DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

California DOJ notifies those affected by a hack of a retired agent’s email accounts

Posted on May 15, 2012 by Dissent

Have I mentioned how valuable it is when states post breach notices online?  A reader points me to a new addition to California’s security notices page from the DOJ’s Computer and Technology Crime High-Tech Response Team (C.A.T.C.H.). The incident they are reporting was a hack by those affiliated with Anonymous in 2011:

In November 2011, hackers affiliated with the group Anonymous accessed and released private email accounts belonging to a retired agent for the Department of Justice who was a member of the Computer and Technology Crime High-Tech Response Team (CATCH). CATCH is a multi-agency task force that was formed to apprehend and prosecute criminals who use technology to prey on the citizens of San Diego, Imperial Valley, and Riverside Counties. Some of emails that the hackers released included data that contained your personal information including, but not limited to, your name, address, date of birth, and Social Security number (SSN).

Others received a letter that began:

In November 2011, hackers affiliated with the group Anonymous accessed and released private email accounts belonging to a retired agent from the Department of Justice who was a member of the Computer and Technology Crime High-Tech Response Team (CATCH). CATCH is a multi-agency task force that was formed to apprehend and prosecute all criminals who use technology to prey on the citizens of San Diego, Imperial Valley, and Riverside Counties. Some of the emails the hackers released included closed identity theft case files that contained some of your personal information including, but not limited to, your name, financial account information or credit card number, and possibly your Social Security number.

The letter to those in the second group also contained the following statement:

In addition, although it appears that the identity theft case file in which your information was contained has been closed, you may want to confirm that your financial account has been closed. If it has not, we suggest that you immediately contact the financial institution and close your account. Tell them that your account may have been compromised, and ask that they report it as “closed at customer request.” If you want to open a new account, ask them to give you a PIN or password. This will help control access to the account.

No explanation was provided as to why there was such a delay between the incident and the notification letters to individuals. Did they delay because it took them time to figure out who had data exposed?   Did they delay so that the disclosure would not interfere with any criminal investigation?  If people’s accounts were exposed, I hope they contacted them all promptly by phone if not by letter.

Keep in mind that entities only have to file these breach reports with California if the breach affected more than 500 individuals.

 

No related posts.

Category: Breach IncidentsGovernment SectorHack

Post navigation

← IL: Hospital worker charged with stealing patients' identities
Zero tolerance for human error? Utah governor fires tech director →

2 thoughts on “California DOJ notifies those affected by a hack of a retired agent’s email accounts”

  1. Mike T says:
    May 15, 2012 at 10:09 am

    So, if I’m understanding this correctly, someone from law enforcement, involved in the investigation of computer crimes, kept copies of official information in a private email account? If anyone should be able to understand the controls required to secure information, shouldn’t it have been the retired agent?

    1. admin says:
      May 15, 2012 at 11:46 am

      That’s what I’m wondering, too, but I never dl the torrent to see what was in it.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The data appear fake. (1)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases
  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Here’s What a Reproductive Police State Looks Like
  • Meta investors, Zuckerberg to square off at $8 billion trial over alleged privacy violations
  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’
  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.