Last week has been relatively quiet as compared to the previous weeks. There was not much news released related to breaches and cyberattacks. Although, there were still attacks that occurred such as the ones against Yakult Australia, Ohio Lottery, libraries, Sabah government etc . Devastating consequences have also been disclosed from earlier data breaches whereby millions of people’s personal information have been compromised, and even victims being sent extortion threats from the attackers. Read on to receive a quick summary of what happened this week in the space of cybersecurity. LoanCare notifying more than 1.3 million individuals of a data breach that impacts their personal information. LoanCare, a mortgage servicing firm that is a subsidiary of Fidelity National Financial (FNF), has started informing more than 1.3 million individuals of a data breach that impacts their personal information. In a notification letter, the company stated that the data breach occurred due to a cyberattack on FNF’s internal systems. LoanCare also stated that the attackers had exfiltrated data from FNF’s systems, including personal data such as names, addresses, social security numbers and loan numbers. It was also further stated that FNF has started an investigation, notified relevant authorities and also taken precautionary measures to assess and contain the incident. The company said that as of now, there is no evidence that the stolen personal information has been used fraudulently. However, free identity monitoring services are provided to impacted customers. Panasonic reports data breach that compromised personal and health information after December 2022 cyberattack. Panasonic Avionics Corporation, a leading supplier of in-flight communications and entertainment systems, disclosed a data breach that affects an undisclosed number of individuals after their corporate network was breached in December 2022. In the statement filed with the Office of California's Attorney General, the company stated that they identified that some personal and health information was exposed during the incident, but has yet to find any evidence that the exposed information has been misused since the attack. Information impacted during the breach includes the affected individuals' names, birth dates, email addresses, mailing address, telephone number, medical and health insurance information, financial account numbers, company employment status, and government identifiers (e.g. social security number). The company stated that the impact of the incident is restricted to “a limited amount of employee and business customer data”. Panasonic will be providing 24 months of free identity and credit monitoring services to impacted individuals, and warn affected individuals to check the reports for signs of suspicious activity. EasyPark suffers a massive data breach: Millions of customers’ personal information may have been compromised. EasyPark, the largest parking app operator in Europe who also owns RingGo and ParkMobile, has been impacted by a data breach. As a result, the information of thousands of EasyPark Group clients in Europe has been stolen. EasyPark first found the vulnerability on 10 December, and notified the impacted customers immediately. In a press release, they also stated that the attack resulted in a breach of “non-sensitive customer data”. The press release also stated that customers do not need to take any actions, and just be aware of phishing attacks. Customers’ personal information exposed includes names, phone numbers, addresses, email addresses, and credit card numbers were purportedly stolen in the data breach. The company however did state that “a few digits of IBAN or credit card numbers” were compromised, however no combination could be utilised to make payments. EasyPark has notified multiple regulatory bodies of the cyberattack, and a thorough investigation of the breach is underway. National Amusements, an entertainment giant, discloses that more than 82,000 affected by the cyberattack. National Amusements, the company that owns Paramount movie studio, CBS, MTV, and thousands of movie theatres across the UK, U.S. and Latin America, disclosed that 82,128 people have been affected by a data breach. The company stated that they detected suspicious activity on their network last year on 15 December 2022. An investigation found that the attackers had access to files on the company's systems between 13-15 December. The information compromised includes names, financial account numbers, credit card numbers, debit card numbers, and PINs. In the breach notification letter, all affected customers will be given 1 year of free identity protection services. Yakult Australia confirms cyberattack after 95 GB data was leaked. In a statement, Yakult Australia has confirmed that they experienced a “cyber incident” whereby both the company's Australian and New Zealand IT systems have been affected. Cybercrime actor, DragonForce claimed responsibility for the attack, and has also leaked 95GB of the company’s data. According to DragonForce, the data dump contains the “company database, contracts, passports and much more”. From analysis of a small portion of the leaked data, it appears that several business documents, spreadsheets, credit applications made by Yakult Australia, employee records, and copies of identity documents such as passports were found. Yakult Australia stated that they first became aware of the incident on the morning of 15 December, and have yet to confirm the extent of the incident and how exactly the incident occurred. The company is currently working with cybersecurity experts to investigate the incident, and further updates will be provided as information becomes available. Although their offices in Australia and New Zealand were hit, offices in both regions will continue to remain open and operational. Yakult Australia has also notified all the relevant authorities. Kroll reveals personal information of FTX bankruptcy claimants exposed. Kroll has revealed that the personal information of FTX bankruptcy claimants have been exposed due to the August data breach. A letter was sent to affected customers that the personal information exposed included their names, email addresses, phone numbers, address, claim number, claim amount, FTX account ID and/or coin holdings and balances, and for some, their birth dates. Kroll stated that the data breach dfid not affect any FTX systems or FTX digital assets, and highlighted that Kroll does not maintain passwords to FTX accounts. In their statement, Kroll advised all affected customers to remain vigilant and take precautionary measures to protect their accounts. Kroll also warned affected customers of potential phishing attacks to gain unauthorised access to their cryptocurrency accounts and digital assets. Libraries in several Sydney suburbs hit by a cyberattack: Data of library users potentially exposed. Libraries in several Sydney suburbs have been hit by a cyberattack. Woollahra Council has been contacting residents in surrounding suburbs with library accounts to warn them that their data might be exposed. Multiple library functions have been disrupted after the attack was launched on the external software. This affects services in Double Bay, Paddington, and Watsons Bay. The software is used to manage bookings, issue fines, and grant computer access, and printing or scanning. An email sent to library users stated that the information stored in the affected software is limited to contact details only. This includes library users’ name, email address, mobile number, landline number and postal address. However, for a small number of customers, the compromised data also includes their encrypted passwords, and partial credit card payment details. It was stated that upon detection of the incident, the system was isolated to prevent further unauthorised access. Relevant authorities have also been notified. The spokesperson has also stated that the provider of the software has secured the system. As of now, the extent of the attack is currently unknown. East Malaysia Sabah government's website breached: 109 documents leaked. The Sabah government’s official website in East Malaysia faced a security breach on 22 December, with hackers purportedly extracting 109 files. The hackers stated that many of which were “classified documents or Excel tables that mention internal information”. As proof of the hack, sections of 3 government documents were posted: an internal memo from Sabah state library, a Sabah Finance Ministry letter to the Semporna district engineer, and a Kota Belud district officer’s letter to another state agency. The cybersecurity head at the Sabah Computer Services Department, Ebenezer Godomon, confirmed the breach, and also stated that a forensic investigation is underway to determine the extent of the breach. He states that they have traced the breach’s origin back to human error. He also stated that they have isolated the main source of the leakage, and are taking necessary actions to prevent future incidents. Integris Health hit by cyberattack: 2 million patients’ personal information compromised & hackers send extortion threats to patients. Integris Health was compromised by a cyberattack and had verified the breach on 28 November. This led to the personal information of more than 2 million patients being compromised. Since 24 December, hackers have been sending extortion threat emails to patients, which threatens patients that they will sell their stolen data to other threat actors if they do not pay $50 to delete their data by 5 January 2024. Inside the emails is a link to a dark web page where the stolen data, includes patients’ names, social security numbers, birth dates, information about hospital visits, and more. The list has about 4,674,000 people. In a data privacy notice, Integris Health advised patients to not reply to the hackers or follow any instruction found in the extortion emails. Ohio Lottery hit by cyberattack. The DragonForce ransomware group claimed responsibility. The Ohio Lottery was forced to shut down some key systems after a cyberattack affected some of their internal applications on Christmas Eve. Investigation is currently underway, and the lottery is working to restore all impacted services. In a press release, the lottery stated that mobile cashing and prize cashing above $599 at Super Retailers are not available. Instead, those over $600 must be mailed to the Ohio Lottery Central Office or claimed using the digital claim form. Furthermore, winning numbers for KENO, Lucky One and EZPLAY Progressive Jackpots are not available on their website or mobile app. Although customers can check them at any Ohio Lottery Retailer. The attack has been claimed by the DragonForce ransomware gang. They claimed to have encrypted devices and stolen data during the attack. From their data leak site, their posts also suggest that the allegedly stolen files contain information that belongs to more than 3 million Ohio Lottery customers and employees. Stolen data includes full names, mail, addresses, winning amounts, social security numbers and birth dates. That is all! Enjoy the rest of the week and don't forget to update your devices and systems to the latest patches! Comments are closed.
|
Archives
June 2024
Categories
All
|
© 2021, TAFA HOLDINGS (S) PTE LTD. ALL RIGHTS RESERVED
|