Breach Guide

Learn the steps to take in the event of a data breach and stay current on the cyber threat landscape with the FTC’s Data Breach Resources, FBI’s Daily Digest Library and San Diego’s Cyber Incident Response Guide.

Federal Trade Commission (FTC) Data Breach Resources

Find out the steps to take as a business or consumer if you experience a data breach.

ftc-gov

FBI Cyber Daily Digest Library

Stay current on the global threat landscape with the FBI’s daily circulation of published data breaches and articles.

  • Austin's SolarWinds grapples with fallout from cybersecurity breach

    • Austin-based software maker SolarWinds – along with the cybersecurity industry at large – continues to grapple with how to move forward from the massive cyber breach last year that allowed hackers access to multiple federal agencies and more than 100 private-sector companies.
    • Since the start of the year, SolarWinds has debuted a new CEO as it continues its investigation into the breach and works to ramp up its own security.
    • "It's been a living nightmare for the industry, and SolarWinds has been front and center," Dan Ives of Wedbush Securities said. "No company in their wildest nightmares wants to be the center of a congressional investigation that spawned a massive fear around threats."
    • Executives from SolarWinds, Microsoft and cybersecurity firms FireEye and CrowdStrike testified Tuesday about the attack before the U.S. Senate's Select Committee on Intelligence. The companies are also expected to testify Friday before the House Oversight and Homeland Security Committees.
    • SolarWinds said the breach is believed to be the result of hackers making their way into a number of systems by tampering with an update server on the company's network management system.
      • Once in, the hackers were able to gain remote access and insert malicious code that hitched a ride into other systems on a SolarWinds software update.
    - Kara Carlson | February 25, 2021
  • Students’ Information Compromised by Data Breach at Harvard Business School

    • Harvard Business School is working to respond to a data breach that compromised students’ personal information, including some social security numbers and exam submissions.
    • HBS Chief Information Officer Ronald “Ron” S. Chandler initially announced the breach in an email to school affiliates on Jan. 11.
    • Chandler wrote that the Business School was notified by a software vendor of unauthorized access to its files on Dec. 29, after which the school launched an investigation. The investigation found that one or more “unauthorized third parties” had downloaded “files containing personal information” between Dec. 21 and Dec. 23.
    • Brian C. Kenny, a spokesperson for the Business School, wrote in an emailed statement Wednesday that HBS had been informed of the software vulnerability prior to Dec. 29, and had accepted a “software patch” that the vendor provided.
    - Carrie Hsu | February 25, 2021
  • District says cyber attack prompted ‘code red’ lockdown of Cobb schools

    • District officials earlier said an AlertPoint system “malfunction” on Feb. 2 caused employees to receive a message indicating an active alarm.
    • Following the incident, Cobb schools said it began investigating and found the alarm was intentionally set off and was “uniquely limited to the AlertPoint system.”
    • Cobb school board members said the cyber attack on AlertPoint and the malfunctioning of the UV lights have raised more questions about the vulnerability of technology used by the district.
    • “If the safety mechanisms can be manipulated as we just witnessed, then the question is how safe are we?”
    • “How safe is the system and is it the right system if it can be easily targeted?”
    • Board member Brad Wheeler said the incident should propel the district to explore “what can be put in place to prevent it from happening again.”
    - Kristal Dixon | February 24, 2021
  • Bombardier Suffers Cyber Attack

    • The most recent victim is Canadian plane maker Bombardier, who announced yesterday that it suffered a limited cybersecurity breach. An initial investigation revealed that an unauthorized party accessed and extracted data by exploiting a vulnerability affecting a third-party file-transfer application, which was running on purpose-built servers isolated from the main Bombardier IT network.
    • Many security expects are speculating the attack is part of the Accellion "supply chain" breach.
    • The ongoing investigation indicates that the unauthorized access was limited solely to data stored on the specific servers. Manufacturing and customer support operations have not been impacted or interrupted. Bombardier can also confirm the company was not specifically targeted—the vulnerability impacted multiple organizations using the application.
    • The silver lining for Bombardier is that it can use the opportunity from this latest breach to invest more time in checking all entry points to systems and their global network and hopefully root out any other suspicious activity.
    Week - Peter Fretty | February 24, 2021
  • SolarWinds hackers targeted NASA, Federal Aviation Administration networks

    • Hackers are said to have broken into the networks of U.S. space agency NASA and the Federal Aviation Administration as part of a wider espionage campaign targeting U.S. government agencies and private companies.
    • The two agencies were named by the Washington Post on Tuesday, hours ahead of a Senate Intelligence Committee hearing tasked with investigating the widespread cyberattack.
    • It’s believed NASA and the FAA are the two remaining unnamed agencies of the nine government agencies confirmed to have been breached by the attack. The other seven include the Departments of Commerce, Energy, Homeland Security, Justice and State, the Treasury and the National Institutes of Health, though it’s not believed the attackers breached their classified networks.
    • Anne Neuberger, the former NSA cybersecurity director who last month was elevated to the White House’s National Security Council to serve as the deputy national security adviser for cyber and emerging technology, said that the attack took “months to plan and execute,” and will “take us some time to uncover this layer by layer.”
    - Zack Whittaker | February 23, 2021
  • VC firm Sequoia Capital suffers data breach, investor information stolen

    • Sequoia Capital, one of the most famous venture capital firms in Silicon Valley has suffered a data breach with investor information likely stolen.
    • It’s believed that the attack vector was via an employee being phished. Whether malware or ransomware was involved in the data breach is not clear with Sequoia informing its investors of the breach on Friday, Feb. 19.
    • The data potentially stolen is said to include personal and financial information.
    • Privileged access continues to be a major challenge for organizations. “Privileged access is no longer just about domain admins and it is also important to consider business users who have access to sensitive data as privileged access,” said Joseph Carson, Thycotic Software Ltd.
    - Duncan Riley | February 23, 2021
  • What We Know About the Hackers Behind the Accellion Data Breach

    • Accellion recently discovered that a threat actor had been exploiting zero-day vulnerabilities in its legacy file-transfer service application (called “FTA” for short)—a file-sharing and storage product used by approximately 300 clients. Despite subsequent patches, there has been a steady stream of FTA-related data breaches involving banks, universities, large companies, government agencies, and more.
    • On Monday, Accellion announced that it has been working with cyber firm FireEye since the incident, and that researchers have identified a group, dubbed “UNC2546,” as the “criminal hacker behind the cyberattacks and data theft.”
    • “Ransomware groups are amorphous. The core dev [development] team may be involved in other ransomware operations and the affiliates certainly will be. A member of REvil, for example, claimed that Egregor ransomware and Maze were both created by Evil Corp [a large cybercrime network]. And Evil Corp is responsible for WastedLocker and BitPaymer, and there may also be links to DoppelPaymer. And all those groups have affiliates and specialists who likely also work for other groups. And all use smoke and mirrors, so working out who did what and who’s working with who is far from easy.” - Brett Callow, Emsisoft Analyst
    • Digital forensics have shown that the initial intrusion mechanism used by UNC2546 in its FTA attacks was an SQL injection—a common cyberattack that injects foreign code into an application via a vulnerability. The actor then leveraged a webshell (a malicious script), which researchers have dubbed “DEWMODE,” to steal data from the FTA. DEWMODE lifted and downloaded bulk data and metadata straight from the application’s MySQL database.
    • After the data had been stolen via DEWMODE, “UNC2582" would kick into gear with a barrage of extortion emails.
    - Lucas Ropek | February 23, 2021
  • Clubhouse confirms data spillage of its audio streams

    • The app allows users to join and participate in pop-up public or private audio chatrooms, promising that conversations are not recorded and have to be experienced live.
    • But US cyber-security researchers tweeted that a user had found a way to stream audio to another website.
    • Stanford's cyber-security researchers discovered several security flaws, including the fact that the users' unique ID numbers and the ID numbers of the Clubhouse chatrooms they created were being transmitted in plaintext and it could be possible connect IDs to specific user profiles.
    • The researchers were also concerned that the Chinese government could gain access to the raw audio files on Clubhouse's servers, because its back-end infrastructure is provided by a real-time engagement API firm called Agora, which has offices in both Shanghai and San Francisco.
    • While it might sound alarming to hear that audio conversations on Clubhouse can be taken out of the app, this isn't exactly new.
    • Users are already using the video and audio recording functions on their devices to capture conversations had by celebrities like Elon Musk and Kevin Hart, and uploading them to YouTube.
    - Mary-Ann Russon | February 23, 2021
  • Toledo Public School students seeing effects of massive data breach

    • We're now seeing the first real signs of the fallout from that massive Toledo Public Schools’ data breach in October 2020.
    • Parents say they’re being notified about accounts trying to be opened in their kids’ names.
    • Here are some of the messages he’s received about his elementary schooler:
      • The first one was for denial for a credit card.
      • Another one happened when the child was denied for a car loan because it said the reason was because of his income ratio.
      • One of the last ones was to have fixed electric rates.
      • The family got a flier talking about the student’s Toledo Edison account and the gift card he could get by switching suppliers.
    • Parents need to be vigilant about what notices or letters they get and act quickly to shut anything down.
    - Shaun Hegarty | February 22, 2021
  • Kroger reports data breach from third-party file transfer service

    • Kroger said late Friday that it received notification from Palo Alto, Calif.-based Accellion that an unauthorized person had gained access to certain Kroger files by exploiting a vulnerability in Accellion’s secure file-transfer appliance product, Accellion FTA.
    • Based on information from Accellion and its own investigation, Kroger estimated that fewer than 1% of customers — specifically, from Kroger Health and Kroger Money Services — had data exposed, including certain pharmacy and money services records.
    • Accellion reported that an investigation by cybersecurity firm Mandiant identified “UNC2546” as the criminal hacker behind the cyberattacks and data breach involving Accellion FTA. Some FTA customers attacked by UNC2546 had received “extortion emails” threatening to publish stolen data, Accellion said.
    - Russell Redman | February 22, 2021

San Diego Cyber Incident Response Guide

Learn more about San Diego’s region-wide cyber incident response guide and available local, state and federal resources.

San Diego Cyber Incident Response Guide October 2017