DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

If you were a customer of Geoff Gray Corporation, your breach notification letter may be in the mail

Posted on July 9, 2011 by Dissent

Financial services provider Geoff Gray Corporation notified the New Hampshire Attorney General’s Office this week of a “potential security breach” that occurred sometime between June 9th – when one of their servers was working properly and accessible – and June 14, when they were notified that the server wasn’t accessible.

Their July 5th letter states that one server, which is collocated by 14Market, appeared to have been disabled by an outside entity sometime between those dates. 14Market’s investigation indicated that it appeared that someone had tried (unsuccessfully) to set up   IRC on the server.

Unable to determine if root access had been obtained or if there had been any breach of data, the firm retained Infiloop Consulting to investigate. Infiloop “confirmed that there was a potential breach.”

I am going to take a wild guess that GGC does not follow this blog because their notification letter to those affected tells them nothing at all about the nature of the incident or what types of data may have been compromised:

We are contacting you about a potential problem involving identity theft. While we do not believe any of your information was compromised, we are taking additional steps to enhance the security on our server to further protect your personal information.

And that’s all the say by way of describing the incident.

The company is not offering those affected any free credit-monitoring services. But what really caught my eye – apart from wondering whether some #AntiSec individuals may have been behind the effort to set up IRC on the server and  the absence of any detailed description of the breach – is that the firm does not even offer those affected a phone number they can call at GGC if they have questions or concerns.

There have been so many templates and guides for organizations as to how to respond to a breach that by now, this type of notification letter is really substandard.

The company had not yet mailed out notifications as of July 5th.  If the letters haven’t gone out in the mail yet,  I’d encourage them to provide a more informative and supportive notification letter.  Their customers shouldn’t have to read my blog to find out what happened – they should hear it from them.


Related:

  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • How a hacking gang held Italy’s political elites to ransom
  • On Reports of an Alleged Data Breach Involving G-Xchange, Inc. (GCash)
  • NY: Gloversville hit by ransomware attack, paid ransom
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
Category: Breach IncidentsFinancial SectorHackU.S.

Post navigation

← Video: Anonymous Hit town hall with a paper bomb
Twitter phishing scam currently active →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.