Connect with us

Malware

Rite Aid Reveals Massive Data Breach: 2.2 Million People Affected in June Cyberattack

US pharmacy chain Rite Aid has disclosed a data breach impacting 22 million customers. The breach, which took place in June, exposed customers’ names, contact details, and prescription information. Rite Aid urges vigilance against potential phishing attacks and is offering free credit monitoring for those affected.

Published

on

Image: JJBers (CC BY 2.0)

Imagine walking into your favorite drugstore, only to find out that your personal information has been compromised. That’s what happened to 2.2 million customers of Rite Aid, the third-largest drugstore chain in the United States, last month. The company described the event as a “data security incident.”

With over 6,000 pharmacists and more than 45,000 employees in total, Rite Aid operates 1,700 retail stores across 16 states. The breach happened on June 6, and it took the company 12 hours to detect the intrusion, which was carried out using an employee’s credentials.

By June 17, Rite Aid discovered that the attackers had acquired data associated with specific retail product purchases or attempted purchases. This data included the purchaser’s name, address, date of birth, and driver’s license number or other forms of government-issued ID presented during purchases between June 6, 2017, and July 30, 2018. Thankfully, customers’ Social Security numbers, financial information, and health information were not exposed in the incident.

Who’s Behind the Attack?

While Rite Aid has yet to reveal the attackers’ identity, the RansomHub ransomware gang claimed responsibility, stating that they also stole customer data from the company’s systems. They claim to have obtained over 10 GB of customer information, which equates to around 45 million lines of personal data. This information includes names, addresses, driver’s license IDs, dates of birth, and Rite Aid rewards numbers.

RansomHub added Rite Aid to their dark web leak site after the company allegedly halted ransom negotiations. As a result, the ransomware gang shared a screenshot of the claimed stolen data as proof and stated that everything would be leaked in two weeks.

RansomHub is a relatively new operation that extorts victims in exchange for not leaking stolen files. If negotiations fail, the files are often auctioned to the highest bidder. Their focus is on data-theft-based extortion rather than encrypting victims’ files. RansomHub has also claimed responsibility for breaching U.S. telecom provider Frontier Communications, stealing information from 750,000 customers and forcing the company to shut down systems to contain the breach.

What Can You Do?

As a customer, it’s crucial to stay vigilant and monitor your accounts for any suspicious activity. If you’re a business owner, it’s more important than ever to invest in robust cybersecurity measures to protect your customers’ data.

At IT Services, we understand the importance of safeguarding your information. Our team of experts is here to help you navigate the complex world of cybersecurity and ensure your business is protected from potential threats. Contact us today and let’s work together to keep your data safe.

Remember, staying informed is the key to staying protected. Keep coming back to learn more about the latest cybersecurity threats and how you can safeguard your information.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Malware

Fortinet Acknowledges Massive Data Breach: Hacker Boasts Theft of 440GB Files

Fortinet, a network security company, has confirmed a data breach after a hacker claimed to have stolen 440GB of files. The breach is believed to have exposed client information, including email addresses and passwords. Fortinet is investigating the incident and taking steps to mitigate the potential impact on its customers and partners.

Published

on

The Fortinet logo, centered on a vibrant red background with streaks of light radiating outward, symbolizes robust cybersecurity against hackers and data breaches.

You may have heard about the recent data breach at cybersecurity giant Fortinet, and it’s worth taking a closer look at what happened to understand the risks and implications. The company is one of the largest cybersecurity providers in the world, offering a range of products and services such as secure networking devices, network management solutions, and consulting services.

A Threat Actor Strikes

Recently, a threat actor claimed to have stolen a whopping 440GB of data from Fortinet’s Microsoft Sharepoint server. This individual, going by the name “Fortibitch,” announced the theft on a hacking forum and even shared credentials to an alleged storage bucket containing the stolen data.

We have not accessed this storage bucket to verify its contents, but it’s important to note that the threat actor claimed to have attempted to extort Fortinet into paying a ransom to prevent the data from being published. Fortinet, however, refused to pay.

Fortinet’s Response

When we reached out to Fortinet about this incident, the company confirmed that customer data had indeed been stolen from a “third-party cloud-based shared file drive.” They described the breach as involving “limited data related to a small number of Fortinet customers.”

Initially, Fortinet did not disclose the number of affected customers or the nature of the compromised data, but they did state that they had “communicated directly with customers as appropriate.” In a later update on their website, Fortinet revealed that the breach affected less than 0.3% of its customer base and had not resulted in any malicious activity targeting those customers.

It’s also worth noting that Fortinet confirmed the incident did not involve data encryption, ransomware, or access to their corporate network. We have contacted Fortinet with additional questions about the breach, but have not received a reply at this time.

Not the First Time

This isn’t the first time Fortinet has been targeted by threat actors. In May 2023, an individual claimed to have breached the GitHub repositories of Panopta, a company acquired by Fortinet in 2020, and leaked stolen data on a Russian-speaking hacking forum.

A Call to Stay Informed and Vigilant

As this incident demonstrates, even the most prominent cybersecurity companies can fall victim to data breaches. That’s why it’s crucial to stay informed about the latest threats and to take steps to protect your own data and networks. We’re here to help you navigate the ever-evolving cybersecurity landscape and to provide the expertise and support you need to safeguard your digital assets.

Don’t hesitate to reach out to us to learn more about how we can help you stay ahead of the curve in cybersecurity, and be sure to keep coming back for the latest updates and insights.

Continue Reading

Malware

Transport for London Reveals Alarming Cyberattack: Customer Data Compromised

Transport for London (TfL) has confirmed customer data was stolen in a cyber attack. TfL’s Oyster card and contactless payment systems were targeted, resulting in a partial shutdown of online services. The transport operator urges users to change their passwords and remain vigilant for potential phishing emails or fraudulent activity.

Published

on

A red double-decker bus, marked with advertising, is parked on a street in front of a large building exhibiting vertical lines on its facade. This scene is emblematic of Transport for London’s iconic transport system.

Did you know that on September 1st, the urban transportation agency, Transport for London (TfL), was hit by a cyberattack? Initially, they assured customers that there was no evidence of data being compromised. However, after further investigation, it turns out that some customer data was indeed impacted, including names, contact details, email addresses, and home addresses.

A Quick Recap of the Cyberattack

The attack was first made public on September 2nd, and since then, TfL staff has been dealing with system outages and disruptions. This includes the inability to respond to customer requests submitted via online forms, issue refunds for journeys paid with contactless methods, and more.

As we now know, the impact on customer data was not as minimal as initially thought. According to TfL’s status page, the investigation revealed that certain customer data had been accessed during the cyberattack.

Moreover, the agency discovered that the hackers may have accessed some Oyster card refund data and bank account number and sort codes for approximately 5,000 customers.

Worried about being affected? We can confirm that affected customers are receiving personalized notifications informing them of the data breach, so be sure to check your email to see if you’re among those impacted.

What Does This Mean for TfL Customers?

As TfL continues to work on remediation efforts, some services remain unavailable. Here’s a quick rundown of what you should be aware of as a customer:

  • Live Tube arrival info is unavailable on some digital channels, but in-station and journey planning info is still accessible.
  • Applications for new Oyster photocards, including Zip cards, are temporarily suspended. If you need to replace a lost card, call 0343 222 1234 (option 1).
  • If you can’t apply for a photocard, keep records of your fares; you might be able to get a refund once the cyber incident is resolved.
  • Contactless users can’t access their online journey history.
  • Refunds for incomplete journeys using contactless payment methods are unavailable. Remember to always touch in/out. Oyster users can manage refunds online.
  • Staff has limited system access, causing delays in online responses.

As of now, no ransomware gang has claimed responsibility for the cyberattack on TfL.

A Wake-Up Call for Better Cybersecurity

This incident serves as a reminder that we must be vigilant when it comes to cybersecurity. Businesses and individuals alike should take the necessary steps to protect their data and systems from cyber threats.

As an IT Services expert in cybersecurity, we’re here to help you stay informed and ensure you’re taking the right precautions to protect yourself from cyberattacks. So, don’t hesitate to reach out to us for advice or assistance. And keep coming back to learn more about how you can stay one step ahead of cyber threats.

Continue Reading

Malware

Massive Data Breach Hits Payment Gateway: 1.7 Million Credit Card Users Impacted

A data breach at Indian payment gateway provider Juspay has exposed the personal information of 17 million credit card owners. The compromised data includes names, email addresses, and phone numbers, putting users at risk of phishing attacks. Juspay has assured customers that full card numbers, order information, and passwords remain secure.

Published

on

A person wearing a hooded jacket holds a glowing rectangular device in a dark, futuristic environment with neon red and blue digital graphics in the background, hinting at a massive data breach among credit card users.

Imagine this: you’re enjoying a lovely dinner at your favorite restaurant, and when it’s time to pay, you hand over your credit card without a second thought. What you don’t know is that a cybercriminal has been lurking in the shadows, just waiting for the opportunity to snatch your personal and credit card information. That’s exactly what happened to nearly 1.7 million individuals when payment gateway provider Slim CD suffered a data breach.

The Slim CD Data Breach: What Happened?

Slim CD is a company that provides payment processing solutions for businesses, allowing them to accept electronic and card payments through various platforms. Unfortunately, hackers were able to access Slim CD’s network for almost a year, from August 2023 to June 2024. The company first detected suspicious activity on June 15, 2024, and during their investigation, they discovered the unauthorized access had begun back in August 2023.

According to the notification sent to the impacted individuals, the threat actor had viewed or obtained access to credit card information for just two days, between June 14th and 15th, 2024. The types of data that may have been accessed include:

  • Full name
  • Physical address
  • Credit card number
  • Payment card expiration date

Is Your Credit Card Information Safe?

While the exposed information doesn’t include the card verification number (CVV), there’s still a risk of credit card fraud. Nowadays, cybercriminals have become increasingly sophisticated and may use the stolen information to piece together enough data for fraudulent transactions. It’s important to remain vigilant and monitor your credit card statements for any suspicious activity.

What Can You Do to Protect Yourself?

Slim CD has taken measures to strengthen its security to prevent future incidents like this, but it’s crucial for you to take charge of your own cybersecurity. Here are some steps you can take to stay ahead of cybercriminals:

  • Regularly monitor your credit card statements for any unauthorized transactions.
  • Report any suspicious activity to your card issuer immediately.
  • Be cautious when providing your personal and credit card information online or over the phone.
  • Consider using a credit monitoring service for added protection.

Don’t Let Cybercriminals Win: Stay Informed and Protected

As the digital landscape continues to evolve, so do the threats posed by cybercriminals. Staying informed about cybersecurity risks and taking proactive steps to protect your personal information is more important than ever before. We’re here to help you navigate the complex world of cybersecurity and ensure your personal data remains secure.

So, don’t let cybercriminals get the upper hand. Keep coming back to learn more about the latest threats and how you can stay protected in the digital age. Together, we’ll make sure that your personal information stays safe and out of the hands of cybercriminals.

Continue Reading

Trending