Category: data breach
The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning to all chemical facilities operating in the United States regarding a potential data breach that may have exposed sensitive information to hackers. This includes details such as business names, place of birth, citizenship, redress system number, and global entry ID.
CISA’s alert follows a confirmed report that the Chemical Security Assessment Tool (CSAT) was compromised by a known threat actor through a vulnerability in the Ivanti Connect Secure Appliance earlier this year. This breach affects all participants of the Chemical Facility Anti-Terrorism Standards (CFATS), prompting immediate attention due to the potential exposure of sensitive data.
CFATS is a program that regulates cybersecurity measures in chemical facilities to mitigate risks associated with hazardous materials being used for malicious purposes. It mandates compliance to ensure operational security and continuity.
CISA’s investigation revealed that the breach on CFATS involved the deployment of an advanced webshell on the Ivanti device. Although the threat actor accessed the system over a two-day period, there is currently no evidence of misuse or sale of the compromised information, even six months after the incident.
As a precautionary measure, CISA recommends a password reset for all CSAT accounts to bolster defenses against potential brute force attacks and further unauthorized access.
The post CISA warns chemical facilities in America about possible data breach appeared first on Cybersecurity Insiders.
The Department of Public Health (DPH) under the County of Los Angeles has been involved in a significant data breach affecting potentially over 200,000 individuals, resulting in the unauthorized exposure of personal medical and financial information.
Initial investigations suggest that the breach occurred when hackers successfully obtained login credentials from more than 53 public health employees through a phishing email. The cyber-attack took place overnight between February 19th and February 20th of this year, ultimately leading to the compromise of sensitive details.
The compromised information includes employees’ first and last names, medical histories, treatment details, Medicare numbers, health insurance information, social security numbers, and other financial data.
Upon discovering the phishing attack and subsequent data breach, the Los Angeles County DPH expressed deep concern and committed to taking necessary steps to prevent such incidents in the future. All affected individuals have been notified, and arrangements are being made to provide them with free credit monitoring services for a specified period following the conclusion of the investigation.
In light of this incident, affected individuals are advised to exercise heightened vigilance, especially regarding their digital transactions and credit activities, to promptly identify any suspicious or unauthorized activities.
A phishing email is a fraudulent attempt where an email appears to originate from a legitimate source but is actually designed to deceive recipients into disclosing sensitive information. Such attacks aim to gather credentials and other valuable information that can be used to gain unauthorized access to networks or accounts.
The post Los Angeles County suffers data breach impacting 200000 individuals appeared first on Cybersecurity Insiders.