Please fill in the form below to subscribe to our blog

The Week in Breach News: 08/11/21 – 08/17/21

August 18, 2021

Get the details of the Accenture breach, the story behind the T-Mobile data being shopped on the dark web, ransomware at Chanel & 3 new dangerous, under-the-radar ransomware risks to secure your clients against.


remote workers pose a cryptocurrency risk

Solve five of the most exhausting remote and hybrid security problems fast with this handy infographic! DOWNLOAD IT>>



Accenture

https://threatpost.com/accenture-lockbit-ransomware-attack/168594/

Exploit: Ransomware

Accenture: Consulting Firm 

cybersecurity news gauge indicating extreme risk

Risk to Business: 1.437 = Extreme

The LockBit ransomware gang has hit consulting giant Accenture. In a post on its dark web announcement site, the gang is offering multiple Accenture databases for sale. The LockBit gang also chose to poke fun at Accenture’s security. The leak site shows a folder named W1 that contains a collection of PDF documents allegedly stolen from the company. The LockBit ransomware gang reports theft of 6 terabytes worth of Accenture’s data. LockBit requested a $50 million ransomware payment. News outlets are reporting that the hack was the result of an insider job.

Individual Impact: There has not yet been an announcement that employee, customer or consumer personal or financial information was compromised in this incident but the investigation is ongoing.

Customers Impacted: Unknown

How It Could Affect Your Customers’ Business: Ransomware hits against big service providers are attractive for cybercriminals because they often open up fresh avenues of attack, creating third-party risk.

ID Agent to the Rescue: As companies become more connected in today’s business landscape, third-party risk is escalating and every business must be ready. Download our ebook on third-party risk. GET THE EBOOK>>


Ford Motor Company

https://www.infosecurity-magazine.com/news/senior-citizens-personal-data/

Exploit: Misconfiguration

Ford Motor Company: Automobile Manufacturer

cybersecurity news represented by agauge showing severe risk

Risk to Business: 2.033 = Severe

A misconfigured instance of the Pega Infinity customer engagement system running on Ford’s servers is the culprit for a data breach this week that exposed client and employee information at Ford. That blunder opened up an opportunity for anyone to access sensitive systems and obtain proprietary data, such as customer databases, employee records, internal tickets, etc. Researchers say that Ford was notified of this massive problem as long as six months ago but failed to take action.

cybersecurity news represented by agauge showing severe risk

Risk to Individual: 2.371 = Severe

The investigation is ongoing, but right now we know that some of the exposed assets contained sensitive Personal Identifiable Information (PII), and included customer and employee records, finance account numbers, Database names and tables, OAuth access tokens, Internal support tickets, User profiles within the organization, pulse actions, internal interfaces, search bar history and other details.

Customers Impacted: Unknown

How It Could Affect Your Customers’ Business Companies are under the gun for cybersecurity risk often enough without rookie mistakes like failing to secure a database contributing to the danger.

ID Agent to the Rescue: Developing a strong security culture that is savvy about phishing is essential for maintaining security in today’s volatile threat atmosphere. Our Security Awareness Champion’s Guide helps explain complex risks in a fun way! DOWNLOAD IT>>


T- Mobile 

https://gizmodo.com/hacker-claims-to-have-data-on-more-than-100-million-t-m-1847491056

Exploit: Hacking

T-Mobile: Mobile Phone Company

cybersecurity news represented by agauge showing severe risk

Risk to Business: 1.673=Severe

Hackers are claiming that they’ve obtained data related to more than 100 million US T-Mobile customers in a post on a popular dark web forum. They’re selling access to part of the information for 6 Bitcoin which translates into roughly $277,000. T-Mobile has confirmed the incident after some back-and-forth.

cybersecurity news represented by agauge showing severe risk

Risk to Business: 1.737=Severe

The data purportedly stolen is records and information for consumers including social security numbers, phone numbers, names, physical addresses, unique IMEI numbers, and driver licenses information.  

Customers Impacted: 100 million

How It Could Affect Your Customers’ Business Cybercriminals love personal data, the number one type of data stolen in 2020. Protecting customer data is critical to maintaining good customer relationships.

ID Agent to the Rescue:  Organizations are safer when everyone is on the cybersecurity team. Let us show you how to expand your menu into security awareness training in just 15 minutes! WATCH NOW>>


Maine Department of Environmental Protection

https://bangordailynews.com/2021/08/15/news/in-a-first-for-maine-ransomware-hackers-hit-2-public-wastewater-plants/

Exploit: Ransomware

Maine Department of Environmental Protection: State Government Agency

cybersecurity news represented by agauge showing severe risk

Risk to Business: 1.825 = Severe

Ransomware attacks endangered operations at two Maine wastewater treatment facilities this week. The attacks occurred in the Aroostook County town of Limestone and the town of Mount Desert on Mount Desert Island. Officials were quick to note that the attacks presented no threat to public health and safety, characterizing them as minor.  Operations have been restored.

Customers Impacted: Unknown

How It Could Affect Your Customers’ Business Infrastructure targets are increasingly under fire by cybercriminals because of the historically poor security and rich payouts.

ID Agent to the Rescue: What happens when you pay a ransom? Nothing good. See how the cash shakes down and how gangs make their money in Ransomware Exposed!. DOWNLOAD IT>>

ID Agent to the Rescue: Help your clients build their cyber resilience to insulate them from these pitfalls. Learn more about why cyber resilience is the ticket to a safer future for your clients. GET THIS EBOOK>> 



France – Chanel 

https://www.infosecurity-magazine.com/news/chanel-apologizes-for-data-breach/

Exploit: Ransomware

Chanel: Fashion House 

cybersecurity news represented by a gauge indicating moderate risk

Risk to Business: 2.721 = Moderate

French luxury brand Chanel has issued an apology after personal data belonging to its customers was exposed in an incident that impacted customers in Korea. A database belonging to the famed perfume and fashion brand is believed to have been compromised by hackers in a cyberattack at an unnamed cloud-based data storage firm.

cybersecurity news represented by a gauge indicating moderate risk

Risk to Business: 2.326 = Moderate

The stolen data includes birth dates, customer names, gender details, passwords, phone numbers and shopping or payment history. The incident is still under investigation and complete details have not been released.

Customers Impacted: Unknown

How it Could Affect Your Customers’ Business Cyberattacks against service providers have been steadily increasing as cybercriminals strike at lynchpins to gain access to even more valuable data.

ID Agent to the Rescue Building cyber resilience helps insulate companies from trouble like this. Learn more about why cyber resilience is the ticket to a safer future for your clients. GET THIS EBOOK>> 


Germany – Crytek Studios

https://www.bleepingcomputer.com/news/security/crytek-confirms-egregor-ransomware-attack-customer-data-theft/

Exploit: Ransomware

Crytek Games: Game Studio 

cybersecurity news represented by agauge showing severe risk

Risk to Business: 1.612 = Severe

German game developer Crytek has just disclosed that the Egregor ransomware gang breached its network in late 2020 obtaining client information, stealing proprietary data and encrypting systems. Files related to online FPS hit WarFace, development data on Crytek’s canceled Arena of Fate MOBA game, and documents with information on their network operations. The company downplayed the impact in a letter to potentially impacted individuals.

cybersecurity news represented by agauge showing severe risk

Risk to Business: 1.669 = Severe

The customer information exposed included players’ first and last name, job title, company name, email, business address, phone number and country. Impacted players have been sent a notification by mail.

Customers Impacted: Unknown

How it Could Affect Your Customers’ Business: Ransomware is the weapon of choice for both run-of-the-mill cybercriminals and nation-state threat actors. Every business needs to be ready for it.

ID Agent to the Rescue: Ransomware was the story of the year in 2020, and it’s still the top story in 2021. See how its impact has shaped the future of cybercrime in The Global Year in Breach 2021. READ IT>>


Don’t let cybercriminals put the brakes on your client’s race to success. Boost your cyber resilience to keep your engine running in any conditions. LEARN MORE>>



Israel – Bar Ilan University

https://www.bleepingcomputer.com/news/security/computer-hardware-giant-gigabyte-hit-by-ransomexx-ransomware/

Exploit: Nation-State Hacking

Bar Ilan University: Institution of Higher Learning

cybersecurity news represented by agauge showing severe risk

Risk to Business: 1.111 = Severe

A cyberattack that targeted Israel’s Bar Ilan University over the weekend was likely launched by Chinese threat actors as part of a massive attack against Israeli targets in varied sectors. In a report released by FireEye, the incident is categorized as part of a large-scale Chinese attack on Israel, in itself part of a broader campaign that targeted Iran, Saudi Arabia, Ukraine, Uzbekistan and Thailand.

Individual Impact: There has not yet been an announcement that employee, customer or consumer personal or financial information was compromised in this incident but the investigation is ongoing.

Customers Impacted: Unknown

How it Could Affect Your Customers’ Business: Nation-state threat actors frequently use ransomware to strike at their targets because it is cheap and effective.

ID Agent to the Rescue: Make sure that your clients are crossing the “Ts” and dotting the “Is” to reduce vulnerabilities with our Cybersecurity Risk Protection Checklist. GET THE CHECKLIST>>


Why struggle alone when you can get cheat codes that will help you defeat cybercrime faster? GET THEM NOW>>



1 – 1.5 = Extreme Risk

1.51 – 2.49 = Severe Risk

2.5 – 3 = Moderate Risk

Risk scores for The Week in Breach are calculated using a formula that considers a wide range of factors related to the assessed breach.


Protection from cybercrime danger is easy when you deploy your secret weapon: security-savvy employees! WATCH WEBINAR>>



Go Inside the Ink to Get the Inside Scoop on Cybercrime


Are you up to date on the latest news that can impact your business and your customers? Here’s a recap:

NEW THIS WEEK! Kaseya Patch Tuesday: – Patch notes & bug fixes for August 2021: SEE PATCH INFO>> 



Resource Spotlight: Ransomware Risk is Rising. Stem the Tide with These Tools


4 Ways to Safeguard Your Clients from Ransomware Attacks

Get the full story of 4 things that you can do now to protect your clients from ransomware disasters.

WATCH THIS WEBINAR

How to Build Your Cyber Security Fortress Mini Guide

Are all of your clients’ defenses in order when rampaging cybercriminals arrive at your front gate?

WATCH THE WEBINAR

Ransomware Exposed!

Get the full story behind sophisticated ransomware attacks and follow the money in this stylish eBook.

READ THIS BOOK>>

Did You Miss…? This webinar featuring real cybercrime stories told by ex-hackers. WATCH IT>>


password reuse danger can sink unwary businesses with poor security awareness. A cartoon image on black shows a blue shield with a lock

See how to grow your business with a new revenue stream in the time it takes to drink a cup of coffee. LEARN MORE>>



Ransomware Risk Escalates as Cybercriminal Profits Climb


Ransomware is the cybersecurity villain of most stories these days for many reasons. The rise of cybercrime as a service has enabled just about anyone to conduct a ransomware attack if they choose. Major gangs have developed sophisticated lures that are very hard for users to deflect. Plus, nation-state threat actors have seemingly declared ransomware as their weapon of choice. But one often-overlooked reason why cybercriminals choose ransomware is the real reason why it’s in fashion: money. 


Is Cryptocurrency risk one of 2021's biggest threats

Are you ready to fight back against cybercrime? See where 2021’s threats are coming from and what’s next. DOWNLOAD THE REPORT>>


Ransomware Risk is Ballooning Fast 


A recently released report declares that ransomware attacks increased by 64% between August 2020 and July 2021. This is a disaster for every business in every sector. Attacks are hitting major corporations and small businesses alike. Ransomware has been especially devastating in already beleaguered industries like travel and healthcare.  Major corporations are definitely targets, with particular emphasis on the business and financial services sector But SMBs have almost the same chance of taking a hit as the big dogs – big business only made up an estimated 50% of all ransomware attacks between August 2020 and July 2021.  

Security experts and officials in governments around the world are sounding the alarm and putting resources into play. The UK’s Cybersecurity Chief recently declared ransomware the biggest threat to online security for most people and businesses in the UK. In the US, the federal government has poured resources into the prevention, detection and mitigation of ransomware. A recent joint action by the US Department of Justice (DOJ) and the US Department of Homeland Security (DHS) launched a new One-Stop website designed to help businesses reduce their ransomware risk and report suspected cybercrime to the appropriate authorities at StopRansomware.gov   


ransomware defense can be complicated by cryptocurrency risk

See how ransomware really works, who gets paid & what’s next in our tell-all Ransomware Exposed! DOWNLOAD IT>>


Money is the Biggest Root of Ransomware’s Evil 


Not all cybercrime gangs are looking for cash. A percentage of cybercriminals are nation-state threat actors out to damage a rival nation instead of scoring a payday. But for the vast majority of today’s run-of-the-mill cybercriminals, ransomware is their calling card. Ransomware is cheap and easy for even novice cybercriminal gangs to employ. The number of breaches that involved ransomware doubled in 2020 according to the Verizon/Ponemon Institute 2021 Data Breach Investigations Report

A stunning one in four attacks that IBM Security X-Force Incident Response remediated in 2020 were caused by ransomware, and the cascade of threats hasn’t slowed down in 2020. Worryingly, ransomware risk is still on an upward trajectory with no ceiling in sight. Ransomware danger skyrocketed in the first half of 2021, with an estimated 304.7 million attempted ransomware attacks. That means that every business is firmly in cybercriminals’ sights as a potential target, although some sectors like government, finance and infrastructure have been particularly tormented. 


phishing email imitating famous brands dangers represented by a cartoon hacker in a hoodie at a laptop with an eye mask on done in shades of blue, Batman style.

Is Your Password a Zero or a Hero? Learn the difference and how you can strengthen yours in Build Better Passwords. GET IT>>


Money Makes the World Go Round 


Cybercriminals love ransomware because it’s got a stellar risk/reward ratio, and everyone involved in the scheme gets paid handsomely – even a freelancer in a ransomware attack will profit. Major gangs like REvil actively solicit smaller gangs, referred to as affiliates, to do their dirty work. Those affiliates pay on average 20% of their take to the parent gang.  They’ll be responsible for running everything about the operation from planning to execution, while the parent gang typically supplies the tech and can assist in obtaining introductions and resources if needed. The affiliates hire freelancers through dark web forums and gather resources from dark web data markets and dumps.    

How Much Money Are We Talking About? 


Help your clients stay off of cybercriminal hooks with the expert tips and strategies that we share to combat phishing in our webinar The Phish Files. LISTEN NOW>>


More Money Really Does Mean More Problems

As one example of the profitability of ransomware, the Colonial Pipeline incident offers solid dollars-and-cents data. In that attack, the DarkSide ransomware gang scored a payday estimated at $5 million (A big chunk of that money was recovered by the US authorities). In addition to that incident, researchers estimate that DarkSide compromised more than 40 victim organizations and demanded between $200,000 and $2 million in ransoms between its emergence in August 2020 and purported shutdown in May of 2021. CISA contends that attacks like this have jumped more than a 300% over the previous year. Sophisticated gangs are always on the hunt for vulnerabilities or opportunities that will allow them to strike at other high-value targets. 

Attackers are becoming much savvier about their targeting too, making attacks even more cost-effective. Researchers determined that precisely targeted ransomware has grown by an eye-popping 767%, easily dwarfing all other types. By seeking out easy marks, they ensure maximum profitability and get paid quickly. Many infrastructure targets have historically bad security. In fact, the wastewater treatment plant incident in Maine that we reported on this week was the result of a ransomware infection that started in a computer running Windows 7. The state authority involved noted that upgrading water treatment plant systems and security to solve that problem wasn’t within its budget, citing a cost of $100K. Similar stories abound, like a recent attack on the city government of Joplin, MI that netted cybercriminals a cool $323,00 in ransom money.


malicious insider threats can include cryptocurrency risk represented by a crime comic style blue eye looking through a peephole.

Use our Cybersecurity Risk Protection Checklist to find vulnerabilities before the bad guys do! GET IT>>


Help Your Customers Batten Down the Hatches Now 

Experiencing a ransomware attack is no longer a distant possibility for the average SMB. Two in five SMBs found themselves on the hook in ransomware incidents in 2020, and with risk rapidly escalating that number won’t be sinking any time soon. While you cannot eliminate the chance that your clients may fall prey to a ransomware attack, the ID Agent digital risk protection platform offers solves security problems, offering you the right tools to boost security and decrease risk for every customer.   

Passly packs essential protection that protects your systems and data from intrusion by cybercriminals with a stolen or phished password including single sign-on (SSO), multifactor authentication (MFA), automated password resets and simple remote management at an affordable price.  

BullPhish ID delivers a smooth, painless security awareness training experience for trainers and trainees alike. Trainers can run premade simulations or customize the lessons that they choose to reflect their unique industry threats, including video lessons. Then deliver it all through a personalized portal that makes it easy for everyone.   

Dark Web ID keeps a crucial eye on the backdoor to ensure that cybercriminals can’t easily slip into your client’s environment to plant ransomware using a compromised password by monitoring every nasty corner of the dark web for that company’s protected credentials 24/7/365. 

Contact the solutions experts at ID Agent today to learn more about how the ID Agent digital risk protection platform can enable you to secure your business and your customers against ransomware threats.   


dark web economy represented by the words dark web in white on a black background blurred like a faint tv transmission

Explore the dark web with experts & get a deck of screenshots in Unveiling Cybercrime Markets on the Dark Web. WATCH NOW>>



Aug 19: Tools and Techniques for MSPs to Close More New Clients REGISTER NOW>>

Aug 24: 4 Essential Elements for a Dominant, Security-Focused MSP REGISTER NOW>>

Aug 26 Phish & Chips: BullPhish ID Demo (EMEA Special) REGISTER NOW>>

Sep 02 Owning the Dark Web: How You Can Take Back Control REGISTER NOW>>


Is Cryptocurrency risk one of 2021's biggest threats

Are you ready to fight back against cybercrime? See where 2021’s threats are coming from and what’s next. DOWNLOAD THE REPORT>>



Ransomware Will Cost You a Fortune


Ransomware is the monster under the bed in cybersecurity today. It’s quickly become every cybercriminal’s favorite weapon from nation-state threat actors to dark web freelancers. Why? It’s very profitable. Ransomware demands are up by more than 40% in 2021 as cybercrime rates continue to climb.

In a ransomware operation, everyone gets paid. well. The major gangs that you hear about on the news outsource just like any other company, hiring freelancers known as affiliates to do the actual work while collecting on average 20% of the profits. That can be substantial. By the end of2020, the average ransomware payment in was $233,817  

Every business is at risk no matter what the size or industry may be. Hospitals and medical targets were especially beleaguered in 2020 but no one was spared. Small and medium businesses have almost the same chance of taking a hit as the big dogs – big businesses only made up an estimated 50% of all ransomware attacks between August 2020 and July 2021.  

There’s no ceiling in sight for this ever-growing menace. The smartest thing any business can do in this dangerous environment is to take precautions now against potential attacks. Security awareness training with a solution like BullPhish ID is a powerful weapon against cybercrime, reducing your chance of an incident by up to 70%. Get started today and start reaping the benefits immediately while strengthening your defenses for the future.


ID Agent Partners: Feel free to re-use this blog post (in part or in its entirety) for your own social media and marketing efforts. Please send an email to pr@kaseya.com to let us know – we love to hear about how our content works for you!


let us help secure you against passwords reuse with contact information and the ID Agent logo on grey.

Our Partners typically realize ROI in 30 days or less. Contact us today to learn why 3,850 MSPs in 30+ countries choose to Partner with ID Agent!

LEARN MORE>>


See our innovative, cost-effective digital risk protection solutions in action.

WATCH DEMO VIDEOS>>


Contact us for an expert analysis of your company’s security needs and a report on your Dark Web exposure!

SCHEDULE IT NOW>>




We’d love to hear your story of security success with ID Agent. Contact our marketing/pr team to set up a meeting with our staff to tell the world about your experiences in our next case study! To learn more about how the ID Agent Digital Risk Protection Platform can secure your prosperity, book a personalized demo today.