DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Has Hirsche Private Asset Management Ltd. gone dark after disclosing breach?

Posted on January 30, 2015 by Dissent

On January 7, this site posted a press release from Hirsche Private Asset Management Ltd. announcing what appears to have been attacks that compromised their clients’ information.

Since that time, they have revealed no additional details, and their web site returns 403 and 404 error messages.

A bit of digging reveals that  Hirsche Private Asset Management Ltd. is not authorized by the Financial Conduct Authority in the UK, who issued this warning in September 2014:

The Financial Conduct Authority (“FCA”) of the United Kingdom would like to alert all recipients that:

Name- Hirsche Private Asset Management Ltd

Addresses:(1)27 Old Gloucester Street, London, WC1N 3AX, United Kingdom
(2)South Church Street, George Town, Grand Cayman, KY1-1104
(3)28F, No.66, Sec. 1, Zhongxioo W.Rd, Zhongzheng Dist, Taipei City 10018 (4)31-33 Ng Fong Street, San Po Kong, Hong Kong

Tel- 02092394273, 00886287292338 & 0085281224069 Website- www.hirsche.co.uk
Email- [email protected] (sic) & [email protected]

is NOT authorised under the Financial Services and Markets Act 2000 (“FSMA”) to carry on a regulated activity in the United Kingdom. Regulated activities include, amongst other things, advising on investments and dealing and arranging deals in investments (“investments” include stocks and shares).

The FCA believes that this organisation may be targeting UK customers. Therefore, we have added this firm to our list of unauthorised firms and individuals list. This list can be found at:

http://www.fca.org.uk/consumers/protect-yourself/unauthorised-firms/unauthorised-firms-to- avoid

If you have any further questions on this matter please email our Consumer Contact Centre at [email protected], or alternatively by telephone on 0800 111 6768. Overseas callers can contact us on (+44) 20 7066 1000.

In Australia, the ASIC (Australian Securities & Investment Commission) had also issued a warning and “advises this company could be involved in a scam” and that they are unlicensed in Australia. ASIC also notes, “FIN-FSA has reason to suspect that the company offers investment services in Finland without appropriate authorisation.” The same allegations have been raised in Hong Kong, and there are several web sites accusing Hirsche Private Asset Management Ltd of being a scam, such as this response to an inquiry about unsolicited phone calls appearing to be from the firm:

hirsche1

“Shaun’s” claims are consistent with a consumer who had emailed DataBreaches.net to say that he had lost a lot of money with Hirsche and that he thought they were using the claimed breach as an excuse to disappear.

Email to Ian Marshall and Jeff Curtis of Hirsche Private Asset Management Ltd. from DataBreaches.net inquiring about the breach has received no response.

An inquiry to the Information Commissioner’s Office reveals that the ICO was not aware of the breach report/incident.

An inquiry to the the UK’s Financial Conduct Authority asking them if they were aware of the breach and/or if they are investigating received the following response, in part:

We’re unable to disclose any information about any investigations that we may have completed, or may be ongoing about Hirsche Private Asset Management Ltd. We treat all information that we hold as strictly confidential, unless we decide to make a public announcement. For this reason,
I can only provide you with the same information as is published on our website.

So what really happened here, and how many Hirsche Private Asset Management clients may have had their personal and/or financial details or funds stolen? Did Hirsche notify clients individually of the alleged breach or did they just issue a press release?

If you have any additional details on this reported breach or situation, please contact this site at [email protected].  This post will be updated if more information becomes available.

And if anyone from Hirsche Private Asset Management sees this post and would like to respond, please use the email address given above.

 


Related:

  • Revealed: Afghan data breach after MoD official left laptop open on train
  • Canada says hacktivists breached water and energy facilities
  • UK: FCA fines former employee of Virgin Media O2 for data protection breach
  • China Amends Cybersecurity Law and Incident Reporting Regime to Address AI and Infrastructure Risks
  • Alan Turing institute launches new mission to protect UK from cyber-attacks
  • Safaricom-Backed M-TIBA Victim of a Possible Data Breach Affecting Millions of Kenyans
Category: Breach IncidentsFinancial SectorNon-U.S.

Post navigation

← CORRECTED: Missing Riverside County Regional Medical Center laptop may have held data on 7,900 patients (updated)
Ca: Jewish General investigates privacy breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.