Delaware Life Insurance MOVEit Breach Exposes Producer and Client Data

  • By Steven
  • Published: Nov 24, 2023
  • Last Updated: Nov 27, 2023

Delaware Life Insurance MOVEit Breach exposes data

Group 1001 is the parent company of Delaware Life, a long-term financial consultant for organizations. Delaware Life uses a third-party vendor, Pension Benefit Information (PBI), for analysis and research services. PBI, in turn, operates with software created by industry-standard developers; Progress Software’s MOVEit file transfer application is one of these.

How Did the Attack Occur? 

MOVEit is a file transfer software that allows the fluid movement of data between systems; it has been used by thousands of organizations worldwide and within numerous industries. In May, Progress Software announced a zero-day vulnerability within MOVEit’s infrastructure. The result was cybercriminals flocking to the weak spot and experts immediately taking defensive maneuvers. PBI began a reactive system review and discovered an unauthorized actor accessed the information of its producers and clients.

What Information Was Viewed or Stolen? 

The stolen information consists of identifiable data, including full names, residential addresses, dates of birth, and Social Security Numbers (SSNs). Some people may have also had their contract, group number, or policy number stolen. These credentials are enough to cause anyone to fall victim to fraudulent crimes; the corresponding consumer and provider notices point to this, as they suggest monitoring services for those with exposed data. 

How Did Delaware Life Insurance Admit to the Breach? 

In February of this year, Delaware Life discovered ransomware within its systems. They reacted by conducting an investigation. In July, they partially finished the review and sent notices to those believed to be involved. Progress Software announced the MOVEit vulnerability in May, prompting PBI’s investigation. Months later, producers and clients initially not thought impacted may receive notifications. 

What Will Become of the Stolen Information? 

The future of the stolen data is uncertain, mainly because no threat actors claim they have the credentials. Further, though the notices state ransomware was initially involved in the event, they do not indicate the threat actors’ demands. Presumably, this is due to PBI rejecting the demands; regardless of how PBI responded to the attack, consumer and provider information may still be at risk. The assailants having access to the data is enough to warrant precautions.

What Should Affected Parties Do in the Aftermath of the Breach? 

The total impact of this breach remains unclear; the notices only offer limited information about who may have had their data accessed. Currently, providers and individual clients have had their data access, although the details differ between individuals. Consumers and group members can expect their letter notice in the coming weeks, while providers may need more time. According to the provider notice, Delaware Life will send a list of data of potentially exposed employees

Providers and clients don’t need to wait for their physical notice to start taking control of their data security. Make the most of software defenses by enabling multi-factor authentication on all accounts, then update passwords with complex, strong passwords. Most will benefit from investing in monitoring services, deploying suspicious activity alerts, and freezing accounts when possible. Delaware Life providers and clients may have had their data stolen, but there is always time to mollify damages.

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

What is Single Sign-On: The Benefits and Importance of Implementing SSO

What is Single Sign-On: The Benefits and Importance of Implementing SSO

Every day, more people get online - most do it for leisure, but organizations are increasingly moving into the digital environment.

Personal vs Sensitive Personal Information (SPI): What’s the Difference

Personal vs Sensitive Personal Information (SPI): What’s the Difference

What is there to know about a person? Certainly, their name, but how about their affiliations, philosophical beliefs, or sexual orientation?

What Is An On-Path Attack and How Does It Work? 

What Is An On-Path Attack and How Does It Work? 

Suppose someone left their home, got in their car, and drove to the grocery store. Much like data packets that travel over Internet highways, the car will use various pathways to reach its destination; however, once the car gets to the store, a question remains: what happened between the generating point and the destination?

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close