records, with personal details that may have been accessed including Social Security numbers, birth dates and even lab results from medical tests. The worker, who was was fired, according to Threatpost, had access over more than a year from July 11, 2018 to October 1, 2019.
Maine school district victim of ransomware
A Maine school district has the U.S. Secret Service helping them after the federal agency alerted the district that ransomware had been installed on one of their servers. The Maine School Administrative District #6 told employees that their information may have been breached after they returned following the Thanksgiving holiday. While student data his reportedly not involved, said the Portland Press Herald, details about people who worked for the district that could have been breached include bank account and routing information, income data and Social Security numbers.
HackerOne pays $20,000 bounty after slip-up
HackerOne has had to pay a $20,000 bounty to one of its own members after someone accidentally leaked a way to get into the system from inside the company. Two hours of unfettered access through the security analyst’s account ended, as HackerOne disclosed, after the cookie — which had given the community person an in to the system — was revoked. The human error element, as opposed to a brute force or phishing attack, is to blame here.
Week of November 25: Hundreds affected by Facebook and Twitter data breach
Facebook and Twitter both admitted this week that hundreds of their users had inadvertently given third-party apps access to their personal information. The affected users had used their Twitter and Facebook accounts to log into a certain few Android applications.These apps were then granted access to more information that they should have. This included the people’s usernames, email addresses, recent tweets and Facebook posts.Twitter said: « We will be directly notifying people who use Twitter for Android, who may have been impacted by this issue. There is nothing for you to do at this time, but if you think you may have downloaded a malicious application from a third-party app store, we recommend you delete it immediately ».
Virtual Care Provider Inc
Milwaukee-based Virtual Care Provider Inc, which provides technology services to more than 100 nursing homes across the US, revealed this week it had been the victim of a cyber attack. The incident saw hackers demand $14M before they will give back the company access to its own hacked servers, the AP reports.The company informed its clients via a letter on November 18, a day after the attack was discovered. The company said about 20 percent of its servers were affected and that 100 servers need to be rebuilt. The ransom has not been paid, meaning the affected nursing homes can’t access patient records, use the internet, pay employees or order medications.
Palo Alto Networks
Updated Dec. 10, 2019: U.S. cybersecurity company Palo Alto Networks found data on several employees had been exposed by a third-party vendor, including their birth dates. A spokesperson for Palo Alto Networks told GearBrain: « On February 2nd, 2019, we were made aware that information related to seven current and former employees was inadvertently posted by a third-party vendor on an external development community website. We took immediate action to remove the data from public access and terminate the vendor relationship. We also promptly reported the incident to the appropriate authorities and to the impacted individuals. We take the protection of our employees’ information very seriously and have taken steps to prevent similar incidents from occurring in the future. »
Week of November 18th: Disney+
Just hours after Disney launched its highly-anticipated Disney+ streaming service this week, customers began complaining en masse about being locked out of their accounts.Although many said their accounts had been hacked and blamed a lack of security on Disney’s part, the likely answer is that the users fell victim to what’s known as credential stuffing. This is where they use an email address (or username) and password combination which they’ve used elsewhere, and with a service which itself has indeed been hacked.These pairs of usernames and passwords are sold online to hackers who use automated software to try them with other websites and services, like Disney+. When one works, it is sold for a few dollars.The answer here is simple – always use a different password for everything website and service you log into online, and if an account is compromised (perhaps through no fault of your own), then make sure not to use that stolen password again.
Fairfax County Police Department
The personal information of over 500 employees of the Virginia police department may have been breached, officials revealed to the Washington Post this week. The data breach occurred at a neighboring police department, Purcellville.Data exposed include names, dates of birth and Social Security numbers. Fairfax Country Police Chief Edwin Roessler Jr. said the data was on a missing memory stick that contained the email inbox of the Purcellville police chief.Roesslar said it wasn’t clear why data on his staff was stored on a USB stick held at another police department.
Department store Macy’s confirmed this week it had been the victim of a hacking attempt during a weeklong window in October.
The attack began on October 7 and saw hackers inject lines of code into the checkout page which scooped up customers’ billing information and sent it to a malicious third-party website.
Data stolen from customers who made purchases on macys.com that week include:First nameLast nameAddressCityStateZipPhone numberEmail addressPayment card numberPayment card security codePayment card expiry dateMacy’s has contacted law enforcement and hired « a leading class forensics firm » to help with their investigation. All relevant credit card companies have also been contacted, as have all affected customers, who have been offered free consumer protection.
Week of November 11: ZoneAlarm
This week, it was reported that the names, email addresses, hashed passwords and birth dates of up to 4,500 users of ZoneAlarm, a security firm, were compromised.Owned by Check Point, ZoneAlarm offers cybersecurity solutions to protect users against malware, ransomware, phishing attacks and identity theft to over 100 million PC users globally. First reported by TheHackerNews, the data breach was confirmed by ZoneAlarm, but instead of speaking publicly about the incident, the company chose to quietly email affected users last weekend.The email told users to change their forum account passwords, as hackers had gained unauthorized access to their personal data, including names and email addresses. Thankfully, stolen passwords were hashed, meaning they cannot be read as plain text and used by the hackers. Additionally, the incident only affects around 4,500 users, so is relatively small compared to other data breaches we have seen this year.
Solara Medical Supplies
Solara Medical Supplies is a California-based company and the largest US independent supplier of continuous glucose monitors and insulin pumps for those suffering from diabetes. The company this week gave notice of a data breach where a hacker gained access to employee Office 365 accounts.The unauthorized access took place between April 2 and June 10 this year, and was the result of an email phishing campaign. Although it isn’t known exactly what data was seen, and if any was stolen, what could have potentially been seen by the hacker is vast.Solara said in a press release: « The personal information present in the accounts at the time of the incident varied by individual but may have included first and last names and one or more of the following data elements: name, address, date of birth, Social Security number, Employee Identification Number, medical information, health insurance information, financial information, credit / debit card information, driver’s license / state ID, passport information, password / PIN or account login information, billing / claims information, and Medicare ID / Medicaid ID. »Solara has not said how many people could be affected by the data breach, but has since reset employee Office 365 passwords and informed law enforcement. Customers wishing to learn more are urged to call 1-877-460-0157 (toll free) or email firstname.lastname@example.org.
Finally this week, and in more medical news, Starling Physicians gave notice of a security incident, which resulted in the « potential access to some of our patient’s personal and medical information. »As with Solara, Starling admits it was the victim of a phishing attack that resulted in « an unauthorized third party potentially having access to the contents of some of our employees’ email accounts. »Data potentially exposed by the incident includes patient names, addresses, dates of birth, passport numbers, Social Security numbers, medical information and health insurance or billing information. » Those whose Social Security numbers were exposed have received an offer of free credit monitoring and identity theft protection, the company said.Anyone concerned by the incident can call Starling on 1-888-800-3306.
Week of November 4th: California Department of Motor Vehicles
Thousands of Social Security numbers were visible to federal agencies, through a data breach by the California Department of Motor Vehicles. So reported the Los Angeles Times this week, which said that the DMV did reach out to those who were affected. But agencies that may have gotten access to this information included the U.S. Department of Homeland Security and the Internal Revenue Service. This wasn’t a one-time breach either. Access to numbers of 3,200 people took place over the last four years. The DMV has reportedly closed off this access, but some records included those of people who had applied, as they’re permitted to do so in California by law, who did not have proof of legal status.
Brooklyn Hospital Center
A ransomware attack has hit the Brooklyn Hospital Center, making some patient records visible — and making others disappear permanently. While the center said, in a notice on its web site, that none of the data was exposed, they could not recover some records, and have reached out to those patients. The attack goes back to July when the hospital found out it had been hit with malware on its system. By September, they realized that the attack had also deleted some patient data. Anyone who believes they’ve been impacted by the situation are invited to reach out to the hospital themselves.
Finally this week, Veritas Genetics, which conducts DNA testing, admitted that an unauthorized user gained access to its system. The company promises that genetic information, including DNA test results and health records, weren’t breached, but they wouldn’t tell Bloomberg exactly what data was seen. While data breaches that include addresses and financial details, can be a serious problem, medical data presents its own unique concerns. People can change their passwords. Their DNA is immutable. Veritas says just a small number of customers are involved in the breach. Anyone who has ever used Veritas, and has concerns, should certainly reach out to them.
Week of October 28: Adobe Creative Cloud
This week, digital design company and software maker Adobe discovered a vulnerability which may have exposed the email addresses of up to 7.5 million users.Adobe says it fixed the problem as soon as it was made aware of it, which was in mid-October by a company called Comparitech. Adobe made its customers aware with a short notice on its website on October 25. »The environment contained Creative Cloud customer information, including e-mail addresses, but did not include any passwords or financial information, » said Adobe. « This issue was not connected to, nor did it affect, the operation of any Adobe core products or services. »
Users of Network Solutions and register.com – both owned by domain registrar web.com – were contacted this week snd asked to reset their passwords after the discovery of a data breach which took place in August 2019.Hackers gained access to contact details of current and former customers of web.com, including their names, postal addresses, phone numbers, and email addresses. The names and addresses of current and former customers of Network Solutions and register.com, both subsidiaries of web.com, were also compromised. However, no credit card information was taken, the company said in a statement, as that data was encrypted.Despite the breach believed to date back to August, the company only discovered it on October 16, and then took immediate action. The company’s statement did not say how many of its customers were affected by the breach, but CISO Mag reports the figure could be as high as 22 million across the three companies.
Italy’s top bank, UniCredit, admitted its third data breach in three years this week. The latest incident involved the personal records of three million Italian customers, reported Reuters.Although only discovered and acknowledged this week, the breach occurred back in 2015 and saw the exposing of a file containing the email addresses and phone numbers of three million people. This latest breach is the third to be suffered by UniCredit since 2016, despite the lender spending €2.4 billion over the past three years upgrading its IT system and cyber security.The bank urged that no data was lost which could result in customer accounts being accessed, and said it was in the process of contacting the victims. The police have also been contacted, the bank said, and an investigation is now underway to determine if any crimes have been committed.
Week of October 21: Best Western affected
A data breach uncovered by vpnMentor, found the reservation management system Autoclerk may have leak details about hotel guests at some of the biggest chains in the world. Autoclerk, which is owned by Best Western Hotels and Resorts Group, holds data on reservations, down to the when someone may have checked in to their stay and their home address. And one of the biggest customers of Autoclerk? The U.S. government, including the Department of Homeland Security.The database in question, which held 179 GB of data, has now been closed reports vpnNetwork. But hundreds of thousands of reservations were held inside.
Zappos makes up with sad discount
The data breach that impacted Zappos in 2012 has now been settled, and the company is awarding 10 percent discount coupons to those impacted. Sure, lawyers netted nearly $1.6 million, but who is to say what a 10 percent coupon could be worth?The coupon is the same discount that students, teachers and military people can earn on the site as well. The rest of us? Zappos famously says it doesn’t push out coupons. So perhaps this is a case of being happy with what you get — your data sold across the data web, for a few dollars off the latest fashion sneakers.
More healthcare breaches
A phishing attack impacted the Kalispell Regional Healthcare in Montana, when employees were fooled into giving up their login credentials. Hackers may have used these details to access patient information from as early as May 24, 2019. The healthcare group has notified anyone who might have been impacted. For now, of course, anyone who may have sought medical care from the group may want to reach out — and of course check their accounts for any activity that looks incorrect.
Week of October 14: Indiana hospital system falls victim to phishing scam
Methodist Hospitals of Indiana said this week that the personal information – including Social Security numbers and health records – of over 68,000 patients may have been exposed during a data breach. The hospital group, which has campuses in Gary and Merrillville, said it was alerted to questionable activity on an employee’s work email account in June, then in August it discovered that two workers had fallen victim to an email phishing scam.The scam caused an unauthorized person to gain access to the employees’ email accounts, which may then have given them access to thousands of patient records. In a letter sent to patients, Methodist Hospitals said the data may have included names, addresses, license or state identification number, password number, financial account number, electronic signature, username and password, date of birth, medical record number, CSN number, HAR number, Medicare or Medicaid number, and medical treatment/diagnosis information. In other words, pretty much everything – and the company didn’t say if the passwords were encrypted or stored in plain text.Although all this data may have been accessed, the hospital group cannot yet say for sure if it was. An investigation is ongoing.
North Florida Obstetrician-Gynecologist
North Florida OB-GYN has contacted more than half a million current and former patients, warning that their data may have been accessed by an unauthorized person. The clinic, which provides specialist medical care for women, told all current and former patients that their personal and medical data records may have been exposed during the breach, but it couldn’t say if this stage if any data was actually taken.In a statement, the clinic said it discovered in July 2019 that a « cyber incident » had begun on or before April 29 and resulted in « improper access to certain portions of its networked computer systems ». It was also said a computer virus had encrypted certain files on the clinic’s computer network.Compromized data may have included patients’ names, demographic info, dates of birth, Social Security numbers, driver’s license or ID card number, employment information, health insurance information and health data like treatment, diagnosis, related information and medical images. No financial information was exposed. All that said, the clinic cannot yet say for sure if any of the data was viewed or stolen, or if was merely exposed and could potentially have been taken.Infosecurity Magazine reports that all 528,188 past and current patients were contacted by the clinic.
In an ironic twist this week, one of the largest underground websites for buying stolen credit card data was itself hacked. Called BriansClub, the website uses the name and likeness of prominent cybersecurity expert Brian Krebs.Krebs himself reported the incident, revealing that the hack involved « more than 26 million credit and debit card records taken from hacked online and brick-and-mortar retailers over the past four years, including almost eight million records uploaded to the shop in 2019 alone. »The incident gives an insight into how the website operated, earning an estimated $126 million in bitcoin-funded sales between 2015 and 2019. While many of the stolen credit card records likely no longer work, due to the owners having them cancelled, Krebs estimates that more than 14 million of the 26 millions records could still be valid. These so-called ‘dumps’ are made up of ones and zeroes, and when encoded onto a magnetic strip can be used like the credit card they have been stolen from.As ever, readers are reminded to keep a close eye on their credit card statements and immediately report any suspicious activity to their bank or card issuer.
Week of October 7, 2019: TransUnion’s Canada breach
Data on 37,000 people in Canada — and held by TransUnion — were reportedly breached this year. The hack happened sometime this summer, in June and July 2019, through a business customer, Canadian Western Bank and one if its accounts. Specifically, the breach included credit checks for people who did not know that data on them was being pulled. Customers affected are being notified about the breach.
Beeline, a Russian ISP, is now admitting to the hack of the data from millions of customers. The breach reportedly happened years ago — but the data from 8.7 million customers, who never knew about the hack, is now appearing online. Those who signed up for the service in Russia, and before November 2016, are affected, according to ZDNet. While Beeline also covers customers in other countries, including Australia, these people were not affected.
Toms’ hacker was very polite
Toms shoes just got hit with what may be the nicest hack in recent history. Over the weekend, subscribers had emails sent to their inboxes with the message to turn off their screens and step outside, according to Motherboard Vice. The hacker even gave himself the nice normal name, Nathan.While Toms doesn’t believe any payment details were accessed. Still, the company is asking customers not to click on anything else that came from the email, nor respond in any way — even to return the kind message.
Week of September 30: Words With Friends spills 218 million user accounts
Hugely popular mobile game Words With Friends, the Scrabble-like title by Zynga, was subject to a huge data breach this week. Speaking to The Hacker News, well-known Pakistan-based hacker Gnosticplayers claimed their had stolen the user details of all 218 million mobile players of Words With Friends. That’s every single person who has played the game on a smartphone.Zynga had actually announced it was the victim of a data breach earlier in the month, but didn’t reveal the scale of the attack. It instead said: « Certain player account information may have been illegally accessed by outside hackers. »What actually happened, according to the hacker themselves, is that the names, email addresses, login IDs, hashed passwords and Zynga IDs were stolen. For some players, the stolen data also included their password reset token, phone number and Facebook ID.If you have ever played the Words With Friends mobile app, we recommend you change your passwords and keep a close eye on your Facebook account.
Zendesk, a customer support ticketing platform, revealed this week that it was victim of a security breach which took place back in November 2016. The company revealed on its website that a hacker had accessed the personal information of around 10,000 users with Zendesk Support and Chat accounts.Despite taking place almost three years ago, the company admitted it had only discovered the breach on September 24, 2019. And even then, it admitted it was alerted to the issue « by a third-party ». Stolen data included email addresses, names and phone numbers, all related to accounts created with Zendesk up to November 2016. The company says passwords were hashed and salted, so should be safe. « We have found no evidence that these passwords were used to access any Zendesk services n connection with this incident, » the company added.Zendesk says it is engaging with « a team of outside forensic experts to validate the claims of the third party and to determine the exact data and information that was exposed. » It recommends that customers change their passwords.
Chegg, an education technology company, mistakenly exposed the usernames, passwords and addresses of thousands of George Washington University community members. Chegg offers students at the university homework help and textbook rentals.The breach was reported by The GW Hatchet, which said Chegg had suffered a data breach in April 2018 which exposed the usernames and passwords of 5,000 members of the GW community, and 40 million Chegg users globally. GW students were notified of the breach on September 24, and it was recommended they change their passwords used for GW’s online services.Chegg said on its website: « Our understanding is that the data that may have been obtained could include names, email addresses, shipping addresses, Chegg usernames, and hashed Chegg passwords. Our current understanding is that no financial information such as credit card numbers, bank account information, or social security numbers was obtained. »Loretta Early, chief information officer at the university, said: « Due to the nature and potential impact of cybersecurity incidents, collaboration and attention is elevated to the highest level to provide the best and most expedient response to our customers. »
The cost of data breaches is rising – Kaspersky
Not a data breach itself, but a new report from cybersecurity firm Kaspersky revealed this week that the cost of enterprise data breaches is on the rise. The cost per incident has risen, Kaspersky says, from $1.23m last year to $1.41m today.As a result, the report says, enterprise organizations are investing more in cybersecurity, with the average IT security budget up massively from $8.9m in 2018 to $18.9m now. Kaspersky is keen to point out that companies with a Security Operation Center (SOC) in place tend to suffer less financially when they fall victim to a data breach. The company says the average financial impact of a breach without an SOC is $1.4m, compared to $675,000 with an SOC in place.
Week of September 23: Iowa’s parking payment breach
As if paying a parking ticket isn’t bad enough, now about 1,500 people in Ames, Iowa who paid that fine online may have had their data breached if they used a vendor, Click2Gov, according to the Des Moines Register. Anyone who paid between July 30 and Sept 12 could have had their credit and debit card numbers, full name, address and email addresses breached because of a server on the city’s side that connected to Click2Gov.The city isn’t the only victim of the hack, with eight cities in total hit and data getting syphoned and sent to the dark web, according to Wired. In the case of Ames, the city replaced its server. Now customers should keep a very close eye on fraudulent charges possibly appearing on their payment cards — and also be mindful of phishing emails that could start appear in their in-box.
WordPress plugin problem
An old plugin used to help WordPress users manage reviews on their sites is getting unwanted attention from hackers. The plug-in, Rich Reviews, is being infected by hackers to send visitors to other sites and even bring up popup ads according to Wordfence. The company that created the plugin, Nuanced Media, has actually discontinued maintaining it — and you can’t download it anymore. (It wasn’t super popular to begin with, only getting about 100,000 of those in total.) What should you do if you’re using this plugin? Delete it. Nyt.
Malicious Military hack
An attack directed at U.S. veterans included a fake web site with directions on how to install an app to help former military personnel find jobs. The web site, hiremilitaryheroes.com, was actually still online as of Sept. 25, and had been created either at the end of July or early August 2019, said CNET. But GearBrain has found the site is now down as of midday Sept. 26.Downloading the malware — which was cloaked as an app — would access details of someone’s computer from the hardware they were using to their software, even their admin name. What’s the lesson here? Installing software from the web is almost never a good move unless it’s truly coming through a company or someone you know well. That circle of trust? Keep it very (very) small.
Week of September 16, 2019: Almost all of Ecuador
It’s been a fairly quiet week of US-based data breaches, but the same can’t be said on a more global scale. Topping the charts this week is the country of Ecuador, where just about every single person has had their data exposed online. Discovered by vpnMentor, a leaking database, discovered on an unprotected server in Miami, Florida, contains the personal details of over 20 million people – four million more than the population of Ecuador itself. The server appears to be owned by Ecuadorian consulting company Novaestrat, with the majority of people affected appearing to be from Ecuador.The data appears to have come from the country’s government registries, an automotive association called Aeade, and Biess, a national bank in Ecuador. Around 18GB of data was exposed, including:Full namesGenderDate of birthPlace of birthHome addressEmail addressHome, work and cell phone numbersMartial statusDate of marriage, where applicableDate of death, where applicableLevel of educationBasically, the database contain everything you need to know about almost everyone in Ecuador, including names of relatives, personal financial information, employment details (with salary), and there was even an entry for Julian Assange, the Wikileaks founder who was granted political asylum by Ecuador in 2012. The manage of Novaestrat has reportedly been detained.
Millions of passenger details were exposed by a data breach confirmed by Malindo Air, an airline operating 40 routes from two airports in Kuala Lumpur, the capital of Malaysia. Malindo Air is a subsidiary of Indonesian low-cost airline Lion Air.The exposed information included passport details, home addresses and phone numbers of customers who have flown with Malindo Air. The information was leaked onto data exchange forums in September, reports South China Morning Post.Malindo Air says it will hire an independent cybersecurity firm to do a full forensic analysis and determine what happened. In a statement, the airline said: « Some personal data concerning our passengers hosted on a cloud-based environment may have been compromised. »
Hospital patient records
Finally, this week saw letters sent to thousands of hospital patients in the UK to tell them hospital records were accessed multiple times by unauthorized staff, prompting a criminal investigation. Letters were sent out by the Wrightington, Wigan and Leigh NHS Foundation Trust to 2,172 victims of the data breach, reported Wigan Today.The letters explained that personal information was viewed on multiple occasions by an employee who had no legitimate reason to access the data, and were not allowed to do so. The UK’s Information Commissioner’s Office is investigating the incident. Data wrongly accessed could include clinical documentation like blood results, care pathways, medication, secretary letters and patient discharge letters.Victims were additionally told: « Unfortunately during this investigation poor computer etiquette was also identified and therefore we are unable to validate the specific individual concerned. The employee who has inappropriately accessed your record is a member of our staff who has legitimate access to our electronic health record system; for example a medical professional or clinical administrator. »
Week of September 9, 2019: Cobalt Dickens
Nope, not the name of Charles’ brother — but instead it’s a group of hackers who are luring users through 20 different domains to steal their information. Researchers think they’re going to an online library, log in, and get their details taken. We’re taking about phishing, and the group is hardly new to this behavior, having caught the eye of the US. Department of Justice in 2018 — and getting in trouble for it.The phish starts with an email that looks like it’s coming from their school, and telling them to re-up their library account. Mitä tehdä? As usual — try very hard not to click on links in emails, even if you think you know where it’s coming from.
An exploit is taking advantage of a weakness in SIM cards, tracking phone owners, where they are, and also able to hijack calls. The way this works is people get an SMS message. How many have been affected? That doesn’t appear to be clear — but the exploit has been around for two years.One report believes this attack is actually coming from a private company, and could get into mobile phones in regions as wide ranging as Europe, the Middle East, West Africa and the Americas.
More Equifax steps
Those who have already signed up to get their Equifax settlement — for $125 — are finding there are more steps they need to take. Reports show people who have registered are now receiving emails that they have to show they’ve had credit monitoring — and promise to have monitoring going for at least another six months in order to get the $125.While, in some cases, people can get free credit monitoring if they’ve been the victim of a hack, or identity theft, these services can charge a monthly fee of anywhere from about $10 to $30. After six months, you’ll have easily eaten through your $125.
This week, Facebook confirmed that the phone numbers of over 200 million users had been exposed on a database which was unencrypted and could have been accessed by anyone. The database, which is not believed to have been created by Facebook, paired phone numbers up with the User IDs of Facebook users, unique numbers assigned to each user.It would have been relatively easy for someone viewing the database to discover someone’s phone number. Some entries in the database also included the user’s name, gender and the country they lived in, along with their user ID and phone number.The exposed data comes more than a year after Facebook switched off a feature in April 2018, whereby users could be found by searching the social network with their phone number. Also this week, Facebook launched a dating website for US users, called Facebook Dating…
Also this week, it was discovered that industrial supplier DK-Lok had left private emails and communications exposed for all to see. Cybersecurity company vpnMentor revealed the existence of the database on Thursday, belonging to the South Korean company and containing emails between staff, clients, and some personal email too. »Many of the emails were marked private & confidential, revealing highly sensitive information about DK-Lok operations, products, and client relations, » vpnMentor said. The firm added it had made several attempts to contact DK-Lok about the leaking server, but received no reply – vpnMentor even pointed out how they could see their own emails on the server, proving their communications were getting through, but not being responded to.vpnMentor said: « The most absurd part is that we not only know that they received an email from one journalist we work with, alerting them to the leak…but we know they trashed it. »Sensitive information exposed publicly included product prices and quotes, project bids, travel arrangements, private conversations, and discussions on suppliers, clients, projects and internal operations.
Yahoo breach claim forms available now – how to get yours
Yahoo announced this week that claim forma are now available for users looking to seek compensation from multiple data breaches which affected over three billion people between 2012 and 2016. There is a $117.5m pot of compensation cash, but the amount each claimant receives will depend on how many apply.Readers believing they were affected by the data breaches must file a claim online or by mail by July 20, 2020, and they can find more information at www.YahooDataBreachSettlement.com.
Tesla Malli S
The keyless system of a Tesla Model S has been hacked again, this time by researchers eager to show how vulnerable the key fob is — even with a patch that Tesla put in place.Researchers from Belgium University found a bug, a work around, in the encryption again, wrote Wired, which reported the news. Tesla had built a new set of key fobs, from Pektron, after the same researchers showed they were able to hack the car in 2018.This vulnerability, however, can be reportedly fixed with a software update — meaning Tesla owners just need to wait to get their key fobs secure again.
Imperva, a cybersecurity company that protects other firms’ information, was itself the victim of a hack, they disclosed this week. The breach impacted customers who had accounts with Imperva through September 15, 2017, and included email addresses, hashed and salted passwords and for some, API keys and customer-provided SSL certificates.Imperva only learned of this on August 20, 2019 — which means for nearly two years, that information was available. Of course any Imperva customer should contact the company, and also reset API keys among other steps, along with setting up two-factor authentication.
Capital One update
Paige A. Thompson, also known as « erratic, » will be arraigned in Seattle on wire fraud, and computer fraud and abuse, as per a United States Department of Justice (DOJ) statement. The former software engineer is still in custody for hacking into Capital One’s database, as well as « more than 30 other entities, » said the DOJ.Thompson is being charged with not only hacking in the data base, but also cryptojacking, which is using someone else’s computer power to mine cryptocurrency, without their knowledge.
Week of August 19, 2019: MoviePass
MoviePass, the movie ticket subscription service, confirmed this week had become the victim of a data breach. The company said the breach may have left customer information – including user billing details – exposed online.It was reported that tens of thousands of customers had had their data exposed by the breach, and a day after the initial report MoviePass issued a statement. The company said: « We are working diligently to investigate the scope of this incident and its potential impact on our subscribers. »The data was exposed by a leaking database first discovered by cybersecurity firm SpiderSilk. The server contained over 160 million records and was growing at the time of the discovery, but only a small amount of the data was sensitive user information. This data included the numbers of MasterCard-based debit card issued by MoviePass to its users. Other data exposed included billing information, names and postal addresses.
Arizonan osavaltion yliopisto
Arizona State University told 4,000 students this week that their email addresses were « accidentally revealed » in late July, reports AZ Central. The inadvertent exposure of the email addresses has been described as a breach of federal health privacy law.The email addresses weren’t exposed via an unencrypted server which could be tricky to find. Instead, and somewhat worse, the university sent bulk emails to students about health insurance renewals, but failed to mask the identity of recipients, and some of the email addresses revealed show student names.The university said it was able to delete over 2,500 of the messages, and more than 1,130 of them went unread by recipients.Described as an « unintended action », the university said the incident was a breach of the Health Insurance Portability and Accountability Act.
It was announced by Massachusetts General Hospital on Thursday this week it has notified 9,900 people of a privacy breach. During the breach, the hospital believes a third party may have accessed data, including demographic and genetic information for study participants.The third party is said to have accessed databases « related to two computer applications used by researchers in the Department of Neurology for specific Neurology research studies, » the hospital said. The third party had unauthorized access to the databases between June 10 and June 16, 2019.According to the hospital, accessed data may have included participants first and last names, plus certain demographic information like marital status, sex, race and ethnicity, along with their date of birth, dates of study visits and tests, medical record number, type of study and research study identification number, diagnosis and medical history, biomarkers and genetic information, types of assessments and results, « and other research information.The hospital says it has hired a third-party forensic investigator and is in the process of notifying affected individuals. More information can be found on the hospital’s website.
Week of August 12, 2019: Choice Hotels
Hundreds of thousands of records from Choice Hotels were stolen by hackers from names and addresses to email details and phone numbers. The records had been stored in a database that belonged to an outside party — not the hotel chain. Nevertheless, guests’ information was not only hacked, but is now up for ransom for about $4,000 or .4 bitcoin, according to Comparitech, which worked with a security expert to find the original breach.Anyone who stayed at the hotel chain should certainly change any passwords they have, but they should also be aware that with their phone numbers and email addresses now floating about they could be getting a bump in spam as well.
Suprema Biostar 2
Fingerprint, facial recognition data and passwords of users was discovered unsecured by researchers on the site of Suprema’s Biostar 2 security platform. The large cache of data — 27.8 million records — may or may not have been hacked. But the fact that the database was publicly accessible is alarming since the platform is used to grant access to buildings in the U.S., Japan, UAE, India and the U.K. — including the UK Metropolitan police, reports The Guardian.Fingerprints of more than one million people are just some of the biometric data in the cache — data which cannot be changed like a password. Researchers report that actual images of people’s fingerprints were stored.
Supermarket chain Hy-Vee said that some credit card customers that used its fuel stations, drive-thru coffee shops and restaurants have been victims of a data breach. These include some Market Grilles, Market Grille Express and Wahlburgers locations that were inside the stores.The chain does not know how many people were involved, but says it will notify customers. Keenly, people who frequent the chain should make sure they’re checking credit card statements if they see anything that looks amiss.
Week of August 5, 2019: Monzo
Almost half a million Monzo customers were told this week to change their PIN, after the British challenger bank admitted it had been storing the numbers in an insecure database accessible by its workers.It was announced that the PINs of 480,000 customers were in a file which could have been accessed by its employees for months. Monzo said in a blog post on Monday: « As soon as we discovered the bug, we immediately made changes to make sure the information wasn’t accessible to anyone in Monzo…We’ve checked all the accounts that have been affected by this bug thoroughly, and confirmed the information hasn’t been used to commit fraud. »The incident affected less than a fifth of Monzo’s UK customers, and it appears that no harm was done. However, it comes at an unfortunate time for Monzo, as the rapidly-growing bank prepares to open shop in the US, just as Apple launches its Card, which offers similar smartphone app-based features.
National carrier Air New Zealand warned over 100,000 of its Airpoints members this week that some of their data may have been compromised as part of a cyber attack. The customers were contacted by email on August 9.In all, approximately 112,000 members of the airline’s Airpoints membership programme were affected.Air New Zealand said in a statement addressed to the affected members: « We’re sorry to advise that some of your personal information may have been affected by a recent phishing incident relating to two Air New Zealand staff accounts…While your Airpoints account was not accessed, some information relating to your membership profile may have been visible in our internal documents should these documents have been accessed. »The airline said the amount of personal data exposed will vary from one member to another, but said it could include their Airpoints number, name and email address. It said passwords and credit card details were not affected.
Twitter disclosed more bugs this week relating to how it uses the personal data of its users to target advertisements at them. The social network admitted it may have shared user data with ad partners, even when users had opted out of this from happening. Twitter said in a blog post: « We recently found issues where your settings choices may not have worked as intended. » The company admitted that, if a user clicked or viewed an advert for a mobile app then interacted with the app since May 2018, it « may have shared certain data » with advertising partners, « even if you didn’t give us permission to do so. »The certain data shared could include « country code, if you engaged with the ad and when, information about the ad, etc », Twitter said. It also admitted it may have showed users adverts based on inferences it made about the device you use, even if you did not give it permission to do so. The issues were fixed on August 5 2019, Twitter says, but because the incident began in May 2018 the company could find itself having to pay a hefty GDPR fine.
Week of July 29, 2019: Capital One
This week saw Capital One admit to a « data security incident » which occurred in March 2019, and said it may have impacted about 100 million people in the US, and six million in Canada.Unusually at this stage of such an incident, the alleged hacker is known and already in custody. The stolen data included names, addresses, birth dates, credit ratings and more. The hacker is said to have worked alone and broke into Capital One’s systems through a « configuration vulnerability » which was discovered by the company on July 17.Credit card numbers and customer login details were not accessed, Capital One says. However it did say that the Social Security numbers of 140,000 US customers and one million in Canada were stolen.Read more on the Capital One data breach here.
Norton Core Protects all IoT Devices – Available on Amazon
It was claimed this week that 3.7 million customer records stolen from cosmetics company Sephora were discovered for sale on the dark web.Singapore-based cybersecurity company Group-IB says it discovered two databases containing the customer records, and said they are « likely to be related » to Sephora. The leak dates back to February this year and was announced by Group-IB on August 1.One of the databases listed for sale is said to contain 500,000 records including user names and hashed passwords from Sephora’s Indonesia and Thailand websites. The second database, called « Sephora 2019/03 – Shopping – [3.2 million] », contains 3.2 million customer records stolen in March this year.Sephora said details had indeed been leaked, and they affected online customers in Singapore, Malaysia, Indonesia, Thailand, the Philippines, Hong Kong, Australia and New Zealand, reported Channel News Asia.
Norton Core Protects all IoT Devices – Available on Amazon
FTC warns Equifax compensation fund could run dry
Following the opening of a website allowing victims of the 2017 Equifax data breach to claim $125 in compensation, the Federal Trade Commission has warned there isn’t enough money to go around.The 147 million victims can opt for Equifax’s own free credit monitoring service, or chose to take the $125, which is intended to pay for a credit monitoring service from elsewhere. But the FTC claims « million of people » have visited the website to claim their $125, and as a result the commission says the $31 million settlement fund isn’t enough.The FTC has warned that victims will get « nowhere near $125 », and added in a blog post: « If you haven’t submitted your claim yet, think about opting for the free credit monitoring instead. Frankly, the free credit monitoring is worth a lot more – the market value would be hundreds of dollars a year. »
Pearson, a British education company, said this week that it has notified customers about a data breach which saw unauthorized access to about 13,000 school and university accounts.Most of these accounts are held in the US, and the exposed data included first and last names, plus birth dates and email addresses in some cases.The company said: « While we have no evidence that this information has been misused, we have notified the affected customers as a precaution. »
Norton Core Protects all IoT Devices – Available on Amazon
Week of July 22, 2019: Lancaster University
Lancaster University, based in the U.K., has been hit with a data breach that hacked the school through two methods. One involves undergraduate applications for both 2019 and 2020, where names, addresses, telephone numbers and email addresses were breached. As a result, some were sent fake invoices, which the school is warning people to note.A second attack also hit existing student records, with some of them — « a very small number, » said the school — accessed and ID details as well. The school is contacting those students specifically if they’ve been involved.
Facebook’s Cambridge Analytica scandal is going to cost them a $5 billion fine, according to the Federal Trade Commission. (Were you affected? Here’s how to find out.)The social media giant is also getting handed other requirements — like creating an independent privacy committee — but the fine, announced earlier this year, is seen by some as not hefty enough considering the impact on consumers.
Equifax has finally reached a settlement for the 2017 data breach that affected more than 147 million people — and it will be close to $700 million. While dwarfing the Facebook fine which is in the billions of dollars, $300 million of this settlement is meant to go back to people who were impacted by the breach.Who has been impacted? Well, that’s something consumers can actually discover on their own, by going to a specific web site, where they can also file a claim.While there is a possibility of a flat cash payout for some — around $125 — Equifax is also agreeing to give people upwards of 10 years of free credit monitoring — which will not be through them but through Experion.Higher payouts will be based on how impacted someone was by the breach. For example, if they had to spend time trying to clear up identity fraud issues, they can get $25 an hour back for up to 20 hours, plus out-of-pocket losses and up to 25 percent of the products they paid for before the breach — adding up to $20,000. That’s going to not be the norm for most. But its worth checking out to see if you’re eligible at all.
Week of July 15: Sprint
Sprint customers with Samsung devices should change their password immediately, as Sprint found that hackers got into accounts through the Samsung web site, reported ZDNet.Sprint has sent a letter to those involved, but basically phone numbers, device, the device ID, billing details like account numbers, upgrade eligibility, account holder’s names and billing address were involved. Sprint said it has « re-secured » the accounts as of June 25, 2019. But you know what we’re going to say: Change. Sinun. Salasana.
Slack’s was hit with a data breach in 2015 — and is just now changing the passwords of those users who may have been affected. Basically, about 1 percent of Slack accounts are involved, said the company, with Slack resetting the passwords on its end. Who is getting this forced change? Anyone who created an account before March 2015, anyone who did not change their own password since that time, and accounts that do not log on with a single sign-on.If your account is getting a forced reset, you’ll get instructions from Slack with details. You can also go to its help center.
Clinical Pathology Laboratories
So the American Medical Collection Agency (AMCA) hack has hit another company, this time Clinical Pathology Laboratories (CPL). Its patients may have had their names, addresses, phone numbers, birthdates, credit card or banking details and other information hacked.CPL believes that about 2.2 million patients are involved — but only about 34,500 have had their credit card and banking information breached.
Week of July 8: British Airways hit with record fines
British Airways got served what’s being called a « record fine » for the hack in 2018 that made off with about 500,000 customers data. The fine, for about $229 million (£183 pounds), is coming from the Information Commissioner’s Office in the United Kingdom for the data breach that happened around June 2018.Names, email addresses and credit card data — from numbers to CVV codes — were involved. The new fines are part of the General Data Protection Regulation, also known as GDPR, that went into effect in 2018.
Los Angeles hospitals exposed from contractor breach
A contractor for Nemadji Research Corporation got hit with a phishing hack, and may have exposed data of thousands of patients at Los Angeles hospitals. Data included names, medical records numbers, birthdates and other medical ID details.About 14,600 patients and their data are involved, as the contractor which determines patient eligibility for reimbursement, works with the Los Angeles County Department of Health Services. Hospitals that fall under their purview include County-USC Medical Center in Boyle Heights and the Olive View-UCLA Medical Center in Sylmar, according to the Los Angeles Times.
K12.com left children’s data unprotected for a week
A web site that serves up educational software left a database open and unprotected that includes nearly 7 million records with student data as specific as birthdate, names, age, school name and gender. All the information was left visible to public searches, according to Comparitech which discovered the breach.The unsecured data had been visible since June 23, and closed only on July 1 and was specific to students using the A+nyWhere Learning System. Parents who believe their child was using these materials should look for phishing attempts any email address connected to this program, which is used by more than 1,100 school districts.
Week of July 1: Orvibo smart home data leak affects millions
Albeit a relatively quiet one for data breaches, this week saw Orvibo, a smart home systems and platform company, leave a database containing over two billion user records publicly exposed. The server, which did not have a password and could be accessed by anyone who knew its online location, contained the usernames, email addresses, passwords and precise locations of many of the company’s two million users.Worse still, the exposed data included account reset codes, so a hacker could easily have reset the account of a target, then log them out and take control. This would have given them access to sensitive smart home devices, like security cameras and alarm systems. vpnMentor made the leak public on July 1, having not heard from from Orvibo for two weeks after raising the alarm; the server was eventually secured on July 2.Read More:Orvibo data leak: Billions of user records exposed by smart home firm
Marriott hotel fined for data breach
The Marriott hotels group was this week fined almost $270,000 after a five-year security breach was discovered. The fine comes from Turkey’s data protection authority, and is the punishment for an incident which saw cyber attackers seize data from nearly 500 million customers of Marriott’s Starwood group hotels. The breach took place between 2014 and 2018, and the data stolen included customer birth dates, passport numbers, email addresses and credit card information.The fine came as a result of discovering that, of the 383 million customer records exposed, 1.24 million were of Marriott customers living in Turkey.Given the breach lasted four years, it was deemed that Marriott had not carried out any necessary inspections to detect such unauthorized access to private customer data.
Week of June 24: Dominion National finds old breach
A well-known dental and vision insurance firm, Dominion National, reported a data breach from nine years ago, accessing about data from about 95,000 people in Delaware — or about 10 percent of the state’s population. Information that may have seen includes names, birth dates, Social Security numbers, Bank accounts, routing numbers as well as other Taxpayer identification information.The Insurance Commissioner of the State of Delaware believes the hack may have happened around the date of August 25, 2010 — and is offering two free years of credit monitoring and fraud services.
Hackers hit Florida again
The Village of Key Biscayne in Florida announced they were victims of a data breach — the third city in several weeks in the state, reports the Associated Press. Last week, Riviera Beach, Fl. paid $600,000 to hackers, while Lake City, Fl. ponied up $460,000 on Tuesday to hackers too. The fees were paid as ransomware after hackers got into the city’s systems and security networks.
Bitrue hacked for more than $4 million
Finally, hackers made off with more than $4 million from a cryptocurrency exchange called Bitrue on June 27, which informed people through its Twitter account. While not ideal, Bitrue is insured, and so anyone affected will not lose their funds. The theft was of two different crypto coins: XRP and ADA.
Week of June 17: AMCA files for bankruptcy protection after data breach
The American Medical Collection Agency (AMCA) filed for bankruptcy protection this week, in the wake of a large-scale data breach. As we reported earlier in June, blood testing companies Quest and LabCorp became victims of the AMCA breach, with millions of customers potentially having their personal data exposed. Other clients of AMCA include BioReference Laboratories Carecentrix, and Sunrise Laboratories. They all used AMCA’s services to bill their customers.The security failure has affected over 20 million Americans, according to ZDnet, after hackers stole customer names, Social Security numbers, addresses, birth dates, and payment card information. The data was later discovered being offered for sale on the dark web.AMCA quickly became the target of multiple class-action lawsuits, blaming the data breach on a lack of adequate security measures being in place. The company then filed for bankruptcy protection in New York on June 17. AMCA had to pay out almost $4 million to inform seven million people by mail that their data may have been compromised. To cover this expense, plus $400,000 in cybersecurity forensic bills, AMCA took out a loan from its CEO and founder, Russell Fuchs.
Department for Human Services data breach impacts 645,000 people
Oregon’s Department of Human Services this week admitted a data breach in January affected more than 645,000 Oregonians, almost double the original estimate. The compromised data included first and last names, postal addresses, Social Security numbers, case numbers and personal health information. Some of the protected health data is due special protection under federal health privacy laws, reports OregonLive.The DHS said it will provide 12 months of identity theft monitoring and recovery services to anyone whose information was accessed during the breach; these services will be provided by specialist identity theft company MyIDCare.
Transgender children’s charity apologizes after private email database appears online
Mermaids, a UK-based transgender support charity and lobby group, apologized this week after a report by The Sunday Times revealed that over 1,000 pages of confidential emails were freely accessible online. The data, which included the contents of emails from the parents of transgender children, also revealed email addresses, names and telephone numbers of those who had contacted the charity.In a statement published to its website, Mermaids said it was grateful that thew newspaper had discovered the data leak, and it immediately took action to remove the sensitive material from public view.The charity said: « The scope of the breach was that internal Mermaids emails from 2016 and 2017 in a private user group were available on the internet, if certain precise search-terms were used. Mermaids understands that the information could not be found unless the person searching for the information was already aware that the information could be found. »Those affected by the data breach has been contacted by Mermaids, and the charity has reported itself to the Charity Commission. An independent third party will be hired by Mermaids to report to the charity about its findings related to the breach.
Week of June 10 Evite: We’d like to invite you to a data breach
Evite, the online invitation site, is having to reach out to customers after a hacker tried to sell information from the site. The company says the data is from 2013 and earlier — not recent details. Still, Evite’s been around since 1998: that’s plenty for a hacker to syphon away.What was taken? The usual: Names, emails, passwords, user names, phone numbers, snail mail addresses and also birthdates. Evite purportedly sent an email out to users warned them of the breach. As expected, the company is asking people to change their passwords if they use the same one on other sites and look at accounts and see if there’s anything suspicious.The breach was actually found in April thanks to ZDNet which reported that the hacker in question had told the site it been selling data from a number of companies including online fashion site Mode Operandi.Besides changing your password, another option is to use an online tool like Password Checkup, launched through Google Chrome, which is designed to tell you of your password has appeared on a compromised list.
U.S. Customs and Border Protection: License plate and photo please
Images of faces and license plates taken at a specific point at the U.S. border have been breached through a cyberattack, the U.S. Customs and Border Protection (CBP) admitted this week. Currently, the department thinks just 100,000 people have been affected, which would include images taken of people in their cars as they crossed into the U.S.CBP won’t say where this border point was — or between which countries — although they did say that passports and other travel papers weren’t affected. Faces, though, are a concern as facial recognition software is growing in use, a biometric marker used to identify people in a number of ways, including some security devices, smartphones and even at the upcoming Tokyo 2020 Olympic Summer Games.A subcontractor for CBP is being blamed by the agency for moving the data to a its own company network. The data was collected during a month and half, and only in certain car lanes at the land border.
Radiohead: Someone Creep-ed on the band’s archived songs
This data breach didn’t steal information from a lot of people — but it sure impacted millions. Hackers got 18 hours of old recordings from English band Radiohead, threatening to release them if the band didn’t pony up $150,000.The band turned the tables, posting the archived discs on its Bandcamp site, and letting people download and buy « the whole lot, » as they said for just £18, with the money going to Extinction Rebellion, an international group known for its nonviolent protests and work in the conservation and environmental areas.Fans are, as expected, supportive and thrilled. There are 18 discs, and it’s 1.8 GB. So clear out some old photos, and enjoy or as the band said « until we all get bored and moved on. »
Week of June 3rd: Quest blood testing warns of 12 million-customer data breach
One of the largest blood testing companies in the US, Quest Diagnostics, admitted this week that up to 12 million customers may have had their medical and financial data compromised.Revealed in an 8-K filing with the Securities and Exchange Commission, Quest said that, at some point between August 1, 2018 and March 30, 2019, a billion collection vendor’s data had been breached by an unauthorized person. Data included which could have been stolen include credit card numbers, bank account information, medical information, and other personal data such as Social Security numbers.Quest reassured its patients that laboratory test results were not provided to AMCA, the compromised vendor. The blood testing firm said in the SEC filing: « Quest Diagnostics takes this matter very seriously and is committed to the privacy and security of patients’ personal, medical and financial information. »
Just a day after Quest announced it may have been the victim of a data breach, rival LabCorp made a similar announcement. As with Quest, LabCorp lay the blame at its third-party billing collections vendor, American Medical Collection Agency, which notified the blood collection firm of hackers gaining access to its systems.LabCorp said 7.7 million of its customers had their data stored on the hacked AMCA system. The data included full names, credit card and bank account numbers, birth dates, addresses, phone numbers, dates of service, health care provider information, and the amount owned by customers to LabCorp.
As with Quest, the company said it did not provide AMCA with information about tests and lab results, and AMCA said it did not store Social Security numbers. Of the millions of datasets on file, LabCorp believes the credit card or bank account information of about 200,000 customers may have been accessed, and it is notifying those people. The company will offer identify protection and credit-monitoring services for two years.
Australian kansallinen yliopisto
The Australian National University (ANU) announced this week it had been the victim of a data breach in which a « significant amount of student and staff information was stolen. The breach took place in late 2018 and the university estimates the data of some 200,000 people was unlawfully accessed.In a statement, vice-chancellor Brian Schmidt said: « We believe there was unauthorized access to significant amounts of personal staff, student and visitor data extending back 19 years ». The data included names, addresses, dates of birth, phone numbers, email addresses, emergency contact details, tax file numbers, payroll information, bank account details, passport details and even the academic records of students. Not affected, the university said, was academic research work.A day later, it was reported by the Sydney Morning Herald that China may have been behind the attack, according to senior intelligence officials. It was reported how the intelligence community fears the data will be used to target promising young students in the hope they can be used as informants as they move through careers in government and even intelligence agency careers.
Pyramid Hotel Group
The week began with news that researchers from VPNMentor had discovered an unprotected database which contained security audit logs for hotels run by the Pyramid Hotel Group. This includes chains like Marriott’s Aloft Hotels in Florida, and Tarrytown House Estate in New York. Pyramid also operates hotels owned by Sheraton and Westin, although it isn’t known if these were affected.The exposed data stretched back to April 19th and was mostly made up of server logins, internet addresses and firewalls, but also included the full names of hotel staff, along with details about hotel security policies.It’s unclear if the information on the exposed server was viewed by anyone, but it would have served as the perfect tutorial to break into hotel databases and access sensitive customer information.
Week of May 27th: Checkers Drive In
Checkers, one of the biggest chain of restaurants in the U.S., found out customers may have had their credit card details swiped when they ordered up a burger and fries at that or one of its Rally’s locations. The breach affected people who used a magnetic stripe card at locations across 20 states, grabbing their card number, expiration date, name and the verification code. Dates are random and span months, going back to December 2015 in some cases. (Rally’s on MLK Blvd in Los Angeles — we’re looking at you.) The company is asking people to review their credit card statements, and order a credit report. In the meantime, you can see if your card may have been involved — and if you’re a Checker’s regular, given how many locations got hit by the malware, the potential that you were is high.
Flipboard, the news app, has been hit by a data breach that involved user names, personal names, passwords and email addresses. The hack didn’t affect every user, said the company which has been emailing some people. But those who were on the site between June 2, 2018 and March 23, 2019 as well as April 21 – 22, 2019 may have had their details scraped.Those who connect Flipboard accounts to other third-party sites — social media, for example — may have had those security tokens accessed as well. Here’s what Flipboard is doing: it’s gone ahead and changed everyone’s passwords for them. So if you log out, or log in from a new device, you’re going to have to reset your password. You should also do that on any third-party service you use that’s been linked to Flipboard. The company said it’s also replaced — or even deleted — some of these tokens. You might want to consider not linking them together going forward.
Graphic designers take note: Canva, the tool which makes designing as simple as dragging and and dropping, is a victim of a data breach affecting more than 130 million customers. Usernames, passwords and email addresses are involved — although Canva said the passwords were encrypted and unreadable.Of course by now you know the drill: If you’re a regular user of Canva, you need change your password. User designs, as well as credit card details don’t appear to be part of the hack. But checking your credit card statements is never a bad idea and backing up your work on another source wouldn’t hurt either.
Week of May 20th – 49 million Instagram users have contact details exposed
This week, it emerged that the location and contact details — including phone numbers and email addresses — of 49 million Instagram users were exposed online. The data belonged to so-called influencers, who have a large following on Instagram and earn a living from the Facebook-owned image sharing site.The database was traced to Chtrbox, a Mumbai-based marketing company which had stored the information on an Amazon server but failed to protect it with a password.Chtrbox says the database was only exposed publicly for 72 hours, and has since been taken offline. It appears the contact details were gathered by ‘scraping’ them from the affected users’ Instagram accounts, a practice which violates the social media site’s policies.Instagram says it is speaking with Chtrbox to understand how the data was obtained. The marketing company says it had not purchased any data that had been obtained by « unethical means. »
Georgia Tech offers ID theft protection and credit monitoring to data breach victims
In the wake of a data breach which saw a database containing the personal details of 1.3 million people unlawfully accessed, Georgia Tech has offered credit monitoring and identification theft protection to everyone affected.Georgia Tech disclosed in April that someone illegally accessed a database that may have included the names, addresses, birth dates and Social Security numbers of almost 1.3 million people, including past and present students, staff, and other people associated with the university.Jim Fortner, Georgia Tech’s interim executive vice president for administration and finance, said: « We regret that this incident occurred and apologized for any inconvenience. »Offering such services is standard procedure for when a database like this has been accessed, even if the target company or institution is unsure if any data was actually stolen.
Seattle blood bank announces loss of patient data
Bloodworks, a Seattle-based blood bank, announced this week that the private details of patients may have fallen into the wrong hands. But instead of being the victim of a cyberattack, or carelessly leaving sensitive data on an unencrypted server, Bloodworks says a document has gone missing from an employee’s desk.A statement admitted: « The document contained certain patient information, including name, date of birth, and medical diagnosis. » Bloodworks describes the incident as a « data privacy event » on its website.Thankfully, it said that no Social Security numbers or financial account information was held in the lost document. Bloodworks said it is now in the process of informing patients whose details appeared in the document, providing them with information on how to place a credit freeze against their name, or add a fraud alert to their credit file.A phone line has been setup for anyone who thinks they may have been affected by this incident. The toll-free number is 1-800-363-3903 and is open Monday through Friday, between 8:00am and 5:00pm PST.
Shubert Organization admits February data breach, credit card details stolen
The Shubert Organization, owner of 17 Broadway theaters, admitted this week that it was the victim of a data breach which began on February 8 and lasted for three days.
Contacting affected customers by letter this week, Shubert said data potentially taken during the breach included customer names, email addresses, credit card numbers and card expiry dates. Affected customers are being offered 24 months of free credit monitoring through TransUnion Interactive to help protect them from further personal damage.Shubert told its customers it become aware of « unusual activity related to an employee’s email account » on February 11 this year, and a subsequent investigation revealed « unauthorized access to some employees’ email accounts » during the previous three days.The company told customers: « While the investigation was unable to confirm the scope of the information that was accessed within the affected email accounts, Shubert is notifying you in an abundance of caution because we have confirmed that your information was present in the affected email accounts. »
Week of May 13th — Uniqlo’s online site has been breached
Uniqlo, the Japanese clothing store known for their T-shirts and well-priced basics is involved in a data breach that hit its parent company, Fast Retailing. The breach involves more than 461,000 customers that shopped on the Uniqlo online site between April 23 and May 10. Hackers gained access to personal data, with Fast Retailing stating that names, addressees, gender, date of birth and other contact information — including credit card expiration dates — « may have been browsed, » on its web site.Customers should change their passwords if they’ve shopped with the firm — and Fast Retailing itself suggests that people should not use the same password from other sites, nor one that people can easily guess.
West Hartford Schools has a test registration problem
A company that registers students for tests such as those for advanced placement courses, may have been breached according to a story in the Hartford Courant. Parents received a note from the West Hartford school district telling them that names, grade level, emails, date of birth and other personal details about their children may have been breached by the company. Social Security numbers and credit card details were not involved.
If you use WhatsApp, you need to read this now
While data may not have been exposed from the security breach impacting messaging platform WhatsApp, that doesn’t mean the danger isn’t present. Hence the call from the company — to everyone of its 1.5 billion users — to update the app to ensure they have a patch for spyware called Pegasus. The malware, while not thought to have affected the general user base of WhatsApp, attacks mobile devices like smartphones. How easy it is for the spyware to get on to the app? An attacker makes a WhatsApp call to someone — and even if the person doesn’t pick up, the malware can harvest emails, messages, get into their camera and microphone and much more. The attacker can also erase traces of the call, wiping logs clean so that the victim never knew the malware had infected their device, or been used against them. Use WhatsApp? Update the app people.
Week of May 6th – Data breeches are a ticking time bomb
Before we delve into this week’s data breaches, we would like to draw your attention to a report published by Verizon. The report, built with data from over 41,000 security incidents and 2,013 data breaches provided by 74 public and private data sources spanning 86 countries, found that 69 percent of breaches are perpetrated by outsiders.It was also revealed that 39 percent were the work of organized criminal groups, and in 23 percent of cases, data breaches involved actors identified as nation-state or state-affiliated. 53 percent of breaches featured hacking, 33 percent exploited social media, 28 percent involved malware, 21 percent were blamed on errors, and four percent were the result of physical actions.The vast majority of victims — 43 percent – were small businesses, followed by public sector entities (16 percent), healthcare organizations (15 percent), and financial entities (10 percent).Commenting on the report, Bryan Sartin, Verizon’s head of global security services, told the BBC described data breaches as a « time bomb », adding: Compromises happen in minutes and then extend out to hours, days, weeks and sometimes months. Yet we are still looking at months for them to be discovered…When it comes to account takeover, senior executives are getting hit hard right now. Humans are the weakest link in the chain especially when they are on their mobile devices. »
Freedom Mobile user data gets a little too much freedom
Freedom Mobile, Canada’s fourth-largest cell network, has become victim to a data breach which saw a server leaking five million logs containing customer data. According to security researchers Noam Rotem and Ran Locar, the server wasn’t protected with a password, so anyone could access it.Speaking to TechCrunch, the pair said it took Freedom Mobile a week to secure the leaking database after first being informed about it. Unencrypted data presented by the security researchers showed customer names, email addresses, phone numbers, postal addresses, dates of birth, customer types and their Freedom mobile account numbers. Answers to credit check questions asked by Equifax were also included, along with whether an applicant was accepted or rejected, and the reason why.A spokesperson for the cell network said around 15,000 of its 1.5 million customers were affected by the leaky server. Specifically, customers who opened or made changes to their accounts between March 25 and April 15 at 17 Freedom Mobile retail locations had their data set free, along with any customer who made changes or opened an account on April 16, regardless of retail location.
Indiana is suing Equifax over massive 2017 cyberattack
Indiana is suing Equifax over the 2017 data breach which affected over 140 million people, of which almost four million were from the US state. The lawsuit accuses Equifax, a major credit bureau, of failing to protect the personal information of the Indiana residents who were exposed by the breach.Attorney general Curtis Hill said: « Hoosiers trust us to work hard every day to ensure their safety and security. This action against Equifax results from an extensive investigation, and we will continue our diligent efforts to protect consumers from illegal or irresponsible business. »Data stolen during the breach, which spanned from May 13 to July 30, 2017, included names, Social Security numbers, birth dates, addresses and, in some cases, driver’s license numbers.
Week of April 29th — Unknown data base is unprotected with 80 million accounts
Here, we have a security breach that is no one’s fault — well, no one anyone can pin it on. The breach is online, and in the form of a database, and was discovered by VPNMentor — with 80 million households affected, the security firm said. There are names, addresses, birth dates and even if these people own home or not — oh, and the address of those homes as well. Everyone on there is over 40 (yes, that means if you’re a Millennial you’re safe.) VPNMentor can’t even find out who owns the database, which means it can’t be locked down. Hauskaa.
Inmediata Health Group
If this is your health provider, your name, address, gender, date of birth and your medical claim information may have been compromised in a recent data security breach of Inmediata Health Corp. The health care provider is reaching out to patients — quite exhaustively as it turns out, reports Health IT Security, with people reporting they’re getting letters, but for other people as well as themselves. Confusing.
After a hack in March 2017 of the clothing company Eddie Bauer, Veridian Credit Union filed a class-action lawsuit for its own customers. That suit ended in a settlement of a whopping $9.8 million. Don’t start shopping for cars yet — or even a new Eddie Bauer jacket. Each customer, represented by the suit, is walking away with (wait for it) — $2. That’s a large cup of java from your local deli, or a banana (and not the cappuccino) from Starbucks.
Week of April 22 – Bodybuilding.com urges password reset
Bodybuilding.com, the internet’s largest online store and forum for fitness and bodybuilding admitted this week it was the victim of a security breach sometime in February 2019. The website, which has over seven million registered users on its forums, and receives over 30 million visitors per month, said it isn’t sure if customer data has been stolen.The site reassured users that full credit card numbers are not stored – only the last four digits, if a user has requested this be saved – but cannot be certain that other personal information wasn’t stolen. But information that might have been accessed unlawfully includes user names, email addresses, billing and shipping addresses, phone numbers, order history, any communications with the website, birthdates, and any information added by users to their BodySpace profile.Bodybuilding.com says it has found a remedy for the incident, and has coordinated with law enforcement authorities. Users are urged to change their password immediately, otherwise Bodybuilding.com will reset them on June 12. The cause of the breach appears to have been a phishing email sent to the site in July 2018.
EmCare, a provider of physician practice management services, this week announced it was addressing a « data security incident » that involved the personal information of some patients, employees and contractors. The hackers gained access to employee email accounts that contained the personal information of as many as 60,000 individuals, half of whom are patients.The breach was discovered back on February 19, and EmCare has now admitted the unlawfully accessed data may include names and dates of birth, plus clinical information for some patients. In some instances, the company said, social security and driver’s license numbers were affected. EmCare says it has arranged for identity protection and credit monitoring service for patients and employees affected by the breach.
Facebook (yet again)
Canadian regulators said tis week that Facebook has broken the country’s privacy laws, and they will be taking the social network to court. Canadian officials say Facebook « committed serious contraventions of Canadian privacy laws » when the personal data belonging to over 87 million Facebook users worldwide was leaked as part of the Cambridge Analytica scandal on 2018. The data included that belonging to 622,000 Canadians.A report by the Privacy Commissioner of Canada and the Information and Privacy Commissioner from British Columbia concluded Facebook has not done enough to prevent the mishandling of user data collected through a Facebook app called This is Your Digital Life. Commissioners said Facebook used « superficial and ineffective safeguards and consent mechanisms. »Later in the week, the New York attorney general’s office announced it has opened an investigation into Facebook. This comes after a discovery earlier in April that Facebook had the email contacts belonging to over 1.5 million people without their consent.Attorney General Letitia James said: « It is time Facebook is held accountable for how it handles consumers’ personal information. Facebook has repeatedly demonstrated a lack of respect for consumers’ information while at the same time profiting from mining that data. »
Week of April 15 — The FBI gets hacked
Hackers hit the servers belonging to a group connected to the FBI — and not only walked away with names, jobs, email addresses and in some situations, the physical addresses, publishing them online. More than 23,000 people were affected in total, hundreds of them law enforcement people, after the hackers broke into the online database of three local chapters of the FBI National Academy Associates.
If you use Microsoft Outlook, this may not sit well. Hackers gained access to Outlook, allowing them to read user’s emails for months. In this case, the data breach came after hackers stole the login details from a Microsoft customer service agent. Microsoft has cut off the hackers — but between January 1 and March 28, about 6 percent of customer accounts were basically open to them. Next steps? You know what we’re going to tell you: Change your password.
IT firm Wipro is not a name that most of us would know as companies outsource their IT needs to this firm. But KrebsonSecurity reported this week that its own systems were used to attack clients, based on phishing attacks on Wipro’s own people. (Hint: Do not click on emails from people you don’t know.)
Week of Monday, April 8: Don’t panic, but a hotel has probably mishandled your passport
Makers of an indoor gardening system AeroGarden, sought to nip bad news in the bud this week, contacting customers about a data breach which it discovered in early March. Customers were told how their credit card information had been lifted from AreoGrow’s website by a piece of malware which was active between October 29, 2018 and March 4.
Planted in AeroGarden’s payment processing page, the malware potentially scooped up payment card numbers, expiry dates, security codes and other customer data. The company was at pains to say customer’s security PINs and social security numbers were not stolen.
In a bid to turn over a new leaf, AeroGarden says it has informed law enforcement and will give victims a year of free identity protection services from Experian.
Yahoo — now owned by Verizon — is this week trying to settle the breach of three billion of its user accounts with a $117.5 million payout. This comes after a judge rejected the company’s first offer of just $50 million.The breach, which took place between 2013 and 2016, affected all three billion Yahoo user accounts worldwide, making it the largest data breach in history. The compensation package is made up of $55 million for compensating victims who took yahoo to court via a class action lawsuit, plus $24 million for credit monitoring.Information which may have been stolen during the breach, which wasn’t disclosed by Yahoo until 2017, may have included users’ names, email addresses, phone numbers, and dates of birth, as well as a trove of encrypted and unencrypted passwords.
British Home Office
Meanwhile, the UK Home Office apologized to hundreds of European Union nationals this week, seeking settled status in the UK, after it accidentally shared their email addresses — by forgetting to use the ‘blind CC’ option.Blamed on a « administrative error, » the data gaffe revealed 240 personal email addresses to all 240 people the email was sent to; it is likely that this was a breach of the UK’s Data Protection Act, and the Home Office may be forced to apologize in Parliament.
Week of April 1, 2019: Planet Hollywood, hit Facebook (yeah, again)
It hardly seems news anymore when we hear about Facebook getting breached. But here we are — a year after the Cambridge Analytica scandal — finding that more than 540 million of its users profile information apparently landed on publicly — yes, publicly — on Amazon cloud servers, according to cybersecurity company UpGuard. Two different developers, Cultura Colectiva and the « At the Pool » app makers apparently hadn’t followed the rules on how to store the data they had from Facebook on users who played with its apps. This one wasn’t great (of course no breach is great) as it included passwords, names, comments and even what people liked. Again, it’s likely time to change your Facebook password.
Georgia Institute of Technology, commonly known as Georgia Tech, also managed to lose possession of the data around 1.3 million students and faculty at the leafy university. The breach wasn’t anywhere as big as Facebook’s, but the details exposed were problematic: not just names, but addresses, birth dates and social security numbers. Basically, this is everything you need to open a credit line or create a new identity. The school, actually known for its cybersecurity program, found out in late March and says it has locked everything down.UPDATE: On April 10, the university said it has hired two firms to review the lapse in cyber security. Virginia-based Mandiant will investigate how the breach took place and the method hackers used to gain access. Meanwhile, Atlanta-based Ankura will analyze the data which was taken.
Toyota discovered that up to 3.1 million pieces of information may have been nabbed by hackers who broke into its network. These details were tied to eight different subsidiaries – including the Corolla line and also its luxury line, Lexus. Credit card details weren’t part of this hack, but that’s often the least concern as those companies can’t force consumers to be responsible for chargers made in situations like these. Toyota isn’t completely sure that the information was leaked and the company says it’s monitoring the situation. As you should too.
Planet Hollywood, Buca di Beppo and…..
Finally, if you ate at a Planet Hollywood, Buca di Beppo, Chicken Guy, Mixology, Tequila Taqueria or the Earl of Sandwich, part of Earl Enterprises, between May 23, 2018 and March 18, 2019, you may want to take a gander at your credit and debit card statements. Software installed on the point of sale machines may have grabbed your credit card number, expiration date and even our name. Brian Krebs, always on it, reported that two million credit and debit card numbers from customers who ate at Earl Enterprises were floating around for sale. The breach apparently may have hit three locations in Disney Springs — Planet Hollywood, Earl of Sandwich and Chicken Guy — and all of the Buca de Beppo spots. Get online, check your bank and credit card statements, and perhaps think of cooking in tonight at home.