DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

VOXX International notifies employees and dependents enrolled in their health plan of ransomware attack

Posted on October 1, 2020 by Dissent

The following press release was issued September 28 by VOXX. If you or a family member were employed by them years ago, they may not have your current address to notify you of this incident: 

Today, VOXX International Corporation (“VOXX”), a leading manufacturer and distributor of automotive, consumer and biometrics technologies, announced that it has identified and addressed a data security incident.

On July 7, 2020, VOXX identified a security incident that resulted in data on certain devices becoming encrypted by ransomware.  VOXX immediately began to investigate, a cybersecurity firm was engaged, and measures were taken to address the incident and restore operations.   The investigation then determined that in the weeks before encryption of data occurred, there was unauthorized access to files saved to VOXX file servers between June 4, 2020 and July 7, 2020.

VOXX completed a careful review of the file servers on September 1, 2020 and determined that the information on the file servers included information about current and former employees, contractors, as well as the dependents and beneficiaries of current and former employees based in the United States (if they participated in VOXX’s health or other benefit plans) from 2000 through 2020. The information in the files includes names, addresses, email addresses, dates of birth, Social Security numbers, financial account numbers, and/or health insurance information.

VOXX advises its current and former employees and contractors, as well as their dependents and beneficiaries, to remain vigilant for signs of unauthorized activity by reviewing their financial account statements, health insurance statements and explanation of benefits statements.  If they see charges or activity they did not authorize, VOXX suggests that they contact their provider immediately.  VOXX is in the process of providing notice of this incident to current and former employees as well as United States-based participants in VOXX’s benefit plans and offering them a complimentary membership to Experian’s IdentityWorksSM.  Unfortunately, VOXX does not have current addresses for all such individuals.  VOXX encourages anyone who believes that their personal information may have been on VOXX’s servers to visit the website or call the telephone number below for additional information.

VOXX regrets that this occurred and apologizes for any inconvenience. VOXX has already implemented additional measures to enhance the security of its network, including deploying an endpoint threat detection and response tool.

Additional information is available at https://www.voxxintl.com/data–notice or by contacting VOXX’s dedicated call center at 888-974-0048 or +44 (0)203 472 6414 if you are calling from Europe, Monday through Friday, between 8:00am and 5:30pm Eastern Time.

SOURCE VOXX International Corporation

Category: Breach IncidentsBusiness SectorHealth DataMalwareU.S.

Post navigation

← To hunt hackers, FBI works more closely with spy agencies
How a Chinese malware gang defrauded Facebook users of $4 million →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide
  • Russian national and leader of Qakbot malware conspiracy indicted in long-running global ransomware scheme
  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.
Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report