Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard.” Our goal at PK Tech is to educate and offer proactive steps for cybersecurity safety. It’s essential to be aware–without being afraid–of the cybersecurity threats that are real threats for your business. PK Tech aims to be a leading educator and support tool in the world of cybersecurity.
Check out our monthly “Hacker Tracker” for the latest in cybersecurity hacks, breaches, and updates…
#1 Updated Kaseya ransomware attack FAQ: What we know now | 7.2.21
- Kaseya, an IT solutions developer for MSPs and enterprise clients, announced that it had become the victim of a cyberattack on July 2, over the American Independence Day weekend.
- Attackers carried out a supply chain ransomware attack by leveraging a vulnerability in Kaseya’s VSA software against multiple managed service providers (MSP) — and their customers.
- According to Kaseya CEO Fred Voccola, less than 0.1% of the company’s customers were embroiled in the breach — but as their clientele includes MSPs, this means that smaller businesses have also been caught up in the incident.
- View the Source
#2 Law firm for Ford, Boeing, Exxon, Marriott, Walgreens, and more hacked in ransomware attack | 7.19.21
- Campbell Conroy & O’Neil, P.C., a law firm handling hundreds of cases for the world’s leading companies, has announced a large data breach that resulted from a ransomware attack in February.
- Their investigation revealed that the hackers behind the attack gained access to a database with names, dates of birth, driver’s license numbers/state identification numbers, financial account information, Social Security numbers, passport numbers, payment card information, medical information, health insurance information, biometric data, and/or online account credentials.
- The law firm is offering those affected 24 months of free credit monitoring, fraud consultation, and identity theft restoration services.
- Campbell Conroy & O’Neil is one of the world’s biggest law firms and boasts a client list that includes major corporate giants like Exxon, Ford, Toyota, British Airways, Boeing, Monsanto, Johnson & Johnson, Pfizer, Dow, Fisher-Price, Home Depot, Office Max, Walgreens, Toshiba and more.
- View the Source
#3 US House terminates deal with iConstituent after company waited days to raise ransomware alarm | 7.21.21
- The constituent communication platform was hit with a ransomware attack in May and waited nearly a week to notify government officials.
- iConstituent is currently used by about 60 House members and was designed to facilitate communication between politicians and local residents.
- Moving forward, that platform will not be used due to multiple cybersecurity issues.
- In a letter to House members following the incidents, the CAO ripped into iConstituent for multiple security incidents — some that had not been reported before — and for their lackluster response to questions from government officials.
- View the Source
Lessons Learned From This Month’s Hacks
- The Kaseya attack reminds us of an important statistic: estimates suggest that 800 to 1500 small to medium-sized companies may have experienced a ransomware compromise through their MSP. Always make sure you are working with a reputable MSP. If you need help determining whether you have a qualified IT security team, check out our blog Do I Need a New IT Guy? Ask These 10 Questions.
- While we’ve commented recently that hackers are extending their reach beyond big corporations and name brands, this attack proves that name brands will likely always be a target, even when ransomware attacks (hopefully) settle down in the coming years. If you are a third party that deals with well-known corporations, consider yourself a key target as well.
- From the iConstituent attack, we learn another important lesson: when victim to a ransomware attack communication is key. Communicate with your customers, patients, or whoever else may have been affected by the data breach. The best way to stay in front of it is to communicate transparently. Hiding the effects of an attack never ends well for an organization.
Reach out if you have questions here.