Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label Datathreats. Show all posts

2.7 Billion Data Records Leaked Including Social Security Numbers

 


There has been news about a prominent hacking group that claimed a large amount of sensitive personal information was allegedly stolen from a major data broker about four months ago, but a member of that group has reportedly released most of the information for free on an online marketplace where stolen personal information is sold. 

A breach of sensitive data, including Social Security numbers and other personal information of Americans, could have a transnational impact on identity theft, fraud and other crimes, said Teresa Murray, director of consumer advocacy for the U.S. Public Information Research Group. An online hacking forum has exposed nearly 2.7 billion personal information records belonging to Americans, including names, addresses and even Social Security numbers. 

Information including Social Security numbers was also posted to the forum. This data originated from a company which collected and sold the data for legitimate purposes but in April 2024, it is claimed that the data was stripped and offered for sale by the company. As part of the investigation, it was reported that the information had been stolen from National Public Data by a threat actor called USDoD. 

Using information scraping from public sources, National Public Data compiles individual profiles that are then used to create portfolios of individual properties, which are marketed to consumers. In addition to serving private investigators, the company also provides background checks and criminal record searches to a variety of government agencies and organizations. 

It was reported that the data was scraped by a company called National Public Data, along with names, addresses, and even Social Security numbers, which were retrieved from a database scraping company. Earlier this year, Jericho Pictures Inc., which is an operator of the National Public Data program, played a key role in the court case that occurred in the Southern District of Florida regarding the data. 

As Bloomberg Law reports, plaintiff Christopher Hofmann brought forth a claim against Jericho Pictures over a violation of data privacy and the gross negligence of the company about sensitive and personal information. Hoffman also argues that the method of assembling data that National Public Data uses is not open to the public and, as a result, not approved by the people whose data is being gathered in this way. 

As Jericho Pictures and National Public Data have yet to comment on the massive data breach that affected more than 2.7 billion people, it remains uncertain if they will purge or encrypt their existing data to avoid any further damage to their reputations. A hacker forum in which Fenice is known has been flooded with files obtained from the hacker community, which had been purloined. Fenice's posts were a much more complete version of previous breaches, which he uploaded for free. 

Fenice now lays legal responsibility for the leak of National Public Data's information, however, it is clear that it has been caused by another hacker, SXUL, rather than USDoD, a prominent hacker suspected of leaking information. It is worth noting that when USDoD first acquired the data, it offered to sell it for 3.5 million dollars. 

As per the hacker, the database had been compromised and had contained 2.9 billion records containing information on millions of people in Canada, the United Kingdom, and America. There has been a lot of buzz about USDoD, ever since it was linked to an alleged attempt for $50,000 to be made on InfraGard's user database in December of 2023 by two individuals. As a result, a variety of threats have penetrated the network and released partial copies of the data, with each leak sharing a different number of records and, in some cases, different data types compared to the previous leak. 

An individual identified as "Fenice" on August 6th leaked the most complete version of the stolen National Public Data data free of charge on the Breached hacking forum under the name of Fenice.  The data breach, however, was subjected to another threat actor that Fenice referred to as "SXUL," instead of the US Department of Defense, who was responsible. In addition, this data may have become outdated, having no current address for any of the people checked, so there is a possibility that this data has been taken from an old backup, which would indicate that older data may have been used. 

Jerico Pictures, which is believed to be operating under the name National Public Data, has been sued numerous times for not adequately protecting the personal information of people as a result of the data breach. This data contains a huge number of social security numbers, which means that users should monitor their credit report for any signs of fraudulent activity and report it to the appropriate credit bureau if they find any. 

As previously leaked samples will also contain phone numbers and email addresses, users must remain vigilant against phishing attempts as well as SMS texts that may attempt to get them to provide additional sensitive information through phishing e-mails and SMS texts. Christopher Hofmann, the named plaintiff, reported that on July 24, he was informed by his identity theft protection service provider that his personal information had been compromised. 

According to the notification, the breach occurred as a direct result of the security incident involving the website "nationalpublicdata.com." It was further disclosed that Hofmann's data had been published on the dark web, highlighting the serious nature of the breach and its potential implications for those affected.

Saltzer Health Says Patient Data Exposed in Cyberattack

 

Saltzer Health, an Intermountain Healthcare company has recently witnessed a cyberattack. The company has started alarming its employees and patients about the breach and sent alerts informing them that their protected health information might have been compromised following a hack on a connected third party. 

According to the static data, the company operates 12 clinics and urgent care facilities in Boise, Caldwell, Meridian, and Nampa, Idaho. After the attack’s findings, the company issued a statement in which it stated that the attackers had access to the employee email account between May 25 and June 1, 2021. 

Also, during the investigation researchers discovered that the email account did contain personal data that was compromised during the period of unauthorized access. Compromised data includes names, contacts, driver’s license numbers, and state identification numbers, and, in some cases, social security numbers and financial account details. 

Additionally, medical information that has been compromised includes medical history, diagnosis, treatment details, physician information, and prescription medication information, along with health insurance information. All impacted individuals will receive two years of identity theft detection resolution services. 

While the company did not issue any statement on the number of affected personnel, the company told the U.S. Department of Health and Human Services that 15,650 individuals’ data was potentially compromised during the hack. 

The company said that it has taken steps to mitigate the risk of data theft including resetting the affected email accounts passwords and also monitoring its systems for any suspicious activity. 

“Saltzer Health encourages all individuals to remain vigilant against incidents of identity theft and fraud by reviewing account statements and explanation of benefits, and monitoring free credit reports for suspicious activity,” the organization says.

Here's Why You Should Not Rely on a VPN Anymore

 

Virtual private networks (VPNs) are still used by millions of people to hide their activities on the internet by encrypting their location and web traffic. Over a period of time, advancement in technology brought changes in cybersecurity landscapes, thanks to the widespread use of encryption that has made public internet connections far less of a security threat, cybersecurity experts stated. 

Cybercriminals are less interested in attacking people’s individual devices and instead focus on the login credential to their most important accounts, experts said. For years, cybercrimes experts urged people not to use Wi-Fi hotspots at public places like coffee shops and stations without taking steps to obscure their internet traffic. For example, if you are sharing a Wi-Fi network with a stranger it means you essentially sharing all your traffic with him who was using it. If someone decides to check their Bank balance, for instance, they give an opportunity to a nearby hacker to steal important data. 

But VPNs provided net safety to this problem over the decades. VPN allows users to use the internet with enhanced security and privacy. It reroutes users’ internet traffic through their own servers and makes browsing more secure and private. It also helps users to stay secure when using public Wi-Fi connections. That can slow browsing speed, but hides the user’s Internet Protocol address and allows access to more internet sources. 

However, now most browsers have implemented (HTTPS) an extra layer of security that automatically encrypts internet traffic. Hypertext transfer protocol secure (HTTPS) is a secure version of HTTP, it is a protocol that is used for sending data between a web browser and a website. HTTPS is encrypted in order to secure data transfer. It becomes important when a user transmits important data, such as by logging into a bank account, email service, etc. 

More and more websites offer HTTPS connections such as Google, Brave, Chrome, Firefox, Safari, and Edge. 

“Most commercial VPNs are snake oil from a security standpoint,” said Nicholas Weaver, a cybersecurity lecturer at the University of California, Berkeley. “They don’t improve your security at all...” 

 “…Remember, someone attacking you at the coffee shop needs to be basically AT the coffee shop. I don’t know of them ever being used outside of pranks. And those are all irrelevant now with most sites using HTTPS,” he added.