DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

VOXX International notifies employees and dependents enrolled in their health plan of ransomware attack

Posted on October 1, 2020 by Dissent

The following press release was issued September 28 by VOXX. If you or a family member were employed by them years ago, they may not have your current address to notify you of this incident: 

Today, VOXX International Corporation (“VOXX”), a leading manufacturer and distributor of automotive, consumer and biometrics technologies, announced that it has identified and addressed a data security incident.

On July 7, 2020, VOXX identified a security incident that resulted in data on certain devices becoming encrypted by ransomware.  VOXX immediately began to investigate, a cybersecurity firm was engaged, and measures were taken to address the incident and restore operations.   The investigation then determined that in the weeks before encryption of data occurred, there was unauthorized access to files saved to VOXX file servers between June 4, 2020 and July 7, 2020.

VOXX completed a careful review of the file servers on September 1, 2020 and determined that the information on the file servers included information about current and former employees, contractors, as well as the dependents and beneficiaries of current and former employees based in the United States (if they participated in VOXX’s health or other benefit plans) from 2000 through 2020. The information in the files includes names, addresses, email addresses, dates of birth, Social Security numbers, financial account numbers, and/or health insurance information.

VOXX advises its current and former employees and contractors, as well as their dependents and beneficiaries, to remain vigilant for signs of unauthorized activity by reviewing their financial account statements, health insurance statements and explanation of benefits statements.  If they see charges or activity they did not authorize, VOXX suggests that they contact their provider immediately.  VOXX is in the process of providing notice of this incident to current and former employees as well as United States-based participants in VOXX’s benefit plans and offering them a complimentary membership to Experian’s IdentityWorksSM.  Unfortunately, VOXX does not have current addresses for all such individuals.  VOXX encourages anyone who believes that their personal information may have been on VOXX’s servers to visit the website or call the telephone number below for additional information.

VOXX regrets that this occurred and apologizes for any inconvenience. VOXX has already implemented additional measures to enhance the security of its network, including deploying an endpoint threat detection and response tool.

Additional information is available at https://www.voxxintl.com/data–notice or by contacting VOXX’s dedicated call center at 888-974-0048 or +44 (0)203 472 6414 if you are calling from Europe, Monday through Friday, between 8:00am and 5:30pm Eastern Time.

SOURCE VOXX International Corporation

Category: Breach IncidentsBusiness SectorHealth DataMalwareU.S.

Post navigation

← To hunt hackers, FBI works more closely with spy agencies
How a Chinese malware gang defrauded Facebook users of $4 million →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says
  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach
  • HHS Office for Civil Rights Settles HIPAA Cybersecurity Investigation with Vision Upright MRI
  • Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins
  • RIBridges firewall worked. But forensic report says hundreds of alarms went unnoticed by Deloitte.
  • Chinese Hackers Hit Drone Sector in Supply Chain Attacks

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.