The Week in Breach News 01/20/2021 to 01/26/2021

by Wally Moore

on January 27, 2021

in Data Breach

The Week In Breach

DTS InfoTech is a hard-working Trusted Advisor for any business that has questions about computers, computer networks, and technology. One way to earn the title of Trusted Advisor is to provide FREE practical education in the technology field for visitors to our website.

Cybersecurity has become a matter of business life and death for computer and technology users of all types. With your security in mind, we are sharing Data Breach Examples in weekly posts entitled “The Week In Breach” from our friends at ID Agent.

ID Agent provides a comprehensive set of threat intelligence and identity monitoring solutions to private and public sector organizations and millions of individuals impacted by cyber incidents.

Read this short article and learn about cybersecurity and Data Breach examples from the experts in the field.

The life of your business may depend upon it.

by Kevin Lancaster

This Week in Breach News:

ShinyHunters work overtime at multiple targets including Pixlr, data theft puts a star talent agency in the spotlight, and three of our best tips for securing clients in an evolving threat landscape at a price you’ll love.

The Week in Breach News – United States 


United States – Teespring

https://cybernews.com/security/8-million-teespring-user-records-leaked-on-hacker-forum/

Exploit: Hacking

Teespring: eCommerce Platform 

Severity Meter

Risk to Business: 2.129 = Severe

Hackers have dropped a huge trove of user and creator data allegedly from Teespring, an e-commerce platform that specializes in enabling designers to market their wares. The two massive files of stolen data include email addresses and last update dates for 8,242,000 user accounts.

Severity Meter

Individual Risk: 2.221 = Severe

The info dump contains 4,000,000+ user records, including usernames, full names, locations, phone numbers, Creator IDs, referral information, trust score, whitelisted seller campaigns, storefronts, bank check payouts, and other analytics data. This data could be used to conduct business email compromise attacks and spear phishing attempts.

Customers Impacted: 8,242,000

How it Could Affect Your Customers’ Business: Data like this is sought-after by cybercriminals and often hangs around for years on the Dark Web, acting as fuel for future cybercrime.

ID Agent to the Rescue: Watch for threats from the Dark Web without lifting a finger using Dark Web ID, 24/7/365 credential monitoring that alerts you to trouble fast. LEARN MORE>>


United States – Circuit Court of Cook County 

https://www.securityweek.com/illinois-court-exposes-more-323000-sensitive-records

Exploit: Unsecured Server

Circuit Court of Cook County: Municipal Court System 

Severity Meter

Risk to Business: 1.775 = Severe

An unsecured Elasticsearch server is the cause of a huge data exposure containing more than 323,277 Cook County court-related records. Researchers estimate that the database may have belonged to a specialist Cook County department of caseworkers working with people who needed additional help.

Severity Meter

Risk to Business: 1.612 = Severe

The records contained PII such as full names, home addresses, email addresses, and court case numbers and notes on the status of both the case and the individuals concerned. Criminal, family and immigration cases are in the mix. This data could be used to mount an array of attacks like blackmail, identity theft and spear phishing attempts.

Customers Impacted: Unknown

How it Could Affect Your Customers’ Business: Failing to take a simple step to secure a server that contains sensitive information doesn’t speak well to an organization’s commitment to cybersecurity.

ID Agent to the Rescue: Everyone needs to understand the seriousness of today’s threats. Our Security Awareness Champion’s Guide makes understanding cyber threats easy and fun. GET THE BOOK>>


United States – MeetMindful

https://www.zdnet.com/article/sonicwall-says-it-was-hacked-using-zero-days-in-its-own-products/

Exploit:  Hacking

MeetMindful: Dating Site

Severity Meter

Risk to Business: 1.979 = Severe

Details of an estimated 2.28 million users of dating site MeetMindful was just released online in the latest in a series of stolen data dumps by cybercrime gang ShinyHunters. There’s no clear origin of the data, but researchers expect that it may have come from an unsecured AWS S3 bucket.

Severity Meter

Individual Risk: 1.779 = Severe

The dumped data includes users’ real names, email addresses, address information, physical descriptions, dating preferences, marital status, birth data, location data, IP addresses, Bcrypt-hashed passwords, Facebook user IDs and Facebook authentication tokens. This information puts users at risk for spear phishing attacks.

Customers Impacted: 2.28 million

How it Could Affect Your Customers’ Business: Keeping data safe from hackers starts with keeping data secure using strong access point controls and basic security protocols like multifactor authentication.

ID Agent to the Rescue: Passly provides the toolkit that businesses need to keep cybercriminals locked out of data and systems including multifactor authentication and secure shared password vaults. SEE IT IN ACTION>>


United States – Bonobos

https://www.bleepingcomputer.com/news/security/bonobos-clothing-store-suffers-a-data-breach-hacker-leaks-70gb-database/

Exploit: Hacking

Bonobos: Menswear Retailer 

Severity Meter

Risk to Business: 1.979 = Severe

Men’s clothier Bonobos has experienced a huge 70GB data breach exposing millions of customers’ personal information after a cloud backup of their database was snatched. ShinyHunters, who had a very busy week, posted the full Bonobos database to a free hacker forum. ShinyHunters was kind enough to transform the stolen password data into a handy list for credential stuffing.

Severity Meter

Individual Risk: 2.006 = Severe

The leaked data included customers’ addresses, phone numbers, partial credit card numbers (last four digits), order information and password histories. This information can be used in many cyberattacks including spear phishing and credential stuffing.

Customers Impacted: 7 million

How it Could Affect Your Customers’ Business: Data theft is an increasingly worrisome problem for everyone. Not only is the original business impacted, the addition of such large troves of information to the Dark Web fuels further cybercrime.

ID Agent to the Rescue: Dark Web ID provides 24/7/365 protection against surprise credential compromise by sending up a red flag when a stolen credential that could impact your business appears on the Dark Web. LEARN MORE>>


The Week in Breach News – Canada


Canada – City of Montmagne

https://presstories.com/2021/01/23/cyber-%E2%80%8B%E2%80%8Battack-ransomware-victim-montmagne-city/

Exploit: Ransomware

City of Montmagne: Municipal Government 

Severity Meter
Risk to Business: 2.211 = Severe

The municipal government of Montagne in Quebec has fallen victim to a ransomware attack that crippled city systems. Some services have been restored including the phone system which was down for 6 days, but the recovery could be slow.

Individual Risk: No personal or business financial information or PII was reported as stolen in this incident that is still under investigation.

Customers Impacted: 17,553

How it Could Affect Your Customers’ Business: Ransomware is almost always the result of a phishing attack. Failing to keep up with security awareness training will put businesses at risk for more cyberattacks.

ID Agent to the Rescue: BullPhish ID makes it easy to keep up with training for users and trainers with customizable training portals for each user. SEE IT AT WORK>>


Cybercrime

Learn the Secret of How Cybercriminals Trick You Into Falling for Phishing Messages!

Read Phish Files Now>>


The Week in Breach News – United Kingdom & European Union


United Kingdom – the7stars

https://www.theregister.com/2021/01/22/the7stars_ransomware_attack_clop/

Exploit: Ransomware

the7stars: Talent Agency 

Severity Meter

Risk to Business: 1.411 = Severe

Clop ransomware is at the root of a data breach at the7stars, a London-based talent agency that handles clients with connections to Atlantic Records, Suzuki and Penguin Random House. Internal client records, business agreements, photographs, business records, and other communications were included in this haul. The agency announced that it was able to restore its systems from back-ups and are continuing to investigate.

Severity Meter

Individual Risk: 1.221 = Severe

The stolen data includes scans of passports, invoices, and other sensitive information about the agency’s clients. This information can be used for identity theft and spear phishing.

Customers Impacted: Unknown

How it Could Affect Your Customers’ Business: Ransomware is a huge risk for every business, and it’s essential that everyone in your team is on board to spot and stop ransomware attacks.

ID Agent to the Rescue: Go back to school to learn why ransomware has become such a prevalent threat in today’s landscape and how to stop it in our ebook Ransomware 101. READ THE EBOOK>>


Sweden- Pixlr

https://www.bleepingcomputer.com/news/security/hacker-posts-19-million-pixlr-user-records-for-free-on-forum/ 

Exploit: Third Party Data Breach

Pixlr: Photo Editing Software Developer 

Severity Meter

Risk to Business: 1.827 = Severe

ShinyHunters are at it again, this time with a dump of data from Pixlr. The gang claims that the Pixlr data was obtained through their earlier successful breach at stock photo site 123rf, which is owned by the same parent company. The Pixlr database posted by ShinyHunters contains 1,921,141 user records consisting of email addresses, login names, SHA-512 hashed passwords, a user’s country, whether they signed up for the newsletter, and other internal information.

Severity Meter

Individual Risk: 1.717 = Severe

User information was stolen that includes basic contact information for users, leaving them at risk for spear phishing attacks.

Customers Impacted: 1,921,141

How it Could Affect Your Customers’ Business: Third party data breaches are becoming all too common as Dark Web data grows, creating even more risk for businesses, especially around credential stuffing.

ID Agent to the Rescue: Get protection from password-based cyberattacks like credential stuffing fast with secure identity and access management from Passly. LEARN MORE>>


Insider threats

Is Your Biggest Security Threat Already Inside Your Business? Learn to spot and stop insider threats.


The Week in Breach News – Australia & New Zealand


Australia – Australia Securities and Investments Commission 

https://www.reuters.com/article/us-australia-cyber-asic/australias-securities-regulator-says-server-hit-by-cyber-security-breach-idUSKBN29U0S7

Exploit: Hacking

Australia Securities and Investments Commission: Securities Regulator 

Severity Meter

Risk to Business: 1.616 = Severe

A security breach at Australia’s security regulator may have led to a significant data exposure. The breach occurred on a server that the organization used to transfer files including credit license applications where some information may have been viewed. This breach may have been caused by a suspected flaw in third-party software that may have also spurred a similar breach at the New Zealand central bank a few weeks ago.

Individual Risk: No personal or business data was reported as confirmed to be stolen in this incident that is still under investigation.

Customers Impacted: Unknown

How it Could Affect Your Customers’ Business: Taking precautions against potential third party data breaches is sensible for every business because you can never be sure how another company’s cybersecurity flaws may impact your business.

ID Agent to the Rescue: Passly is the multipurpose secure identity and access management solution that every business needs to guard systems and data against unexpected trouble fast. SEE IT IN ACTION>>


Hacker

COVID-19 has changed everything – including the Dark Web. See how it has evolved and how that impacts security in our eBook. DOWNLOAD IT>>


The Week in Breach News Guide to Our Risk Scores


1 – 1.5 = Extreme Risk

1.51 – 2.49 = Severe Risk

2.5 – 3 = Moderate Risk

Risk scores for The Week in Breach are calculated using a formula that considers a wide range of factors related to the assessed breach.
 

Go Inside the Ink to Get the Inside Scoop on Cybercrime

Every weekday, our blog features timely cybersecurity and breach news, problem-solving advice, and expert analysis of today’s threats, plus insight that helps you plan for tomorrow. Don’t miss it!


The Week in Breach: Resource Spotlight


Come In From the Cold and Curl Up with a Webinar!


The weather outside is indeed frightful, with nasty conditions (and a nasty virus) making it unpleasant to go out. But never fear – your friends at ID Agent are here to keep you from getting bored indoors with five superstar webinars to help you transform your business. Grab a warm blanket, a hot beverage and a comfy couch (cat optional) and listen now!

  • Phishing Confidential: Offense and Defense Playbooks of a Phishing Attack Revealed – get the inside scoop on both sides of a phishing attack from an anti-phishing expert and an ethical hacker. LISTEN NOW>>
  • Unveiling Cybercrime Markets on the Dark Web – Go behind the scenes into Dark Web data markets and see what really goes on on the Dark Web. Plus get a free deck of real Dark Web screenshots! LISTEN NOW>>

The Week in Breach: Featured Briefing

You need stronger security to protect you in today’s tumultuous, rapidly expanding risk landscape. Cybercrime is up across the board – a recent survey shows that almost a quarter of organizations worldwide had the misfortune to experience seven or more attacks that infiltrated their networks over the past year. When looking forward, a majority of those surveyed believe it will happen again in the coming 12 months.



That fear is reflected in market spending. Analytics Insight experts predict that the global cybersecurity market overall will grow at a CAGR of 8.1% from $153.9 billion in 2019 to an expected $227.4 billion in 2023. North America will be the biggest slice of that pie at 41% with Europe at 30% and the Asia Pacific region at 23%. They’re also predicting a growth percentage of 16.1%, in cybersecurity solutions spending, up from $6.2 billion in 2019 and projected to reach $11.1 billion in 2023.

While these expected growth numbers are a hopeful sign, that doesn’t take into account the reluctance that your clients may have to change or upgrade their security stack in a challenging economy even with scary-high increases in cybercrime. There’s profit to be made, but you’ve got to get decision-makers to not only buy in to the need to make necessary security improvements but also feel good about making that choice. Here are three of our best tips to help get them on board and signing on the dotted line.


Cyber resilience

Don’t let cyberattacks put the brakes on your business. Stay agile and keep your engine running under any conditions. Start your journey on The Road to Cyber Resilience now! DOWNLOAD THIS PACKAGE>>


Concentrate Energy on a Big Change with a Big Payoff

Experts of every stripe have identity and access management (IAM) at the top of their cybersecurity best practices lists. In one CISO survey, 43% of those surveyed said they’re investing in IAM ahead of such areas as endpoint security and security awareness training. That’s for good reason – the multifactor authentication component of IAM solutions alone can deflect 99.9% of cybercrime. That’s why suggesting an investment in secure identity and access management with Passly is a smart move. Passly adds immediate, cost-effective protection that includes MFA and other IAM features with demonstrable value and without a scary price tag.

You wouldn’t trust a flimsy old lock to secure the door to your business.

Why are you trusting one to secure your business systems and data? It sounds logical that you’d want the most secure lock on your office door, but many companies don’t extend that logic to the access points to their systems and data, leaving them wide open to cybercriminal mischief.

In a recent survey, only 24% of businesses were using security access controls, like a secure identity and access management solution instead of old-fashioned password-based security. That’s a boon for cybercriminals – compromised passwords are the key to entry for them in around 85% of all data breaches. Strong access point security isn’t just something for major corporations anymore. Every business needs it, and solutions like Passly ensure that every business can afford it.


Passwords

Would you trust a flimsy lock for your front door? Add a stronger lock between cybercriminals and your business when you learn to Build Better Passwords. GET IT>>


Protecting your systems and data with just a password isn’t going to cut it anymore.

Even if your employees are making good, complex passwords and practicing excellent password hygiene, relying on passwords alone is outmoded and dangerous. Huge stores of passwords that have been stolen in past data breaches are available in Dark Web markets and data dumps to power credential stuffing attacks and other cybercrime.

Passly makes it easy and affordable to defend against password-based attacks with the tools that experts recommend: multifactor authentication, single sign-on, secure shared password vaults and more. Plus, Passly deploys in days, not weeks for an immediate security improvement. Don’t wait to beef up your access point security. Add a secure identity and access management solution today and make sure that the access points to your systems and data are really protected.

DTS is very good at cybersecurity solutions for small businesses.

Seriously, we are, and we can prove it. We like being heroes!

We also know how intimidating technology can be, we make a living helping business owners and managers just like you who have questions about all things technology, and that includes cybersecurity.

Most small businesses do not have the technical resources or time to understand all this geek stuff. If this describes you, let us help you.

If you would like more information about cybersecurity as a service give us a call, we’re always happy to chat, and the call is free, every time you call!

Return to the Learning Center

Dedicated to your success,

Wally Moore

Business Development Manager

dts|infotech . . . secure computer networks that work

503.359.1275

www.dtsinfotech.com

GET HELP NOW