Data Breaches - W/E - 1/13/17
Bitcoin Wallet Storage Entity KeepKey Gets Breached on Christmas Day (01/03/2017)
KeepKey, a hardware wallet that stores bitcoins and other virtual currency, was victimized by a hacker on December 25 as described in a blog post from founder Darin Stanchfield. He explained that an attacker activated a new phone number under Stanchfield's PIN-protected Verizon account and used it to access account recovery on his email account. The attacker then began to reset accounts linked to Stanchfield's email. Within 30 minutes, KeepKey had shut down all email for the entire domain. Stanchfield said that KeepKey's computers, servers, and network were not compromised and customer funds weren't at risk.
Data Breach Affects Online Customers for Topps Baseball Cards (12/30/2016)
Baseball card company Topps has been infiltrated by a data breach and users who placed online orders through the company's Web site between July 30 and October 12, 2016 are affected. This information comes from an article released by Security Week. Customers who ordered items during that time period have been notified via email about the breach, which compromised names, addresses, email addresses, phone numbers, credit card and debit card numbers, card expiration dates, and card verification numbers.
Defense Subcontractor Mistakenly Leaks 11 GB Worth of Sensitive Data (01/04/2017)
Eleven gigabytes of data containing the names, locations, social security numbers, salaries, and assigned units for doctors and other healthcare professionals deployed within the US military's Special Operations Command were accidentally leaked by a Defense Department (DOD) subcontractor. Security researcher Chris Vickery with MacKeeper uncoveredthe breach in December and noted that the database, which was left unprotected online, has since been secured. The data originated from Potomac Healthcare Solutions, which provides healthcare workers to the US government through Booz Allen Hamilton.
Holiday Inn's Parent Company Probing Data Breach (12/28/2016)
Security researcher Brian Krebs says that InterContinental Hotels Group (IHG), the parent company for more than 5,000 hotels around the world, is looking into a potential data breach. KrebsOnSecurity was notified by fraud prevention sources at several financial institutions after unusual activity showed up on customer payment cards that had been used at several IHG locations in the US, particularly Holiday Inn and Holiday Inn Express. An IHG spokesperson told Krebs that the company was investigating with the assistance of an outside security firm. The spokesperson said, "IHG takes the protection of payment card data very seriously. We were made aware of a report of unauthorized charges occurring on some payment cards that were recently used at a small number of US-based hotel locations. We immediately launched an investigation, which includes retaining a leading computer security firm to provide us with additional support. We continue to work with the payment card networks."
LinkedIn Warns that Lynda.com Has Been Breached (12/21/2016)
A database containing information from LinkedIn's Lynda.com online learning platform has been accessed by an unauthorized third-party. The passwords for about 55,000 users have been reset as a precautionary measure.
Los Angeles County Data Breach Impacts 756,000 People (12/21/2016)
Los Angeles County has released information regarding a data breach that resulted from a May 13 phishing incident when 108 county employees were tricked into providing usernames and passwords through an email that looked legitimate. The breach has impacted about 756,000 individuals through their contact with various county departments including health services, human resources, internal affairs, and children and family affairs.
Anthem's 2015 Breach Was Work of Foreign Government (01/10/2017)
The data breach that affected 78.8 million records tied to health insurance giant Anthem in 2015 was the work of an entity working on behalf of a foreign government. This information comes from a California Department of Insurance statement released on January 6. The cyber breach was first discovered by Anthem on January 27, 2015, but had actually begun on February 18, 2014 when a user within one of Anthem's subsidiaries opened a phishing email containing malicious content.
Hacker Compromises 1.5 Million ESEA Gamer Records (01/11/2017)
E-Sports Entertainment Association (ESEA) has confirmed a cyber breach that took place on December 27 and resulted in the theft of user data by a threat actor. That criminal demanded a ransom from ESEA, which refused to pay. LeakedSource received a copy of the stolen data from the attacker and discovered that 1.5 million ESEA records had been compromised
Leaked Hello Kitty Database Surfaces with 3.3 Million Compromised Records (01/09/2017)
Security researcher Chris Vickery has told ThreatPost that a Hello Kitty database tied to a misconfigured MongoDB installation has been breached, leaking more than 3.3 million user credentials. The breach was first revealed in December 2015, but Sanrio, the parent company for Hello Kitty, said that there hadn't been a data leak. On January 8, LeakedSource reported that the 2015 exposure had surfaced with a database of 3.3 million records and that the breached information appeared to match what Vickery had discovered.
KeepKey, a hardware wallet that stores bitcoins and other virtual currency, was victimized by a hacker on December 25 as described in a blog post from founder Darin Stanchfield. He explained that an attacker activated a new phone number under Stanchfield's PIN-protected Verizon account and used it to access account recovery on his email account. The attacker then began to reset accounts linked to Stanchfield's email. Within 30 minutes, KeepKey had shut down all email for the entire domain. Stanchfield said that KeepKey's computers, servers, and network were not compromised and customer funds weren't at risk.
Data Breach Affects Online Customers for Topps Baseball Cards (12/30/2016)
Baseball card company Topps has been infiltrated by a data breach and users who placed online orders through the company's Web site between July 30 and October 12, 2016 are affected. This information comes from an article released by Security Week. Customers who ordered items during that time period have been notified via email about the breach, which compromised names, addresses, email addresses, phone numbers, credit card and debit card numbers, card expiration dates, and card verification numbers.
Defense Subcontractor Mistakenly Leaks 11 GB Worth of Sensitive Data (01/04/2017)
Eleven gigabytes of data containing the names, locations, social security numbers, salaries, and assigned units for doctors and other healthcare professionals deployed within the US military's Special Operations Command were accidentally leaked by a Defense Department (DOD) subcontractor. Security researcher Chris Vickery with MacKeeper uncoveredthe breach in December and noted that the database, which was left unprotected online, has since been secured. The data originated from Potomac Healthcare Solutions, which provides healthcare workers to the US government through Booz Allen Hamilton.
Holiday Inn's Parent Company Probing Data Breach (12/28/2016)
Security researcher Brian Krebs says that InterContinental Hotels Group (IHG), the parent company for more than 5,000 hotels around the world, is looking into a potential data breach. KrebsOnSecurity was notified by fraud prevention sources at several financial institutions after unusual activity showed up on customer payment cards that had been used at several IHG locations in the US, particularly Holiday Inn and Holiday Inn Express. An IHG spokesperson told Krebs that the company was investigating with the assistance of an outside security firm. The spokesperson said, "IHG takes the protection of payment card data very seriously. We were made aware of a report of unauthorized charges occurring on some payment cards that were recently used at a small number of US-based hotel locations. We immediately launched an investigation, which includes retaining a leading computer security firm to provide us with additional support. We continue to work with the payment card networks."
LinkedIn Warns that Lynda.com Has Been Breached (12/21/2016)
A database containing information from LinkedIn's Lynda.com online learning platform has been accessed by an unauthorized third-party. The passwords for about 55,000 users have been reset as a precautionary measure.
Los Angeles County Data Breach Impacts 756,000 People (12/21/2016)
Los Angeles County has released information regarding a data breach that resulted from a May 13 phishing incident when 108 county employees were tricked into providing usernames and passwords through an email that looked legitimate. The breach has impacted about 756,000 individuals through their contact with various county departments including health services, human resources, internal affairs, and children and family affairs.
Anthem's 2015 Breach Was Work of Foreign Government (01/10/2017)
The data breach that affected 78.8 million records tied to health insurance giant Anthem in 2015 was the work of an entity working on behalf of a foreign government. This information comes from a California Department of Insurance statement released on January 6. The cyber breach was first discovered by Anthem on January 27, 2015, but had actually begun on February 18, 2014 when a user within one of Anthem's subsidiaries opened a phishing email containing malicious content.
Hacker Compromises 1.5 Million ESEA Gamer Records (01/11/2017)
E-Sports Entertainment Association (ESEA) has confirmed a cyber breach that took place on December 27 and resulted in the theft of user data by a threat actor. That criminal demanded a ransom from ESEA, which refused to pay. LeakedSource received a copy of the stolen data from the attacker and discovered that 1.5 million ESEA records had been compromised
Leaked Hello Kitty Database Surfaces with 3.3 Million Compromised Records (01/09/2017)
Security researcher Chris Vickery has told ThreatPost that a Hello Kitty database tied to a misconfigured MongoDB installation has been breached, leaking more than 3.3 million user credentials. The breach was first revealed in December 2015, but Sanrio, the parent company for Hello Kitty, said that there hadn't been a data leak. On January 8, LeakedSource reported that the 2015 exposure had surfaced with a database of 3.3 million records and that the breached information appeared to match what Vickery had discovered.