Connect with us

Malware

Comcast and Truist Bank Clients Impacted by Devastating FBCS Data Breach

Discover how Comcast and Truist Bank customers were affected by a data breach at Florida-based business communications provider FBCS. Learn about the exposed data and the financial risks involved. Stay informed on cybersecurity developments and protect your sensitive information.

Published

on

The Comcast logo in white stands out against a bright rainbow gradient background, offering a vibrant display reminiscent of the company's resilience following incidents like the FBCS Data Breach.

Comcast Cable Communications and Truist Bank have recently disclosed that they were affected by a data breach at Financial Business and Consumer Solutions (FBCS), a U.S. debt collection agency. As a result, both companies are now informing their customers that their personal data has been compromised.

The data breach at FBCS took place between February 14 and February 26, 2024, and was initially believed to have impacted 1.9 million people. However, further investigations increased the number of affected individuals to 4.2 million. The stolen data includes names, Social Security numbers, dates of birth, account information, and driver’s license numbers or ID cards.

Due to FBCS’s worsening financial situation, possibly as a direct result of the breach, entities indirectly impacted by the incident will have to handle the notification and remediation processes themselves.

The Impact on Comcast Customers

Initially, FBCS assured Comcast in March that no customer data was impacted by the security incident. However, in July, FBCS informed Comcast that its customer data was indeed affected.

A notice submitted to the Maine authorities revealed that 273,703 Comcast customers were impacted by the breach. According to the notification sent to affected customers, FBCS has no indication that any compromised personal information has been misused. Impacted individuals have been provided with 12 months of free identity theft protection services.

Truist Bank Affected as Well

Truist Bank, one of the largest banks in the United States, also sent data breach notices to its customers linked to the FBCS incident. The letters, which were sent out in mid-September, informed customers that their name, address, account number, date of birth, and Social Security number may have been impacted.

Truist operates over 2,700 branches across 15 states and employs 40,000 people. The number of impacted customers could be significant, though it has not been specified. We reached out to Truist for more information, but a comment was not immediately available.

It’s worth noting that Truist Bank confirmed a separate breach last June, which reportedly occurred in October 2023 after a threat actor leaked stolen data on a hacking forum.

A Call to Stay Informed and Vigilant

Data breaches like these are becoming all too common in today’s digital world. As consumers, it’s essential to stay informed about the latest cybersecurity threats and take necessary precautions to protect your personal data. We at IT Services are committed to keeping you up-to-date on the latest cybersecurity news and offering expert advice to help you safeguard your digital life. Don’t hesitate to contact us or keep coming back to learn more.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Malware

Fidelity Investments Reveals Massive Data Breach Impacting Over 77,000 Individuals: Urgent Action Needed

Fidelity Investments has reported a data breach affecting over 77,000 customers. The breach was discovered during a security review, with hackers potentially gaining access to names, addresses, and social security numbers. Fidelity advises customers to remain vigilant and monitor their accounts for suspicious activity.

Published

on

A sign of Fidelity Investments adorns a commercial building with glass windows and modern architecture, a reminder of the urgent action needed in today's fast-paced financial world.

Image: Fidelity Investments

A Major Breach at Fidelity Investments

Imagine you’re one of the 77,000 customers of Fidelity Investments, a Boston-based multinational financial services company, who just found out that their personal information had been exposed. This was the unfortunate reality for many after Fidelity disclosed that its systems were breached in August.

As one of the largest asset managers globally, with $14.1 trillion in assets under administration and $5.5 trillion under management, Fidelity employs over 75,000 associates across 11 countries in North America, Europe, Asia, and Australia. With such a massive operation, this breach is undoubtedly a significant concern for both the company and its customers.

The Details of the Breach

In a filing with the Office of Maine’s Attorney General, Fidelity revealed that an unknown attacker stole data between August 17 and 19 using “two customer accounts that they had recently established.” The company detected the activity on August 19 and immediately took steps to terminate the access, launching an investigation with assistance from external security experts.

In data breach notifications sent to affected individuals, Fidelity said, “The information obtained by the third party related to a small subset of our customers. Please note that this incident did not involve any access to your Fidelity account(s).” However, the company has yet to reveal what personal information was stolen in the data breach besides names and other personal identifiers.

When we asked how the attacker could access the data of thousands of customers using two accounts they previously created, Fidelity’s head of external corporate comms, Michael Aalto, said they couldn’t share that information. However, he added that “they did not view accounts. They viewed customer information.”

What’s Being Done to Protect Customers?

Even though Fidelity says there is no evidence that the stolen customer data has been misused, the company is providing affected customers with two years of free TransUnion credit monitoring and identity restoration services.

Fidelity also advised customers to “remain vigilant for fraudulent activity or identity theft by regularly reviewing your statements for your financial and other accounts, monitoring your credit reports, and promptly reporting any suspicious activity to your financial institution (if applicable), local law enforcement, or your appropriate state authority.”

A Call to Take Cybersecurity Seriously

This incident serves as a powerful reminder of the importance of cybersecurity for both individuals and companies. As technology continues to evolve, so do the threats we face. It’s crucial to stay informed about potential risks and take the necessary steps to protect ourselves and our sensitive information.

That’s why we’re here to help. Our IT Services team is dedicated to providing you with the latest cybersecurity information and guidance. Don’t hesitate to contact us if you have any questions or concerns, and remember to keep coming back to learn more about how to stay safe in our digital world.

Continue Reading

Malware

Casio Suffers Devastating Cyber Attack: Underground Ransomware Leaks Critical Stolen Data

Discover how Casio fell victim to an underground ransomware group, which claims to have stolen sensitive data from the tech giant. Learn about the group’s subsequent data leak and potential repercussions. Stay up-to-date on the latest cybersecurity threats.

Published

on

A person in a hoodie sits at a laptop displaying a lock symbol, surrounded by digital code and documents in ominous red and black tones, hinting at a looming cyber attack.

We have recently learned that the Underground ransomware gang has taken credit for an attack on Casio, the Japanese tech giant, on October 5. The attack caused disruptions in the company’s systems and affected some of its services.

Earlier this week, Casio acknowledged the attack on its website but did not provide any specifics. Instead, they mentioned that external IT specialists were brought in to determine if any personal data or other confidential information was stolen during the breach.

Now, the Underground ransomware group has posted information on its dark web extortion portal, claiming they have stolen a significant amount of data from Casio.

The stolen data allegedly includes:

  • Confidential documents (社外秘)
  • Legal documents
  • Personal data of employees
  • Confidential NDAs
  • Employee payroll information
  • Patents information
  • Company financial documents
  • Project information
  • Incident reports

If these claims are true, Casio’s workforce and intellectual property have been significantly compromised, potentially harming the company’s business operations.

Casio data leaked on Underground ransomware portal
Casio data leaked on Underground ransomware’s extortion portal
Source: IT Services

We contacted Casio to request a comment on these claims and the data leak, but we have not received any response. As such, we cannot verify the authenticity of the threat actor’s statements at this time.

Underground ransomware: A brief overview

According to a Fortinet report from August 2024, Underground is a relatively small-scale ransomware operation that has been targeting Windows systems since July 2023. The operation is associated with the Russian cybercrime group ‘RomCom’ (Storm-0978), previously known for delivering Cuba ransomware on breached systems.

Fortinet’s report indicates that over the summer, Underground ransomware operators exploited CVE-2023-36884, a remote code execution flaw in Microsoft Office, likely used as an infection vector. Once a system is breached, the attackers modify the registry to keep Remote Desktop sessions alive for 14 days after user disconnection, providing ample time for them to maintain access to the system.

Interestingly, Underground does not add any file extensions to encrypted files and is designed to avoid file types essential for Windows operation, ensuring the affected system remains functional. The ransomware also stops the MS SQL Server service to free up data for theft and encryption, maximizing the impact of the attack.

Like most Windows ransomware strains, Underground deletes shadow copies to make data restoration extremely difficult.

Underground's ransom note
Underground’s ransom note
Source: Fortinet

One unique aspect of Underground’s extortion tactics is that it also leaks stolen data on Mega, promoting links to archives hosted there via its Telegram channel. This strategy increases the exposure and availability of the stolen information.

Currently, Underground ransomware’s extortion portal lists 17 victims, with the majority based in the USA.

It remains to be seen whether the Casio attack will serve as the catalyst for the threat group to gain mainstream attention and increase the frequency and scale of its attacks.

As cybersecurity experts, we believe it’s essential for businesses and individuals to stay informed about the latest threats and best practices for protecting their valuable data. We encourage you to contact us and keep coming back to learn more about the ever-evolving world of cybersecurity.

Continue Reading

Malware

Massive Cyberattack Hits Internet Archive: 31 Million Users’ Data Compromised

The Internet Archive has experienced a data breach, impacting 3.1 million users. Personal information, including email addresses and passwords, was exposed, possibly allowing hackers to access other accounts using the same credentials. Users are urged to change their passwords and stay vigilant against phishing attempts.

Published

on

Internet Archive logo on a red geometric background, symbolizing resilience even in the face of cyberattacks.

Updates added at the end of the article.

Did you know that the Internet Archive’s “The Wayback Machine” was recently compromised in a data breach? A hacker managed to infiltrate the website and steal a user authentication database containing 31 million unique records. Yikes!

News of the breach began circulating when visitors to archive.org saw a JavaScript alert created by the hacker, stating that the Internet Archive was breached.

“Have you ever felt like the Internet Archive runs on sticks and is constantly on the verge of suffering a catastrophic security breach? It just happened. See 31 million of you on HIBP!,” the message read.

What is HIBP?

HIBP stands for Have I Been Pwned, a data breach notification service created by Troy Hunt. Threat actors commonly share stolen data with this service so users can check if their information has been compromised.

Hunt confirmed that the threat actor shared the Internet Archive’s authentication database with him, which is a 6.4GB SQL file named “ia_users.sql.” The database contains authentication information for registered members, including email addresses, screen names, password change timestamps, Bcrypt-hashed passwords, and other internal data.

The most recent timestamp on the stolen records is September 28th, 2024, likely when the database was stolen.

How many people are affected?

Hunt says there are 31 million unique email addresses in the database, with many subscribed to the HIBP data breach notification service. The data will soon be added to HIBP, allowing users to enter their email and confirm if their data was exposed in this breach.

The data was confirmed to be real after Hunt contacted users listed in the databases, including cybersecurity researcher Scott Helme, who allowed us to share his exposed record.

Helme confirmed that the bcrypt-hashed password in the data record matched the brcrypt-hashed password stored in his password manager. He also confirmed that the timestamp in the database record matched the date when he last changed the password in his password manager.

What’s being done about it?

Hunt contacted the Internet Archive to start a disclosure process and stated that the data would be loaded into the HIBP service in 72 hours. However, he has not heard back since.

It is not known how the threat actors breached the Internet Archive and if any other data was stolen.

What else is happening?

Earlier, the Internet Archive suffered a DDoS attack, which has now been claimed by the BlackMeta hacktivist group, who says they will be conducting additional attacks.

We reached out to the Internet Archive with questions about the attack, but no response was immediately available.

Update 10/10/24: Internet Archive founder Brewster Kahle shared an update on X last night, confirming the data breach and stating that the threat actor used a JavaScript library to show the alerts to visitors.

“What we know: DDOS attacked-fended off for now; defacement of our website via JS library; breach of usernames/email/salted-encrypted passwords,” reads a first status update tweeted last night.

“What we’ve done: Disabled the JS library, scrubbing systems, upgrading security.”

A second update shared this morning states that DDoS attacks have resumed, taking archive.org and openlibrary.org offline again.

While the Internet Archive is facing both a data breach and DDoS attacks at the same time, it is not believed that the two attacks are connected.

Stay safe out there!

Always be cautious of your online security and remember to change your passwords regularly. If you want to keep up-to-date with cybersecurity news and advice, don’t hesitate to contact us and keep coming back to learn more.

Continue Reading

Trending

Copyright © 2023 IT Services Network.