Breach Guide

Learn the steps to take in the event of a data breach and stay current on the cyber threat landscape with the FTC’s Data Breach Resources, FBI’s Daily Digest Library and San Diego’s Cyber Incident Response Guide.

Federal Trade Commission (FTC) Data Breach Resources

Find out the steps to take as a business or consumer if you experience a data breach.

ftc-gov

FBI Cyber Daily Digest Library

Stay current on the global threat landscape with the FBI’s daily circulation of published data breaches and articles.

  • VC firm Sequoia Capital suffers data breach, investor information stolen

    • Sequoia Capital, one of the most famous venture capital firms in Silicon Valley has suffered a data breach with investor information likely stolen.
    • It’s believed that the attack vector was via an employee being phished. Whether malware or ransomware was involved in the data breach is not clear with Sequoia informing its investors of the breach on Friday, Feb. 19.
    • The data potentially stolen is said to include personal and financial information.
    • Privileged access continues to be a major challenge for organizations. “Privileged access is no longer just about domain admins and it is also important to consider business users who have access to sensitive data as privileged access,” said Joseph Carson, Thycotic Software Ltd.
    - Duncan Riley | February 23, 2021
  • What We Know About the Hackers Behind the Accellion Data Breach

    • Accellion recently discovered that a threat actor had been exploiting zero-day vulnerabilities in its legacy file-transfer service application (called “FTA” for short)—a file-sharing and storage product used by approximately 300 clients. Despite subsequent patches, there has been a steady stream of FTA-related data breaches involving banks, universities, large companies, government agencies, and more.
    • On Monday, Accellion announced that it has been working with cyber firm FireEye since the incident, and that researchers have identified a group, dubbed “UNC2546,” as the “criminal hacker behind the cyberattacks and data theft.”
    • “Ransomware groups are amorphous. The core dev [development] team may be involved in other ransomware operations and the affiliates certainly will be. A member of REvil, for example, claimed that Egregor ransomware and Maze were both created by Evil Corp [a large cybercrime network]. And Evil Corp is responsible for WastedLocker and BitPaymer, and there may also be links to DoppelPaymer. And all those groups have affiliates and specialists who likely also work for other groups. And all use smoke and mirrors, so working out who did what and who’s working with who is far from easy.” - Brett Callow, Emsisoft Analyst
    • Digital forensics have shown that the initial intrusion mechanism used by UNC2546 in its FTA attacks was an SQL injection—a common cyberattack that injects foreign code into an application via a vulnerability. The actor then leveraged a webshell (a malicious script), which researchers have dubbed “DEWMODE,” to steal data from the FTA. DEWMODE lifted and downloaded bulk data and metadata straight from the application’s MySQL database.
    • After the data had been stolen via DEWMODE, “UNC2582" would kick into gear with a barrage of extortion emails.
    - Lucas Ropek | February 23, 2021
  • Clubhouse confirms data spillage of its audio streams

    • The app allows users to join and participate in pop-up public or private audio chatrooms, promising that conversations are not recorded and have to be experienced live.
    • But US cyber-security researchers tweeted that a user had found a way to stream audio to another website.
    • Stanford's cyber-security researchers discovered several security flaws, including the fact that the users' unique ID numbers and the ID numbers of the Clubhouse chatrooms they created were being transmitted in plaintext and it could be possible connect IDs to specific user profiles.
    • The researchers were also concerned that the Chinese government could gain access to the raw audio files on Clubhouse's servers, because its back-end infrastructure is provided by a real-time engagement API firm called Agora, which has offices in both Shanghai and San Francisco.
    • While it might sound alarming to hear that audio conversations on Clubhouse can be taken out of the app, this isn't exactly new.
    • Users are already using the video and audio recording functions on their devices to capture conversations had by celebrities like Elon Musk and Kevin Hart, and uploading them to YouTube.
    - Mary-Ann Russon | February 23, 2021
  • Toledo Public School students seeing effects of massive data breach

    • We're now seeing the first real signs of the fallout from that massive Toledo Public Schools’ data breach in October 2020.
    • Parents say they’re being notified about accounts trying to be opened in their kids’ names.
    • Here are some of the messages he’s received about his elementary schooler:
      • The first one was for denial for a credit card.
      • Another one happened when the child was denied for a car loan because it said the reason was because of his income ratio.
      • One of the last ones was to have fixed electric rates.
      • The family got a flier talking about the student’s Toledo Edison account and the gift card he could get by switching suppliers.
    • Parents need to be vigilant about what notices or letters they get and act quickly to shut anything down.
    - Shaun Hegarty | February 22, 2021
  • Kroger reports data breach from third-party file transfer service

    • Kroger said late Friday that it received notification from Palo Alto, Calif.-based Accellion that an unauthorized person had gained access to certain Kroger files by exploiting a vulnerability in Accellion’s secure file-transfer appliance product, Accellion FTA.
    • Based on information from Accellion and its own investigation, Kroger estimated that fewer than 1% of customers — specifically, from Kroger Health and Kroger Money Services — had data exposed, including certain pharmacy and money services records.
    • Accellion reported that an investigation by cybersecurity firm Mandiant identified “UNC2546” as the criminal hacker behind the cyberattacks and data breach involving Accellion FTA. Some FTA customers attacked by UNC2546 had received “extortion emails” threatening to publish stolen data, Accellion said.
    - Russell Redman | February 22, 2021
  • Sequoia Capital says it was hacked

    • Sequoia Capital told its investors on Friday that some of their personal and financial information may have been accessed by a third party, after a Sequoia employee's email was successfully phished.
    • Sequoia told investors that it's been monitoring the dark web, and has not yet seen any indication that compromised information is being traded or otherwise exploited.
    • "Our security team responded promptly to investigate, and we contacted law enforcement and engaged leading outside cybersecurity experts to help remediate the issue and maintain the ongoing security of our systems...we regret that this incident has occurred and have notified affected individuals. We have made considerable investments in security and will continue to do so as we work to address constantly evolving cyber threats."
    - Kia Kokalitcheva | February 22, 2021
  • New malware found on 30,000 Macs has security pros stumped

    • A previously undetected piece of malware found on almost 30,000 Macs worldwide is generating intrigue in security circles, which are still trying to understand precisely what it does and what purpose its self-destruct capability serves.
    • Once an hour, infected Macs check a control server to see if there are any new commands the malware should run or binaries to execute.
    • Also curious, the malware comes with a mechanism to completely remove itself, a capability that’s typically reserved for high-stealth operations. So far, though, there are no signs the self-destruct feature has been used, raising the question why the mechanism exists.
    • The malware has been found in 153 countries with detections concentrated in the US, UK, Canada, France, and Germany. Its use of Amazon Web Services and the Akamai content delivery network ensures the command infrastructure works reliably and also makes blocking the servers harder.
    • Researchers from Red Canary, the security firm that discovered the malware, are calling the malware Silver Sparrow.
    - Dan Goodin | February 20, 2021
  • Healthcare Data Breaches Halved in January

    • The number of month-on-month healthcare data breaches of 500 or more records reported in the United States was halved in January.
    • Despite the massive decline in the number of breaches recorded in January, the total number of health records compromised in the first month of 2021—4,467,098—exceeded December's total by more than 225,000. A major data breach at Florida Healthy Kids Corporation that impacted 3.5 million individuals was key in driving January's figure past the four million mark.
    • Other notable data breaches reported in January include a ransomware attack on healthcare provider Hendrick Health that compromised 640,436 records and a phishing attack on Roper St Francis Healthcare in which 640,436 records were exposed.
    • Hacking and other IT incidents caused the majority of healthcare data breaches in January.
    - Sarah Coble | February 19, 2021
  • After the SolarWinds hack, we need contact tracing for our data

    • While the attack on SolarWinds software is arguably the most significant state-sponsored hack we’ve seen in years, it’s more than an isolated incident. It is emblematic of a constant reality of the digital era: We’re all likely to get hacked at some point. Our ability to respond determines our ability to operate. Digital security is now a broad governance imperative.
    • It takes a company 207 days to identify that a breach has occurred, and another 73 days to contain it.
    • A victim’s fundamental questions are, “Who has accessed our data? Which data, when, and why?” In other words, the ability to trace all contact with sensitive data is vital.
    • Applied to digital systems, contact tracing could become a powerful security technique.
    • The idea is for organizations to be able to share details of how they were attacked and what was targeted—the who, what, and when—as quickly as possible with other organizations. 
    • This concept could help organizations identify breaches sooner and remediate faster and more effectively. Through sharing, attack techniques could be more thoroughly understood, and with the right reporting mechanism, the resulting threat intelligence could be shared to help more organizations avoid a breach in the first place.
    • Data contact tracing could dramatically shrink the “dwell time”—the period between detection of an attack or compromised system and notification to the world.
    • The technology exists to contact-trace our data and to automate the real-time extraction of insights.
    - Doug Merritt | February 18, 2021
  • Data Breaches: ShinyHunters' Dominance Continues

    • The ShinyHunters cybercrime operation runs a data exfiltration and sales business that appears to be off to a roaring start again this year, following on the heels of its data breach spree last year.
    • Many of last year's biggest hits apparently trace back to one gang: ShinyHunters.
    • After nearly 50 data breaches in 2020, so far this year, the gang has already been blamed for data breaches at e-commerce site Bonobo and dating site MeetMindful.
    • Last month, ShinyHunters posted stolen Bonobo data to cybercrime forum RaidForums, including account information for nearly 2 million registered users.
    • In January, for example, a RaidForums user called "Spiral" posted what they said was the set of data exposed in the September 2020 breach of Australian PDF-creation service Nitro, which the user said had been "dumped by ShinyHunters."
    • "ShinyHunters has made a number of posts about being frustrated that people were reselling their data, so they release it for free or dirt cheap," said Zack Allen, director of threat intelligence at ZeroFOX.
    - Mathew Schwartz | February 18, 2021

San Diego Cyber Incident Response Guide

Learn more about San Diego’s region-wide cyber incident response guide and available local, state and federal resources.

San Diego Cyber Incident Response Guide October 2017