Data breached at LA Housing Authority after ransomware attack

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • PCHF IT Feeds
    PCHF Bot
    • Jan 2015
    • 54578

    #1

    Data breached at LA Housing Authority after ransomware attack

    The Housing Authority of the City of Los Angeles (HACLA) suffered a ransomware attack and had its data leaked to the dark web, the media reported earlier this week.

    According to a BleepingComputer report, the state-chartered organization, which provides affordable housing to low-income families in LA, recently published a breach notice detailing a ransomware attack that occurred on December 31, 2022.

    When the company’s IT team spotted the intrusion, they were forced to bring the servers offline and investigate the matter further.

    [HEADING=1]Lurking for a year[/HEADING]

    The investigation, which was completed a month and a half later (on February 13, 2023), had shown that the threat actors might have had access to the target network and its endpoints for a full year (January 15, 2022 - December 31, 2022).

    After a full year of dwell time, the hackers made away with a wide array of sensitive customer data.

    This includes full names, social Security Numbers, dates of birth, passport numbers, driver’s license numbers, state ID numbers, tax ID numbers, military ID numbers, government-issued ID numbers, credit/debit card numbers, financial account numbers, health insurance information, and medical information.

    The organization also said it notified affected customers by email, instructed them on how to monitor their accounts, place fraud alerts, and report potential identity theft.

    Read more
    Check out the best endpoint protection services around

    LockBit is back, with a new ransomware source code

    LockBit ransomware leaked online by angry developer
    On the day the breach was spotted, the infamous LockBit 3.0 ransomware gang published samples of the stolen data on its leak website, claiming responsibility for the attack. It also threatened to release the entire batch, unless its (undefined) ransom demands are met.

    BleepingComputer later reported that the group leaked the entire database on January 27, but the link became inactive a month and a half later. The publication also said that there is no evidence that any other threat actors obtained this data, either.

    [ul]
    [li]Check out the best firewalls right now[/li][/ul]

    Continue reading…
Working...