DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Hacked in 2022, Dell & Dean law firm first notifying affected clients now

Posted on July 21, 2024 by Dissent

From DataBreaches’ “Now what does THIS mean?” file,  a notification letter from Dell & Dean PLLC, a law firm in New  York.

On July 17, Dell & Dean’s external counsel notified the Maine Attorney General’s Office about a breach in September 2022 that affected 6,803 people. A copy of the firm’s notification letter was appended to the submission, and DataBreaches looked for an explanation of why it took from September 2022 until July 2024 to notify those affected.  The following is from their notification letter:

What Happened? On September 29, 2022, Dell & Dean became aware of a data security incident that impacted its server infrastructure and took its systems offline. We immediately undertook efforts to restore ourservers and undertook additional affirmative steps to safeguard the security of data maintained on it systems. We also simultaneously retained a forensic investigation firm to determine the nature of the security compromise and identify any individuals whose information may have been compromised.

What Information Was Involved? The forensic investigation determined that access to Dell & Dean’s systems occurred on approximately September 28, 2022 through September 29, 2022. The investigation also identified certain files that may have been accessed or acquired in connection with the incident. In continuing its thorough investigation, we undertook a comprehensive manual review process to review these files and identify the specific individuals with personal information contained therein. This comprehensive manual review process concluded on or about May 30, 2024.

This was not a breach affecting millions of people. So why did it take so long for breach review? Were there many scanned files that could not be machine-processed or was there some other explanation for the delay in completing the process? They do not explain. And did the firm post any substitute notice in the interim to alert clients that their information may have been compromised?

Their letter continued (emphasis added by DataBreaches):

In an abundance of caution, Dell & Dean is providing this notification to you as your personal information may have been accessed and/or acquired in connection with the incident, including <><><><>. We have obtained confirmation to the best of our ability that the information is no longer in possession of the third party(ies) associated with this incident, and it is entirely possible that your specific personal information was not compromised as a result of the incident.

Well, there’s that “abundance of caution” claim again that we’ve grown to hate, especially when notification is not optional and was actually required by law. But it was the confirmation statement that really raised questions.

What confirmation did they obtain that the information was no longer in the hands of the third parties and how did they obtain it? Did they pay a ransom demand to have it allegedly deleted? Did law enforcement seize the servers on which their data resided? What is the basis for a statement that may reassure people that they may not be at risk when they really might be at risk?

Dell & Dean did not respond to an inquiry from DataBreaches asking them the basis for that statement, nor did they respond to a question asking them if any protected health information was accessed or acquired during the breach.

The firm offers those affected 12-months of complimentary mitigation services with Equifax, and encourages people to enroll in the service, but will the statements earlier in the letter lead people to think they can just skip the advice?

 

No related posts.

Category: Business SectorCommentaries and AnalysesHackU.S.

Post navigation

← Pro-Russian Hackers Detained in Spain for Cyberattacks on NATO Allies
MNGI Digestive Health joins ranks of “late-notifiers,” finally notifying more than 767,000 patients of breach last summer →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • DOJ investigates ex-ransomware negotiator over extortion kickbacks
  • Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns
  • One in Five Law Firms Hit by Cyberattacks Over Past 12 Months
  • U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware
  • Senator Chides FBI for Weak Advice on Mobile Security
  • Cl0p cybercrime gang’s data exfiltration tool found vulnerable to RCE attacks
  • Kelly Benefits updates its 2024 data breach report: impacts 550,000 customers
  • Qantas customers involved in mammoth data breach
  • CMS Sending Letters to 103,000 Medicare beneficiaries whose info was involved in a Medicare.gov breach.
  • Esse Health provides update about April cyberattack and notifies 263,601 people (1)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Oregon Amends Its Comprehensive Privacy Statute
  • Wisconsin Supreme Court’s Liberal Majority Strikes Down 176-Year-Old Abortion Ban
  • 20 States Sue HHS to Stop Medicaid Data Sharing with ICE
  • Kids are making deepfakes of each other, and laws aren’t keeping up
  • The Trump administration is building a national citizenship data system
  • Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy
  • New Jersey Issues Draft Privacy Regulations: The New

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.