DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

The Michigan State University Police Department is investigating an attempted theft of employee direct-deposit payroll earnings

Posted on October 25, 2013 by Dissent

eSecurity Planet just made me aware of a breach disclosed earlier this week:

Posted by the Michigan State University Police on October 20:

On Friday, October 18, two employees reported receiving email confirmation of a change in their direct-deposit designation. Police say that valid credentials (MSU NetID and password) were used by a perpetrator to modify the employees’ banking information on the EBS HR/Payroll (SAP) system. It is believed that the perpetrator gained access to the credentials through a sophisticated “phishing” attack.

There is no indication of a system-wide security breach or exposure of other employee data. As a precaution, the EBS systems were taken offline late Friday afternoon; it is anticipated that the systems will be back online Monday morning at 7:00am.

MSU Police are asking anyone who suspects that their banking information has been compromised to call 517-355-2222. Questions related to phishing or MSU NetIDs may be directed to the IT Services Support Desk at (517) 432-6200.

Safety Tips

Online scammers are becoming much more sophisticated in their attempts to lure victims, especially using email links to false websites. It is increasingly difficult to tell the difference between legitimate and counterfeit online sites. And, unfortunately, there has been a recent uptick in phishing attacks at institutions across the country.

Accordingly, each of us must be vigilant in our actions to prevent cybercrime and follow secure practices online:

  1. Never respond to an email requesting personal information.
  2. Use a different strong password for each online account.
  3. Change passwords more frequently for accounts with access to confidential data.
  4. Never share your password with others.

Learn more by visiting MSU’s safe computing website: http://tech.msu.edu/secureIT

 


Related:

  • In a few days, the PowerSchool hacker will learn his sentence, and his life as he has known it will end. (1)1)
  • U.K.: Two arrested over cyber attack which stole thousands of nursery children’s data (1)
  • PowerSchool hit by Salesloft Drift campaign, but hackers claim that there is no risk of harm or ransom
  • When it rains, it pours? Kido had a second incident to address
  • Uvalde CISD to close most of next week due to ransomware issue
  • Texas sues PowerSchool over breach compromising info of over 880,000 students, teachers
Category: Education Sector

Post navigation

← Rep. Joe Barton's stunning ignorance about HIPAA and healthcare.gov
International SOS notifying travelers whose information was illegally accessed (Updated) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.