Inscrivez-vous maintenant pour un meilleur devis personnalisé!

Nouvelles chaudes

Fortune 500 service provider says ransomware attack led to leak of more than 500k SSNs

05 févr. 2022 Hi-network.com

Morley Companies, an organization that provides business services to dozens of Fortune 500 companies, said this week it was hit with a ransomware attack last year that led to the leak of sensitive information for more than 500,000 people.  

See also

Ransomware: An executive guide to one of the biggest menaces on the web

Everything you need to know about ransomware: how it started, why it's booming, how to protect against it, and what to do if your PC is infected.

Read now

In a press release, the company said the ransomware attack began on August 1 and made their data "unavailable." Despite requests for comment, the company would not explain why it waited until now to notify the 521,046 people affected, some of whom had their Social Security numbers leaked in the attack. 

The company said the attack affected the information of "current employees, former employees and various clients." The information leaked includes names, addresses, Social Security numbers, dates of birth, client identification numbers, medical diagnostic and treatment information, and health insurance information.

Morley said it hired cybersecurity experts to respond to the situation but needed six months to collect the "contact information needed to provide notice to potentially affected individuals."

Morley does not say it was a ransomware attack in the public notice, but in the letters sent to victims, they provide more information. In filings with the Maine's Office of the Attorney General, the company explains that 521,046 people were affected. 

"That investigation revealed that a ransomware-type malware had prevented access to some data files on our system beginning August 1, 2021, and there was an unauthorized access to some files that contained personal information. We then worked diligently to prevent further access and identify impacted individuals. Special programming was required, and unique processes had to be built in order to begin analyzing the data," Morley said. 

Also: UEFI firmware vulnerabilities affecting Fujitsu, Intel and more discovered

"The data complexity also required special processes to search for and identify key information. This process was lengthy but necessary to ensure appropriate notification occurred. On January 18, 2022, it was confirmed that your information was involved."

The company said it would provide credit monitoring and identity theft protection services to those affected. A call center has been established to answer questions about the issue. 

The company offers back-office processing, meetings and incentives management as well as exhibits and displays production to its clients.

Cerberus Sentinel's Chris Clements said it is overwhelmingly likely that the attackers had access to Morley data for weeks or even months before they ran their ransomware, locking Morley and their customers out of their data.  

"During this timeframe, people exposed to risk of fraud or identity theft may have been actively targeted while being oblivious to their risk. It's incumbent upon any organization that stewards potentially sensitive data provided by their users that they not only defend it as well as possible but that they also have the capabilities to quickly identify potentially compromised information and notify those affected should the worst happen. Those processes should be part of any incident response plan and regularly tested," Clements said. 

"The unfortunate reality is that far too many organizations don't have effective auditing controls to identify when data is access and by whom, or means to detect unusually high levels of access or exfiltration that can indicate that an attack is happening. Monitoring or controls to limit speed and volume of data access is a critical control that is often overlooked when planning cybersecurity strategy. Actions like alerting if a user's account is accessing data during unusual or non-work hours or pulling 200 records in an hour when they normally access 20 can be instrumental in proactively detecting and limiting exposure from a potential breach."

Security

8 habits of highly secure remote workersHow to find and remove spyware from your phoneThe best VPN services: How do the top 5 compare?How to find out if you are involved in a data breach -- and what to do next
  • 8 habits of highly secure remote workers
  • How to find and remove spyware from your phone
  • The best VPN services: How do the top 5 compare?
  • How to find out if you are involved in a data breach -- and what to do next

tag-icon Tags chauds: technologie La sécurité

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.
Our company's operations and information are independent of the manufacturers' positions, nor a part of any listed trademarks company.