Connect with us

Malware

Urgent: Over 3 Million People’s Data Exposed in MOVEIt Breach; GenWorth and CalPERS Among Affected Companies

The MoveIT data breach has exposed sensitive information belonging to 32 million users, including Genworth and CalPERS. The breach was discovered by a security researcher who found that the data was publicly available on a server. The exposed data includes names, addresses, birthdates, Social Security numbers, and financial information. Users are advised to monitor their accounts for any suspicious activity.

Published

on

MoveIt breach, data exposed.

PBI Research Services Suffers Data Breach, Millions of Customers’ Sensitive Data Exposed

IT Services provider PBI Research Services has fallen victim to a data breach, with three of its clients disclosing that the data of 4.75 million people was stolen in recent MOVEit Transfer data theft attacks. The attacks began on May 27th, 2023, when the Clop ransomware gang allegedly exploited a zero-day vulnerability in MOVEit Transfer to steal data from hundreds of companies. Over the past week, the Clop gang began extorting companies by gradually listing impacted organizations on its data leak site to pressure victims to pay a ransom demand.

According to three different disclosures from PBI clients, millions of customers have had their sensitive data exposed in these attacks. However, this number may increase as other companies make further disclosures.

The first impacted entity is Genworth Financial, a Virginia-based life insurance services provider. In a MOVEit Security Event notice published on their website, Genworth says PBI informed them of the security breach on May 29th, 2023, and verified on June 16th that customers’ personal data was stolen. The firm estimates that the data breach impacted between 2.5 and 2.7 million individuals who are either its customers (insurance, annuity, long-term care) or working for them as insurance agents. The exposed data includes the full name, date of birth, social security number, zip code, state of residence, policy number, and agent ID (for agents). Genworth emphasized that this attack did not affect its own systems and network or its business operations, as it does not use the MOVEit or GoAnywhere products.

Affected individuals will receive notices of a data breach in the coming weeks, which will contain instructions on enrolling for free-of-charge credit monitoring and identity theft protection services.

The second firm impacted by the PBI breach is New York-based insurance provider Wilton Reassurance, which reports that 1,482,490 of its customers had data stolen. As reported to the Office of the Maine Attorney General, the exposed information includes customers’ names and social security numbers. Wilton Reassurance has informed that they will provide 12 months of free identity theft protection and credit monitoring services through Kroll to impacted individuals.

The third company impacted by PBI’s data breach is CalPERS (California Public Employees’ Retirement System), the largest public pension fund in the United States, which is now informing retirees and beneficiaries about the event. CalPERS says it responded to the situation immediately after learning about the breach and took actions to secure its members’ benefits and data by strengthening its data management protocols that pertain to working with contractors. The agency says approximately 769,000 of its members were impacted by the security incident, who will all receive notification letters with detailed information on how to access two years of free credit monitoring service through Experian.

As of the time of writing, PBI Research Services has not been listed on Clop’s data leak site. While this could mean that the company is negotiating with the threat actors not to release data, it could also mean that Clop has not begun extorting the organization yet.

We have reached out to PBI Research Services for comment on the situation but have not received a response as of publication.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Malware

Exclusive: New York Times Source Code Hacked – Cybercriminals Exploit Vulnerable GitHub Token

An exposed GitHub token led to hackers stealing the New York Times’ source code. The attackers exploited the misconfigured token to gain access to the newspaper’s private repositories, highlighting the importance of securing GitHub tokens and the risks of leaving sensitive information exposed online.

Published

on

Imagine waking up one day, sipping your coffee, and scrolling through your social media feed only to find out that your company’s sensitive data and source code have been leaked on an online message board. That’s precisely what happened to The New York Times when its internal data was stolen from the company’s GitHub repositories in January 2024 and later leaked on the 4chan message board. And we, at IT Services, are here to tell you all about it.

What Exactly Was Stolen?

As first reported by VX-Underground, an anonymous user posted a torrent containing a whopping 273GB of stolen data from The New York Times Company. This data included “basically all source code,” with around 5,000 repositories and 3.6 million files in total.

From what we can tell, the data stolen spans a wide variety of information, including IT documentation, infrastructure tools, and even source code for the popular Wordle game. The fact that such a diverse range of information was taken highlights the need for robust cybersecurity measures.

How Did This Happen?

According to a ‘readme’ file in the stolen data archive, the threat actor responsible for this breach managed to access the company’s repositories using an exposed GitHub token. In a statement provided to us, The Times confirmed that the breach occurred in January 2024 after credentials for a cloud-based third-party code platform (which was later revealed to be GitHub) were exposed.

“The underlying event related to yesterday’s posting occurred in January 2024 when a credential to a cloud-based third-party code platform was inadvertently made available. The issue was quickly identified and we took appropriate measures in response at the time. There is no indication of unauthorized access to Times-owned systems nor impact to our operations related to this event. Our security measures include continuous monitoring for anomalous activity.”

❖ The New York Times

It’s important to note that The Times stated that the breach of its GitHub account didn’t affect its internal corporate systems and had no impact on its operations, which is a small silver lining in this story.

Not the Only One

Interestingly, The Times’ leak wasn’t the only one that happened on 4chan that week. The first leak involved 415MB of stolen internal documents for Disney’s Club Penguin game. We were told by sources that this leak was part of a more significant breach of Disney’s Confluence server, where threat actors stole 2.5 GB of internal corporate data. At this time, it’s unclear if the same person conducted both the New York Times and Disney breaches.

What Can We Learn From This?

The breaches of The New York Times and Disney serve as stark reminders of the importance of robust cybersecurity measures. Companies, big and small, need to invest in their cybersecurity infrastructure and adopt best practices to protect their sensitive data and intellectual property. Remember, it only takes one weak link in the security chain for threat actors to exploit and gain unauthorized access.

If you’re looking for guidance on how to strengthen your cybersecurity defenses or simply want to learn more about the latest threats and trends, don’t hesitate to reach out to us. We’re always here to help you stay one step ahead of the hackers. Keep coming back to learn more!

Continue Reading

Malware

Wake-Up Call: The RansomHub Data Breach Impacting Christie’s Clients

Why You Should Be Concerned About the RansomHub Data Breach



It’s a brisk morning, and just like that, you receive a notification email from a prestigious auction house, Christie’s. You’re a valued client, and they’re letting you know that your sensitive personal information has been compromised in a recent data breach. You’re not alone – countless other clients have received similar notifications. The culprit? A cybercriminal group called RansomHub. This is a wake-up call, my friend, and it’s time to talk about cybersecurity.



Inside the RansomHub Data Breach



Imagine a thief breaking into your home and holding your valuable possessions ransom. RansomHub operates similarly, but in the digital world. They infiltrate a company’s network, steal sensitive data, and demand a hefty ransom in exchange for not leaking the information. In Christie’s case, they couldn’t prevent the breach. Their clients’ data, including names, addresses, and financial information, is now at risk. The question isn’t whether or not you should be worried—it’s how worried you should be.



Why This Matters to You



It’s not just about Christie’s clients. The fact is, data breaches are becoming more and more common. In 2021 alone, there were over 1,200 reported data breaches, impacting over 300 million individuals in the U.S. It’s clear that no one is immune, and everyone needs to take cybersecurity more seriously. Even if you haven’t been directly affected by the RansomHub breach, it’s a stark reminder that your personal information could be at risk at any moment.



What You Can Do to Protect Yourself



Feel like you’re being followed in a dark alley? It’s time to take action. Here are some simple steps you can take to safeguard your sensitive data:




  1. Regularly update your passwords: Use different, complex passwords for each of your accounts and change them periodically.

  2. Enable multi-factor authentication: Add an extra layer of security by requiring a unique code or fingerprint to access your accounts.

  3. Monitor your accounts closely: Keep an eye out for any suspicious activity or unauthorized access to your accounts.

  4. Stay informed about the latest cybersecurity threats: Knowledge is power, so keep up-to-date with the latest news on data breaches and cybersecurity trends.



Together, We Can Combat Cybersecurity Threats



It’s time to step up and protect ourselves, our businesses, and our personal information from cybercriminals like RansomHub. By staying informed, taking proactive steps to safeguard our data, and encouraging others to do the same, we can make a difference in the fight against cybercrime.



Don’t let this wake-up call go unanswered. Contact us today to learn more about how you can protect yourself from data breaches and keep coming back for the latest cybersecurity updates.

Why Cybersecurity Matters: A Personal Insight

Picture this: You’re sitting in your favorite coffee shop, sipping on a latte, and catching up on your emails. You click on a seemingly harmless message, and suddenly, you’re locked out of your account. Your passwords have been compromised, and your personal information is at risk. Sounds terrifying, right? Well, it’s time we talk about cybersecurity and why it’s essential in today’s digital world.

Understanding the Threat Landscape

Think of cybersecurity like a game of chess. To win, you need to understand the board and anticipate your opponent’s moves. In the digital realm, your opponents are cybercriminals, and their moves are constantly changing. According to Cybersecurity Ventures, cybercrime is predicted to cost the world $10.5 trillion annually by 2025, a staggering figure that highlights the importance of staying ahead of these threats.

So, Who’s At Risk?

The short answer? Everyone. From individuals to large corporations, no one is immune to cyberattacks. A recent high-profile example is the Christie’s Ransomhub data breach, where the esteemed auction house’s clients had their personal information exposed. It just goes to show that even well-established organizations can fall victim to cybercrime.

Protecting Your Digital Kingdom

Imagine your digital life as a castle. You need to fortify it with strong walls, a moat, and guards to keep intruders at bay. Here are some simple steps to help protect your online identity:

  1. Use strong, unique passwords for all your accounts, and consider using a password manager to keep track of them.
  2. Enable two-factor authentication wherever possible, adding an extra layer of security.
  3. Keep your software up to date, as outdated software can be vulnerable to attacks.
  4. Be cautious with public Wi-Fi, and consider using a VPN to encrypt your data while connected to unsecured networks.
  5. Stay informed about the latest threats and how to protect yourself from them.

A Call to Action

Now that you know the importance of cybersecurity and how to defend your digital castle, it’s time for action. Stay vigilant, and don’t let your guard down. And remember, we’re here to help you navigate the ever-evolving world of cybersecurity. So reach out to us with any questions, concerns, or if you just want to learn more. Let’s work together to protect your digital kingdom!

Published

on

Imagine having your sensitive personal information exposed to the world. That’s the reality for many individuals who’ve fallen victim to the RansomHub ransomware gang, and one of their recent targets was the British auction house Christie’s.

Christie’s Suffers Security Breach

On May 9, 2024, Christie’s discovered a security breach that affected some of its systems. They immediately took measures to secure their network and called in external cybersecurity experts to help investigate the incident’s impact. The auction house also notified law enforcement and is now working to support their investigation.

During the analysis of the breach, Christie’s found that a threat actor accessed and extracted customer files between May 8 and May 9. Following the investigation, Christie’s reviewed the accessed files to identify individuals whose information may have been affected, obtain their contact information, and alert them of the incident after completing the review on May 30.

In the data breach notification letters sent to affected individuals, Christie’s stated that they are “not aware of any attempts to misuse your information as a result of this incident.” They also mentioned taking additional steps to secure their systems and continue evaluating technical and organizational measures to avoid a recurrence of a similar incident.

To help impacted people, Christie’s is offering a free twelve-month subscription to the CyEx Identity Defense Total identity theft and fraud monitoring service. This service will alert individuals of changes to their Experian, Equifax, and TransUnion credit files, helping them spot any potentially fraudulent activity on their credit reports.

RansomHub Claims Responsibility

Although Christie’s didn’t name the attackers behind the May breach, the RansomHub gang added the auction house to its dark web leak portal. They claimed to have breached Christie’s systems and stolen sensitive client data, including full names, addresses, ID document details, and other personal information of at least 500,000 clients.

RansomHub has since updated the Christie’s entry, saying that they’ve sold the stolen data on their own auction platform. However, we couldn’t independently verify the threat actors’ claims that they sold the data.

While RansomHub is a relatively new operation, they demand ransom payment from victims in exchange for not leaking files stolen during attacks. If negotiations fail, they often auction the stolen files exclusively to the highest bidder. They’ve recently claimed the breach of leading U.S. telecom provider Frontier Communications, which had to shut down its systems in April to contain a cyberattack. The company warned 750,000 customers this week that their information was exposed in a data breach.

How Can You Protect Yourself?

Unfortunately, data breaches are becoming increasingly common, and even high-profile organizations like Christie’s aren’t immune. It’s more important than ever to stay informed and take steps to protect your personal information. Regularly monitoring your credit reports, using strong, unique passwords, and being cautious about the information you share online are all essential.

Don’t wait until it’s too late. Reach out to IT Services to learn more about how you can protect yourself in this ever-evolving digital landscape. Stay informed, stay protected, and keep coming back for the latest cybersecurity insights.

Continue Reading

Malware

Frontier Alerts 750,000 Customers of Data Breach Following Intense Extortion Threats

US internet service provider Frontier Communications has warned 750,000 customers of a potential data breach after extortion threats were received. The company is investigating the breach and has alerted the FBI, while customers are being offered free identity protection services.

Published

on

Imagine you’re a Frontier Communications customer, and you just found out that your personal information was exposed in a data breach. You’re one of 750,000 customers affected by an April cyberattack carried out by the RansomHub ransomware operation. How would you feel? Your privacy has been invaded, and you’re now at risk for identity theft and other potential harm.

For those of you who may not know, Frontier is a major U.S. communications provider that delivers gigabit Internet speeds over a fiber-optic network to millions of consumers and businesses across 25 states. In mid-April 2024, the company fell victim to a cyberattack, which allowed hackers to access customers’ personal information stored on its systems.

According to the data breach notification sent to impacted customers, the breach exposed the full names and Social Security Numbers (SSNs) of 751,895 customers. Fortunately, no customer financial information was compromised in this incident.

Since discovering the breach, Frontier has informed regulatory authorities and implemented additional measures to strengthen its network security. Investigations on the incident’s impact are currently underway. Impacted clients are also being offered one year of free credit monitoring and identity theft services through Kroll.

Many Frontier customers reported that their Internet connection went down during the attack, and support phone numbers played prerecorded messages instead of connecting to a human operator. This shows the far-reaching effects of a cyberattack on both individuals and businesses.

Who’s Behind the Attack?

RansomHub, an extortion group, claimed responsibility for the attack on Frontier earlier this week. They added Frontier Communications to their extortion portal on the dark web, threatening to leak 5GB of data allegedly stolen during the attack, containing the information of 2 million customers.

The group has given Frontier until June 14 to respond to their demands, or they will sell the data to the highest bidder. This leaves Frontier customers vulnerable to potential scams and identity theft.

RansomHub was recently exposed as a likely buyer of the Knight ransomware source code, but they rarely use encryption in their attacks, typically limiting the scope to data-theft-based extortion. In the case of Frontier Communications, there’s no mention of encryption or reports about service outages apart from those linked to the containment measures in mid-April.

What Can You Do to Protect Yourself?

If you are a Frontier customer, it is essential to take precautions to protect your personal information. Here are some steps you can take:

  • Treat unsolicited communications with caution and avoid sharing information with people you don’t know.
  • Reset your account passwords to prevent unauthorized access.
  • Monitor your bank statements for suspicious activity.

It’s crucial to stay vigilant and proactive in protecting your personal information from cyber criminals. While companies like Frontier are continually working to improve their cybersecurity measures, it’s ultimately up to each of us to take responsibility for our own safety in the digital world.

If you want to learn more about protecting yourself from cyberattacks and staying informed about the latest cybersecurity news, we encourage you to keep coming back to IT Services. We’re here to help you navigate the ever-changing landscape of cybersecurity and provide you with the tools and knowledge you need to stay safe online.

Continue Reading
Advertisement
Malware12 hours ago

Exclusive: New York Times Source Code Hacked – Cybercriminals Exploit Vulnerable GitHub Token

Malware2 days ago

Wake-Up Call: The RansomHub Data Breach Impacting Christie’s Clients

Why You Should Be Concerned About the RansomHub Data Breach



It’s a brisk morning, and just like that, you receive a notification email from a prestigious auction house, Christie’s. You’re a valued client, and they’re letting you know that your sensitive personal information has been compromised in a recent data breach. You’re not alone – countless other clients have received similar notifications. The culprit? A cybercriminal group called RansomHub. This is a wake-up call, my friend, and it’s time to talk about cybersecurity.



Inside the RansomHub Data Breach



Imagine a thief breaking into your home and holding your valuable possessions ransom. RansomHub operates similarly, but in the digital world. They infiltrate a company’s network, steal sensitive data, and demand a hefty ransom in exchange for not leaking the information. In Christie’s case, they couldn’t prevent the breach. Their clients’ data, including names, addresses, and financial information, is now at risk. The question isn’t whether or not you should be worried—it’s how worried you should be.



Why This Matters to You



It’s not just about Christie’s clients. The fact is, data breaches are becoming more and more common. In 2021 alone, there were over 1,200 reported data breaches, impacting over 300 million individuals in the U.S. It’s clear that no one is immune, and everyone needs to take cybersecurity more seriously. Even if you haven’t been directly affected by the RansomHub breach, it’s a stark reminder that your personal information could be at risk at any moment.



What You Can Do to Protect Yourself



Feel like you’re being followed in a dark alley? It’s time to take action. Here are some simple steps you can take to safeguard your sensitive data:




  1. Regularly update your passwords: Use different, complex passwords for each of your accounts and change them periodically.

  2. Enable multi-factor authentication: Add an extra layer of security by requiring a unique code or fingerprint to access your accounts.

  3. Monitor your accounts closely: Keep an eye out for any suspicious activity or unauthorized access to your accounts.

  4. Stay informed about the latest cybersecurity threats: Knowledge is power, so keep up-to-date with the latest news on data breaches and cybersecurity trends.



Together, We Can Combat Cybersecurity Threats



It’s time to step up and protect ourselves, our businesses, and our personal information from cybercriminals like RansomHub. By staying informed, taking proactive steps to safeguard our data, and encouraging others to do the same, we can make a difference in the fight against cybercrime.



Don’t let this wake-up call go unanswered. Contact us today to learn more about how you can protect yourself from data breaches and keep coming back for the latest cybersecurity updates.

Malware3 days ago

Frontier Alerts 750,000 Customers of Data Breach Following Intense Extortion Threats

Trending

Copyright © 2023 IT Services Network.