DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

The City of Chicago Provides Notice of Jones Day Incident Due to Accellion Hack

Posted on May 7, 2021 by Dissent

CHICAGO, May 7, 2021 /PRNewswire/ — The City of Chicago today announced that a third-party vendor executing a data transfer of a select group of City email files given to the law firm Jones Day as part of an independent inquiry being conducted by the firm became subject to a security breach.  The breach, which at no time involved or impacted the City’s computers or computer systems, involved emails sent or received from four former City employees over a two-year time period.   While the City is not aware of any fraud that might have resulted from this event, it has taken the matter very seriously and responded accordingly.

Upon notification of the breach, the Chicago Department of Assets, Information and Services (AIS) took immediate action, including notifying the FBI, ensuring the removal of the emails from the transfer application used by Jones Day, issuing a citywide notice to alert employees to a phishing scam, and working with Jones Day and others to confirm the nature and scope of the data at issue.  Based on those findings, AIS has taken steps to provide notice to those whose personal information was included in the email files and will offer free credit monitoring services to further protect those impacted by the breach.

As a result of its thorough investigation, the City was able to determine the number of individuals that may have been impacted by the data breach and direct notice was provided to the majority of them.  For the individuals for whom the City did not have direct contact information, substitute notice was provided in the form of a posting on the City’s website and a state-wide media alert.  The City also notified the Illinois Attorney General’s office.

Out of an abundance of caution as explained in the notices, the City is offering affected individuals free credit monitoring for up to 12 months and set up a call center for those individuals who might have any questions.  Additionally, the City is offering those individuals information concerning how to prevent, identify and respond to credit fraud.

SOURCE City of Chicago


In related coverage, the Chicago Tribune reports:

The records were being transferred to the Jones Day law firm, which is handling the investigation into the Anjanette Young errant police raid case. However, it was unclear whether the records or the hack was related to that probe.

Why isn’t it clear if the records were related? The data were dumped. Did the Chicago Tribune search the dump to determine if any of the files concerned that case or investigation?

 

 

Category: Government SectorHackSubcontractorU.S.

Post navigation

← Cyber criminals potentially accessed data of 10,000 people in Brevard School Board breach
FR: Albioma hit by “ransomware type virus” →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • PowerSchool hacker pleads guilty, released on personal recognizance bond
  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon
  • US govt login portal could be one cyberattack away from collapse, say auditors
  • Two Men Sentenced to Prison for Aggravated Identity Theft and Computer Hacking Crimes
  • 100,000 UK taxpayer accounts hit in £47m phishing attack on HMRC

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant
  • US State Dept. says silence or anonymity on social media is suspicious

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.