Three Big Data Breaches Announced
These three significant breaches highlight just how vulnerable U.S. private networks are to black hat hacker threats. The massive data breach of Target in the last quarter of 2013 generated tremendous concern for PII. Despite all the attention and concern generated by the massive data breaches of the last year, many companies still appear unprepared to detect and mitigate network intrusions.
1) Supervalu Grocery Chain: Point of Sale System Hacked
On Thursday, August 14, 2014, grocery store chain Supervalu announced it had suffered a malicious black hat hacker intrusion that exposed account information belonging to customers who had shopped at about 180 of the company's stores in about a dozen states. The company, whose headquarters is in Eden Prairie, MN said the breach also affected customers from several other major grocery store chains for which Supervalu provides IT services.
Supervalu’s website says:
“Supervalu experienced a criminal intrusion into the portion of its computer network that processes payment card transactions for some of its retail food stores under the Cub Foods, Hornbacher’s, Farm Fresh, Shop ‘N Save and Shoppers Food & Pharmacy banners, including some of its associated stand-alone liquor stores. The Company has not determined that any cardholder data was in fact stolen by the intruder, and it has no evidence of any misuse of any such data, but is making this announcement out of an abundance of caution. Please click here for more details.”
2) Community Health Systems: Electronic Medical Record System Hacked
On Monday, August 18, 2014, Community Health Systems, announced a data breach that affected 4.5 million people. The company, based in Franklin, TN, is one of the largest hospital networks in the country with 206 hospitals in 29 states. According to the company, intruders accessed and copied Personally Identifiable Information (PII) belonging to patients who were treated by or referred to the hospital's physicians. The Data compromised in the breach included Social Security numbers, birth dates and phone numbers.
A portion of the company’s “Data Breach Notification” reads:
“In July 2014, Community Health Systems Professional Services Corporation (“CHSPSC”) confirmed its computer network was the target of an external criminal cyber-attack in April and June 2014. CHSPSC, a Tennessee company, provides management, consulting, and information technology services to certain clinics and hospital-based physicians in this area.
“CHSPSC believes the attacker was an “Advanced Persistent Threat” group originating from China, which used highly sophisticated malware technology to attack CHSPSC’s systems. The intruder was able to bypass the company’s security measures and successfully copy and transfer some data existing on CHSPSC’s systems.”
The Healthcare Industry needs to increase security surrounding Electronic Medical Records (EMR) and Electronic Health Records (EHR): Healthcare Industry is Vulnerable to Cyber Attacks.
3) UPS Store Locations: Point of Sale System Hacked
In a statement Wednesday August 20, 2014, UPS Store Inc., a wholly owned subsidiary of United Parcel Service (“UPS”) of America, Inc. said it was recently notified by law enforcement officials about a "broad-based malware intrusion" of its systems. The company based in Atlanta, GA announced that credit and debit card information belonging to customers who did business at 51 UPS Store Inc. locations in 24 states this year may have been compromised as the result of an intrusion into the company's networks.
The UPS intrusion was based upon a previously unknown malware installed on systems in more than four-dozen stores. Only about 1% of the 4,470 UPS Store locations around the country were affected. The intrusion may have exposed transaction data from individual franchise Point of Sale (POS) systems. "For most locations, the period of exposure to this malware began after March 26, 2014," UPS said in a statement.
In addition to payment card information, the hackers also appear to have gained access to customer names, as well as postal and email addresses. Each of the independently owned stores has their own network so the exposure was limited.
Their breach notification begins:
“The UPS Store, Inc., among many other U.S. retailers, recently received a government bulletin regarding a broad-based malware intrusion not identified by current anti-virus software. Upon receiving the bulletin, The UPS Store retained an IT security firm and conducted a review of its systems and the systems of its franchised center locations. The UPS Store discovered malware identified in the bulletin on systems at 51 locations in 24 states (about 1%) of 4,470 franchised center locations throughout the United States.
“Based on the current assessment by The UPS Store and the IT security firm, certain customers’ information, who used a credit or debit card at the 51 impacted franchised center locations between January 20, 2014 and August 11, 2014, may have been exposed. For some center locations, the period of exposure to this malware began after January 20, 2014. The malware was eliminated as of August 11, 2014 and customers can shop securely at all The UPS Store locations.”
By Evidence Solutions, Inc.ABOUT THE AUTHOR: Scott Greene of Evidence Solutions, Inc.
Expert Website: https://www.evidencesolutions.com
Call (866) 795-7166
Expert Website: https://www.evidencesolutions.com
Call (866) 795-7166
For over 30 years, Scott Greene has been helping companies meet the challenges of the swiftly evolving computer technology industry.
Directly from high school, Scott went to work for IBM. Scott studied Systems Engineering at the University of Arizona. He has since earned certifications in many products and programming languages.
The Evidence Solutions team analyzes data from Computers, Cell Phones, Black Boxes, Dispatch Systems, Medical Records, Email systems and more. Scott then explains the digital evidence in plain English.
Scott’s extensive knowledge draws clients to him from all over the United States as well as Internationally for consulting, Forensics and expert witness services. His extensive and diverse experience allows him to be an expert in many facets of digital and electronic evidence. Scott, a sought after speaker and educator, travels throughout the country sharing his knowledge and presenting to local, regional, national and International organizations.
Copyright Evidence Solutions, Inc.
Disclaimer: While every effort has been made to ensure the accuracy of this publication, it is not intended to provide legal advice as individual situations will differ and should be discussed with an expert and/or lawyer.For specific technical or legal advice on the information provided and related topics, please contact the author.