Weekly Cybersecurity Recap February 2

  • By Steven
  • Published: Feb 02, 2024
  • Last Updated: Feb 07, 2024

This week started with a cyber event targeting a Californian insurance brokerage, Keenan & Associates; the assailants garnered over 1.5 million records from the attack. GEICO also announced data from their organization was compromised, although the breach didn’t happen through them; one of their vendors was hit by the global MOVEit event, exposing the data of over 70k employees and associates. A retirement solution provider—Bankers Life and Casualty Company—also announced a breach event, though it happened through a sophisticated SIM swapping scheme. We also featured LockBit’s Citrix Bleed this week after it compromised the data of nearly 200k Planet Home Lending borrowers. Finally, we featured dangers that small businesses face; experts predict that in 2024, business leaders must respond to the call of action to protect their clients, businesses, employees, and themselves. Read a synopsis of each event below.

Keenan & Associates

A cross-industry insurance brokerage, Keenan suffered a significant breach in 2023. According to the public information, the attack came from an unauthorized actor; they accessed Keenan’s systems and began disrupting their network. The stolen data may include consumers’ names, birthdays, Social Security Numbers (SSNs), passport numbers, driver’s license numbers, health insurance data (like provider names or group numbers), and general health information (like diagnosis and treatment details). Victims of this breach have an increased risk of fraudulent data misuse and further victimization through potential credential-stuffing events. 

Planet Home Lending

PHL is a national mortgage lender. They work with software vendors to produce their clients’ best financial and estate solutions. In 2023, officials found one of their vendors, Citrix Systems, vulnerable; this weakness allowed LockBit, a globally recognized ransomware gang, to access the networks of Citrix’s clients. Dubbed the “Citrix Bleed,” some PHL borrowers and associates have been exposed to the event. Exposures potentially include names, addresses, SSNs, loan information, and financial account details. Victims of this breach have an increased risk of fraud, impersonation, and extortion; subsequently, they must act immediately to safeguard their information from misuse. 

Identity Theft Resource Center Report

The ITRC released an impact report concerning small businesses (SMBs) and their cyberattacks in 2023. According to their report, 2024 SMB leaders are heading in the right direction, but half remain unprotected and unprepared for the consequences of a breach. ITRC suggests that SMB leaders take up active cybersecurity policies like multi-factor authentications and employee-only access permissions. We suggest individuals (employees and consumers) take data precautions like utilizing reputable password managers, multi-factor authentications on all accounts, and using caution whenever speaking with strangers online, in-person, or via tech devices.

Bankers Life and Casualty Company

A nationwide retirement solutions provider, Bankers offers programs for retirees and their families to make the most of retirement. According to the notices the Maine Attorney General published, a high-ranking official had his cellphone number swapped with a cybercriminal’s after going to a wireless retailer. The breach was coordinated with the retailer, prompting attention from the FBI. Those with information involved in this event may have had their names, SSNs, policy numbers, and dates of birth compromised. 

GEICO via Delta Dental of California 

The last breach featured for this week came from GEICO—though not directly. GEICO offers their employees and affiliates dental insurance through DDC, which had systems accessed by the global MOVEit event. The event was made possible by a zero-day vulnerability that allowed malicious actors to access DDC’s network (and the servers of thousands of other organizations). The consumer notices published with the event filing suggest victims consider identity, financial, and account monitoring services.

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

What is Single Sign-On: The Benefits and Importance of Implementing SSO

What is Single Sign-On: The Benefits and Importance of Implementing SSO

Every day, more people get online - most do it for leisure, but organizations are increasingly moving into the digital environment.

Personal vs Sensitive Personal Information (SPI): What’s the Difference

Personal vs Sensitive Personal Information (SPI): What’s the Difference

What is there to know about a person? Certainly, their name, but how about their affiliations, philosophical beliefs, or sexual orientation?

What Is An On-Path Attack and How Does It Work? 

What Is An On-Path Attack and How Does It Work? 

Suppose someone left their home, got in their car, and drove to the grocery store. Much like data packets that travel over Internet highways, the car will use various pathways to reach its destination; however, once the car gets to the store, a question remains: what happened between the generating point and the destination?

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close