DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Stratfor updates those affected: will be offering free credit monitoring services and will be boosting security

Posted on December 25, 2011 by Dissent

The following was provided to DataBreaches.net by one of the recipients:

From: “STRATFOR”
Date: December 25, 2011 3:49:06 PM MST
To: [redacted]
Subject: Update on Security Issues
Reply-To: “STRATFOR”

View on Mobile Phone | Read the online version.

Dear Stratfor Member,

On December 24th an unauthorized party disclosed personally identifiable
information and related credit card data of some of our members. We have
reason to believe that your personal and credit card data could have been
included in the information that was illegally obtained and disclosed.

Also publicly released was a list of our members which the unauthorized
party claimed to be Stratfor’s “private clients.” Contrary to this assertion
the disclosure was merely a list of some of the members that have purchased
our publications and does not comprise a list of individuals or entities
that have a relationship with Stratfor beyond their purchase of our
subscription-based publications.

We have also retained the services of a leading identity theft protection
and monitoring service on behalf of the Stratfor members that have been
impacted by these events. Details regarding the services to be provided will
be forwarded in a subsequent email that is to be delivered to the impacted
members no later than Wednesday, December 28th.

In the interim, precautions that can be taken by you to minimize and prevent
the misuse of information which may have been disclosed include the
following:

– contact your financial institution and inform them of this incident;
– if you see any unauthorized activity on your accounts promptly notify your
financial institution;
– submit a complaint with the Federal Trade Commission (“FTC”) by calling
1-877-ID-THEFT (1-877- 438-4338) or online at
https://www.ftccomplaintassistant.gov/; and
– contact the three U.S. credit reporting agencies: Equifax
(http://www.equifax.com/ or (800) 685-1111), Experian
(http://www.experian.com/ or (888) 397-3742), and TransUnion
(http://www.transunion.com/ or (800) 888-4213), to obtain a free credit
report from each.

Even if you do not find any suspicious activity on your initial credit
reports, the FTC recommends that you check your credit reports periodically.
Checking your credit reports can help you spot problems and address them
quickly.

To ease any concerns you may have about your personal information going
forward, we have also retained an experienced outside consultant that
specializes in such security matters to bolster our existing efforts on
these issues as we work to better serve you. We are on top of the situation
and will continue to be vigilant in our implementation of the latest, and
most comprehensive, data security measures.

We are also working to restore access to our website and continuing to work
closely with law enforcement regarding these matters. We will continue to
update you regarding the status of these matters.

Again, my sincerest apologies for this unfortunate incident.

Sincerely,

George Friedman

To manage your e-mail preferences click here.

STRATFOR
221 W. 6th Street, Suite 400
Austin, TX 78701 US
www.stratfor.com

For previous coverage on this breach, see this blog post, which I will continue to update.

Category: Breach IncidentsBusiness SectorHackID TheftU.S.

Post navigation

← Anonymous take down Copseek.com
Huge dump, 3000+ of Emails from phishing →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • Class action settlement following ransomware attack will cost Fred Hutchinson Cancer Center about $52 million
  • Comstar LLC agrees to corrective action plan and fine to settle HHS OCR charges
  • Australian ransomware victims now must tell the government if they pay up
  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
  • Victoria’s Secret takes down website after security incident
  • U.S. Government Employee Arrested for Attempting to Provide Classified Information to Foreign Government
  • St. Cloud Provides Update on Ransomware Attack in 2024
  • Bradford Health Systems detected abnormal network activity in December 2023. They first sent out breach notices this week.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent
  • Trump Taps Palantir to Compile Data on Americans
  • The US Is Storing Migrant Children’s DNA in a Criminal Database

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.