DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Downeast Energy Suffers Security Breach

Posted on September 15, 2009 by Dissent

Downeast Energy in Brunswick [Maine] says that the company is the victim of a computer breach that led to unauthorized access to one of its bank accounts at Key Bank. The personal information of as many as 800 Downeast customers may have compromised as well.

Downeast says the perpetrators succeeded in transferring funds out of the account, which may result in a loss of around $150,000 to the company.

Read more on Fox23.

Update: Downeast Energy issued this statement on their site:

Downeast Energy has recently discovered that it was the victim of a computer breach resulting in unauthorized access to one of its bank accounts at Key Bank. The perpetrators succeeded in transferring funds out of the account which may result in a loss to Downeast less than $150,000. Downeast Energy employs multiple, sophisticated, information technology security systems to protect its information resources. This breach occurred as a result of a response to a very sophisticated phishing e-mail.

“This is an unfortunate incident and we apologize for any inconvenience to our customers,” said John Peters, President of Downeast Energy. “We are continuing to work closely with law enforcement and our bank to ensure that our account is secured but more importantly to protect our customers as well.”

Downeast Energy understands the scope of this crime involves many other companies, banks and the geographic reach of the crime extends well beyond Maine and has international roots.

The perpetrators were able to transfer money from the company’s bank account which receives the automatic deposits from customers EFT accounts (Electronic Funds Transfer). Because this particular bank account was hit, the perpetrators could have viewed certain private information of Downeast’s EFT accounts customers, their names, their banks and their account numbers at those banks.

Maine law, Chapter 210-B of Title 10, requires that in these circumstances the company must give notice to customers of such breach. Also as a part of our notice requirements under Maine law, we notified the Attorney General’s Office of this event.

The company has sent letters to all the customers, approximately 800, affected by this incident and plans to follow up with phone calls to each customer to extend its apologies and ensure the customers understand the situation.


Related:

  • Two more entities have folded after ransomware attacks
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Missouri Adopts New Data Breach Notice Law
  • Qantas obtains injunction to prevent hacked data’s release
Category: Breach IncidentsBusiness SectorU.S.

Post navigation

← U. of Florida reports breach
Heartland CEO: Credit Card Encryption Needed →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.