DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Greenbay employees have bank accounts raided after unpatched server hacked

Posted on January 23, 2018 by Dissent

Fox11 reports a hacking incident in GreenBay, but won’t name the company:

Police are investigating after a local business’s computer network was hacked and money and information were stolen.

Police did not identify the business.

Officers say the hackers used a known vulnerability to get into the company’s computer system. The hackers stole personal information from human resources files, then used that to steal what police call “significant amounts” of money from several people.

Read more on WLUK.

WBAY provides more detail about what happened to the “large local” business that has its own IT team. According to WBAY,  employees were robbed of potentially several hundred thousand dollars after attackers were able to acquire bank routing numbers.

WBAY did not report the type of software involved, but noted that it was a public-facing server and a patch had been available since October, 2017.

Read more on WBAY.  And if any whistleblowers want to contact me to discuss this one more:  [email protected] for XMPP, or contact me and I’ll give you my number on Signal.


Related:

  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • Canada says hacktivists breached water and energy facilities
  • UK: FCA fines former employee of Virgin Media O2 for data protection breach
  • The 4TB time bomb: when EY's cloud went public (and what it taught us)
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • How a hacking gang held Italy’s political elites to ransom
Category: Business SectorHackU.S.

Post navigation

← Police probing Bell Canada data breach; up to 100,000 customers affected
MS: Fast Response by Singing River Health System May Have Averted Major PHI Hack →

4 thoughts on “Greenbay employees have bank accounts raided after unpatched server hacked”

  1. Anonymous says:
    January 24, 2018 at 11:11 am

    I would like to know what company this is, especially if this hack would involve my account!

    1. Dissent says:
      January 24, 2018 at 11:48 am

      I would expect that you would be/will be notified if your account was involved, but in the meantime, it can’t hurt to check your bank balance daily in case there’s some abnormal activity.

  2. Anonymous says:
    January 26, 2018 at 1:50 pm

    Was Bellin Health

    1. Dissent says:
      January 26, 2018 at 2:08 pm

      Do you have any proof of that? I’ve just sent them an inquiry.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals
  • Gates Down: Third Circuit Says Breaking Employer Computer Access Policies Is Not Hacking
  • Short-term renewal of cyber information sharing law appears in bill to end shutdown
  • Yanluowang ransomware IAB pleads guilty
  • Lawsuit Alleges Ex-Intel Employee Hid 18,000 Sensitive Documents Prior to Leaving the Company
  • HIPAA, but for non-Covered Entities?
  • Manassas City Public Schools close on Monday due to cyberattack

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map
  • EPIC Publishes New Whitepaper Detailing Privacy Risks of Government Data Mining Programs
  • Modern cars are spying on you. Here’s what you can do about it.

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.