IdentityForce Logo IdentityForce Logo
Protect What Matters Most.
Posted on January 24, 2017 by in Data Breach & Technology, Personal

Data breaches increased by 40% in 2016, and if the first month of the new year is any indication of what’s to come, those numbers are just going to keep rising in 2017. January saw a healthcare breach, a couple of extortion attempts, and an interesting turn of events in which a hacking company got hacked itself.

Here are the recent data breaches that were making headlines in January 2017:

Highmark BlueCross BlueShield of Delaware

The Delaware Department of Insurance (DDOI) revealed an August data breach to the public this month, which involved Summit Reinsurance Services, Inc. and BCS Financial Corporation, both subcontractors of Highmark BlueCross BlueShield of Delaware. According to the DDOI, 19,000 members with employer-paid health plans and 16 self-insured customers were affected by the breach.

In August, Summit Reinsurance discovered ransomware had infected a server. After a forensic security audit, Summit Reinsurance learned that unauthorized access to a server containing member information occurred in March 2016. The company said compromised information might have included names, Social Security numbers, health insurance information, provider names, and claim-focused medical records containing diagnosis and clinical information. Currently, the investigation is still ongoing.

E-Sports Entertainment Association (ESEA)

Right before the end of the year on December 30, 2016, ESEA, one of the largest video gaming communities, issued a warning to players after discovering a breach. At the time, it wasn’t known what was stolen and how many people were affected. However, in January, LeakedSource revealed that 1,503,707 ESEA records had been added to its database and that leaked records included a great deal of private information: registration date, city, state, last login, username, first and last name, bcrypt hash, email address, date of birth, zip code, phone number, website URL, Steam ID, Xbox ID, and PSN ID.

The hacker responsible tried to extort ESEA for $100,000, but the company refused to pay, choosing to announce the breach before the hacker could publish any stolen records. The matter is still under investigation, and the FBI is involved.

Cellebrite

Motherboard revealed that Cellebrite, one of the biggest companies in the mobile phone hacking industry, was hacked itself. It appears that the stolen data was from servers related to Cellebrite’s website and the cache includes usernames and passwords for logging into my.cellebrite.domain. Motherboard said the dump also appears to contain evidence files from seized mobile phone and logs from Cellebrite devices.

Cellebrite is still conducting an investigation to determine the extent of the breach. As of now, the hacker has not dumped the files online for anyone to download and may have been motivated by disdain regarding recent changes in surveillance legislation.

Little Red Door Cancer Services of East Central Indiana

Little Red Door, a charitable organization in Indiana, was the victim of a hacker, TheDarkOverlord, that has been attacking health care organizations since last summer. Board members received text messages on January 11 instructing them to check their e-mail. The next day, they discovered the company’s server and backups had been completely wiped clean. The hacker said he wanted 50 bitcoins (about $43,000) to return the stolen data, but the Little Red Door refused to pay.

As of now, the stolen information has not been posted online anywhere. Little Red Door is working to restore lost data and is trying to secure its operations.

Check back next month to stay up to date on the most recent data breaches.