Tuesday, May 7, 2019

More Breached companies!

United States - EmCarehttps://www.scmagazine.com/home/security-news/data-breach/emcare-data-breach-exposes-60000-employees-patients/
Exploit: Employee email account breachEmCare: Dallas-based healthcare provider that offers physician services and other healthcare functions
correct severe gaugeRisk to Small Business: 1.666 = Severe: An unauthorized third party accessed employee emails, allowing them to view sensitive personal information and confidential patient data. Through this vulnerability, hackers were able to access as many as 60,000 individual records, including 31,000 patient records. The company was quick to indicate that they don’t believe any personal data has or will be misused, and it’s unclear why this information was accessed. Nevertheless, EmCare will now bear the costs of providing free credit monitoring services and managing public relations.
correct severe gauge                                             
Individual Risk: 2.149 = Severe: Employees and patients who received care from the company could have had their name, birth date, age, social security number, and driver’s license number exposed. In some cases, protected health information was also made vulnerable.
Customers Impacted: 60,000
How it Could Affect Your Customers’ Business: This episode is a reminder that even minor vulnerabilities can have extensive consequences. In this case, accessing just a few email accounts compromised thousands of patient records, creating serious problems for both the victims and the company. Since healthcare organizations are explicitly charged with protecting this information, they need to take every precaution to make sure that their systems are secure. By monitoring where and how hackers use patient and employee information on the Dark Web, providers can offer lasting protection.

ID Agent to the Rescue:  SpotLight ID™ allows MSPs, Resellers and Channel Partners to deliver comprehensive personal identity protection for clients’ employees and customers, ultimately safeguarding corporate systems. Get started here: https://www.idagent.com/identity-monitoring-programs.

Risk Levels:1 - 1.5 = Extreme Risk1.51 - 2.49 = Severe Risk2.5 - 3 = Moderate Risk*The risk score is calculated using a formula that considers a wide range of factors related to the assessed breach.
United States - Atlanta Hawks Shophttps://labs.sansec.io/2019/04/24/atlanta-hawks-magecart/ 

Exploit:
 Malware

Atlanta Hawks Shop: Online store for the Atlanta Hawks, a professional basketball team in the NBA
correct severe gaugeRisk to Small Business: 1.888 = Severe: A malicious code bearing the signature of Magecart, a well-known collective of online credit card thieves, was planted on the online store for the Atlanta Hawks. The malware records keystrokes on the payment platform, allowing the thieves to acquire sensitive payment information from buyers. It’s believed that hackers accessed the store through unprotected third-party extensions affiliated with the shop’s cloud hosting service.
correct severe gauge                                               Individual Risk: 2.248 = Severe The Atlanta Hawks online store has more than seven million visitors each year, and this particular strain of malware was introduced on April 20th. Anyone who made purchases through the online store on or after that date should assume that their name, address, and credit card information was compromised. As a result, those impacted should immediately sign up for credit monitoring services while staying vigilant for other misuses of this sensitive data.
Customers Impacted: Unknown
How it Could Affect Your Customers’ Business: E-commerce has quickly become the shopping method of choice for many consumers, and securing this process is critical for any company looking to capitalize on this trend. To put it simply, if customers don’t trust that your checkout is secure, they are less likely to make a purchase on your platform. Businesses must vet their third-party payment processing providers and implement additional layers of security through MSPs who can navigate digital marketplaces to understand how compromised payment data is being used by hackers.

ID Agent to the Rescue: Dark Web ID™ can find out how payment data is being used on the Dark Web, even in the case of a malware attack. We work with MSPs to strengthen their security suite by offering industry-leading detection. Find out more here: https://www.idagent.com/dark-web/.


Risk Levels:1 - 1.5 = Extreme Risk1.51 - 2.49 = Severe Risk2.5 - 3 = Moderate Risk
*The risk score is calculated using a formula that considers a wide range of factors related to the assessed breach.

United States - Doctors' Management Servicehttps://www.zdnet.com/article/cyber-security-firm-verint-hit-by-ransomware/

Exploit: Ransomware attack
Doctors' Management Service: Medical billing service provider
extreme gaugeRisk to Small Business: 1.444 = Extreme: Nearly 40 healthcare centers were significantly impacted by a ransomware attack that compromised patient data. Although the company deployed a network backup to avoid paying the ransom, the hackers had access to sensitive patient information including names, addresses, dates of birth, social security numbers, driver’s license numbers, and health insurance information.
correct severe gaugeIndividual Risk: 2 = Severe: The company was unable to determine if personal health information was viewed or downloaded, and patients at any of the healthcare providers working with Doctors’ Management System could be impacted by the breach. Therefore, all patients within this network are encouraged to obtain credit and identity monitoring services.
Customers Impacted: Unknown
How it Could Affect Your Customers’ Business: Ransomware is a serious problem for healthcare companies and those tasked with managing patient data. Having the right backup infrastructure in place is important, and, in this case, allowed the company to avoid paying a ransom to reclaim its data. However, implementing the right security measures for proactive detection is even more critical for preventing attacks from occurring in the first place.

ID Agent to the Rescue: With BullPhish ID™, MSPs can provide a more complete picture of a company’s security posture and potential risk, transforming the weakest links of an organization into their strongest points of protection. Find out how you can get started with us here: https://www.idagent.com/bullphish-id

Risk Levels:1 - 1.5 = Extreme Risk1.51 - 2.49 = Severe Risk2.5 - 3 = Moderate Risk*The risk score is calculated using a formula that considers a wide range of factors related to the assessed breach 

United States - BodyBuilding.comhttps://www.zdnet.com/article/bodybuilding-com-discloses-security-breach/

Exploit: Employee phishing scamBodyBuilding.com: Idaho-based online forum and retailer for supplements
correct severe gaugeRisk to Small Business: 1.888 = Severe: A single phishing email targeting staff members managed to compromise an entire network, allowing hackers to access the personal information of the platform’s users. Even more alarmingly, the company was unable to confirm if data was actually stolen, signaling a lack of privacy stewardship. Along with the threat of fines or lawsuits, the company stands to lose the trust of customers who catch wind of the breach.
correct severe gauge                                             Individual Risk: 2.428 = Severe: While the platform contends that credit card and social security numbers were not compromised in the breach, they acknowledged that it’s possible that hackers accessed customers names, email addresses, billing/shipping addresses, phone numbers, order history, and company communications.
Customers Impacted: Unknown
How it Could Affect Your Customers’ Business: Phishing scams are preventable, and the right training coupled with proactive security software can stop such an attack before it compromises the entire network. This incident serves as reminder that untrained and unfamiliar staff can be a point of vulnerability that hackers tap into, creating significant security risks for any company.



ID Agent to the Rescue: BullPhish ID simulates phishing attacks and conducts security awareness training campaigns to educate your employees, making them the best defense against cybercrime. Click the link to get started:  https://www.idagent.com/bullphish-id.
 

Risk Levels:1 - 1.5 = Extreme Risk1.51 - 2.49 = Severe Risk2.5 - 3 = Moderate Risk*The risk score is calculated using a formula that considers a wide range of factors related to the assessed breach.

United States - Cleveland Hopkins International Airporthttps://www.cleveland.com/cityhall/2019/04/computer-hack-crashed-info-boards-at-cleveland-hopkins-international-airport-sources-say-city-remains-tight-lipped.html

Exploit: Ransomware attack
Cleveland Hopkins International Airport: A public airport located in Cleveland, Ohio.
correct severe gaugeRisk to Small Business: 2.111 = Severe: A ransomware attack on the airport disabled information screens that provide information about incoming arrivals, imminent departures, and baggage claim status. At the same time, other network components including email, electronic payroll, and record keeping services were also affected. These disruptions occurred for many days, and the FBI is investigating the source of the attack.
correct moderate gauge                                             Individual Risk: 3 = Moderate: There is no indication that any personal information was compromised in this attack, but users with information stored on this network should be mindful of its vulnerabilities while monitoring for possible misuse of stored information.
Customers Impacted: Unknown
How it Could Affect Your Customers’ Business:  When data breaches occur at companies providing critical services like air travel, the prospect of a disruptive data breach can have far-reaching consequences. While this data breach didn’t compromise any critical infrastructure, travelers might be less likely to trust the company’s infrastructure to guard against more progressive or intrusive tasks. When public safety is concerned, preventing a breach becomes an even more critical concern.


ID Agent to the Rescue: SpotLight ID allows MSPs, Resellers and Channel Partners to deliver comprehensive personal identity protection for clients’ employees and customers, ultimately safeguarding corporate systems. Get started here: https://www.idagent.com/identity-monitoring-programs

Risk Levels:1 - 1.5 = Extreme Risk1.51 - 2.49 = Severe Risk2.5 - 3 = Moderate Risk*The risk score is calculated using a formula that considers a wide range of factors related to the assessed breach.

United States - Partners for Qualityhttps://www.databreaches.net/pa-partners-for-quality-notifies-3673-clients-after-employee-email-accounts-compromised/

Exploit: Compromised email accounts
Partners for Quality: Pennsylvania-based agency providing educational services for children with intellectual and developmental disabilities
extreme gaugeRisk to Small Business: 1.222 = Extreme: A malicious third party gained access to several employee email accounts, giving them broad access to their users’ sensitive personal information. This is the company’s second data breach this year, and, since the company handles uniquely sensitive information about their customers, the responsibility to secure this data is magnified.
correct severe gaugeIndividual Risk: 2 = Severe: Hackers gain access to protected health information (PHI) including names, social security numbers, diagnosis/treatment, medical records, billing claims, health insurance credentials, passport information, and banking numbers. Those impacted by the breach should enroll in credit and identity monitoring services to ensure that their information is not used for malicious purposes.
Customers Impacted: 3,673
How it Could Affect Your Customers’ Business: Every company managing PHI needs to be especially aware of their cybersecurity vulnerabilities, since a breach not only imperils their users but it also casts doubt on their competence. Since most email-based threats are preventable, companies handling PHI should take every action to educate their employees and to secure their networks.


ID Agent to the Rescue: Dark Web ID can find out how payment data is used on the Dark Web, even in the case of a malware attack. We work with MSPs to strengthen their security suite by offering industry-leading detection. Find out more here: https://www.idagent.com/dark-web/
1 - 1.5 = Extreme Risk1.51 - 2.49 = Severe Risk2.5 - 3 = Moderate Risk*The risk score is calculated using a formula that considers a wide range of factors related to the assessed breach.

Switzerland - Aebi Schmidthttps://techcrunch.com/2019/04/23/aebi-schmidt-ransomware/

Exploit: Ransomware attack
Aebi Schmidt: Manufacturing company that produces vehicles for airport maintenance and road cleaning

correct severe gaugeRisk to Small Business:  1.888 = Severe: A company-wide ransomware attack paralyzed the organization’s global operations, sending their manufacturing systems and email network offline. Major workflows were disrupted for 24 hours, including other ancillary systems that were shut down as a precaution. The company regained operations by launching a backup recovery process that restored the network and limited the attack’s damage.
correct moderate gaugeIndividual Risk: 3 = Moderate: While the company’s business operations were significantly restricted, there is no evidence that any personal information was compromised or put at risk.
Customers Impacted: Unknown
How it Could Affect Your Customers’ Business: Unlike other recent victims of ransomware attacks, Aebi Schmidt was able to quickly restore operations by launching a backup system that was free from the malady. By having a plan in place to adequately address a ransomware attack, the company was able to mitigate the damage while avoiding having to a pay a ransom to the perpetrator. As malware infections continue to make news headlines on a weekly basis, businesses must partner with providers of comprehensive cybersecurity suites.

ID Agent to the Rescue:  Backed by ID Agent’s $1 million identity theft restoration policy, MSPs’ clients can proactively protect employees and customers while enhancing their overall cybersecurity awareness with Spotlight ID: https://www.idagent.com/identity-monitoring-programs
Risk Levels:1 - 1.5 = Extreme Risk1.51 - 2.49 = Severe Risk2.5 - 3 = Moderate Risk*The risk score is calculated using a formula that considers a wide range of factors related to the assessed breach.

Philippines - GetGohttps://iapp.org/news/a/cebu-pacific-confirms-data-breach/

Exploit: Unauthorized server access
GetGo: The rewards platform of Cebu Pacific, a Philippines-based airline

correct moderate gauge
Risk to Small Business: 2.222 = Severe: A tweet by a prominent hacking group alerted GetGo that its servers were breached. In response, the company shut down its servers and contained the incident. Although the Twitter post promised a significant data breach, no stolen data has been publicly posted. Nevertheless, the business may have to deal with customer attrition and an erosion of brand equity.
correct moderate gaugeIndividual Risk: 2.428 = Severe: The company claims that credit card information was not stored on the affected server, but it’s still unclear if any other personal information was compromised. In the meantime, GetGo users should monitor their accounts for potential misuse.
Customers Impacted: To be determined
How it Could Affect Your Customers’ Business: Without proper detection tools in place, Cebu Pacific had no means of determining the severity of the breach and was forced to temporarily shut down its website and mobile app. For a business operating in a cutthroat market such as airfare, every second offline can translate into millions of dollars in revenue lost. Additionally, rewards platforms are designed engender trust and loyalty with the customer, but a breach can produce the opposite result. It goes without saying that security should be a priority, with employee and customer privacy at the forefront.

ID Agent to the Rescue:  With BullPhish ID, MSPs can provide a more complete picture of a company’s security posture and potential risk, transforming the weakest links of an organization into their strongest points of protection. Find out how you can get started with us here: https://www.idagent.com/bullphish-id.


Risk Levels:1 - 1.5 = Extreme Risk1.51 - 2.49 = Severe Risk2.5 - 3 = Moderate Risk*The risk score is calculated using a formula that considers a wide range of factors related to the assessed breach.


Bit by Bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

No comments:

Post a Comment

Newsletter April 2024