DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

If you were a customer of Geoff Gray Corporation, your breach notification letter may be in the mail

Posted on July 9, 2011 by Dissent

Financial services provider Geoff Gray Corporation notified the New Hampshire Attorney General’s Office this week of a “potential security breach” that occurred sometime between June 9th – when one of their servers was working properly and accessible – and June 14, when they were notified that the server wasn’t accessible.

Their July 5th letter states that one server, which is collocated by 14Market, appeared to have been disabled by an outside entity sometime between those dates. 14Market’s investigation indicated that it appeared that someone had tried (unsuccessfully) to set up   IRC on the server.

Unable to determine if root access had been obtained or if there had been any breach of data, the firm retained Infiloop Consulting to investigate. Infiloop “confirmed that there was a potential breach.”

I am going to take a wild guess that GGC does not follow this blog because their notification letter to those affected tells them nothing at all about the nature of the incident or what types of data may have been compromised:

We are contacting you about a potential problem involving identity theft. While we do not believe any of your information was compromised, we are taking additional steps to enhance the security on our server to further protect your personal information.

And that’s all the say by way of describing the incident.

The company is not offering those affected any free credit-monitoring services. But what really caught my eye – apart from wondering whether some #AntiSec individuals may have been behind the effort to set up IRC on the server and  the absence of any detailed description of the breach – is that the firm does not even offer those affected a phone number they can call at GGC if they have questions or concerns.

There have been so many templates and guides for organizations as to how to respond to a breach that by now, this type of notification letter is really substandard.

The company had not yet mailed out notifications as of July 5th.  If the letters haven’t gone out in the mail yet,  I’d encourage them to provide a more informative and supportive notification letter.  Their customers shouldn’t have to read my blog to find out what happened – they should hear it from them.

No related posts.

Category: Breach IncidentsFinancial SectorHackU.S.

Post navigation

← Video: Anonymous Hit town hall with a paper bomb
Twitter phishing scam currently active →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Air Force Employee Pleads Guilty to Conspiracy to Disclose Unlawfully Classified National Defense Information
  • UK police arrest four in connection with M&S, Co-op and Harrods cyberattacks (1)
  • At U.S. request, France jails Russian basketball player Daniil Kasatkin on suspicion of ransomware conspiracy
  • Avantic Medical Lab hacked; patient data leaked by Everest Group
  • Integrated Oncology Network victim of phishing attack; multiple locations affected (2)
  • HHS’ Office for Civil Rights Settles HIPAA Privacy and Security Rule Investigation with Deer Oaks Behavioral Health for $225k and a Corrective Action Plan
  • HB1127 Explained: North Dakota’s New InfoSec Requirements for Financial Corporations
  • Credit reports among personal data of 190,000 breached, put for sale on Dark Web; IT vendor fined
  • Five youths arrested on suspicion of phishing
  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How to Build on Washington’s “My Health, My Data” Act
  • Department of Justice Subpoenas Doctors and Clinics Involved in Performing Transgender Medical Procedures on Children
  • Google Settles Privacy Class Action Over Period Tracking App
  • ICE Is Searching a Massive Insurance and Medical Bill Database to Find Deportation Targets
  • Franklin, Tennessee Resident Sentenced to 30 Months in Federal Prison on Multiple Cyber Stalking Charges
  • On July 7, Gemini AI will access your WhatsApp and more. Learn how to disable it on Android.
  • German court awards Facebook user €5,000 for data protection violations

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.