DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

MKS Instruments’ breach notification includes a surprising statement to reassure those affected

Posted on February 16, 2023 by Dissent

Well, this is a bit different.

On February 13, MKS Instruments in Massachusetts (the U.S. parent company of the MKS and Atotech group of companies) became aware of a ransomware event. By February 16, they issued a notification letter to former and current employees who may have been affected.

Their notification informed employees that,  “While exfiltration of personal employee data has not been confirmed, we cannot rule it out and thus are providing notice.”

(That’s not the different part. Stay with me….)

After noting that they could not rule out whether personal employee data had been exfiltrated, they wrote,

Our understanding is that, in similar prior cases affecting other companies, ransomware actors have appeared to refrain from using personal data against individuals.

Somewhat surprised to read that, especially since some threat actors have reached out to employees, students, or patients in other cases to try to extort them, DataBreaches posted a question on Infosec.Exchange asking whether anyone had ever seen an assurance like that in a breach notification letter.

The wholly unscientific query produced no “yes” responses and a few “no’s.”

In any event, MKS writes that the types of personal data that may have been involved,
“where collection of such personal data is permitted by local law,”  included:

Name, contact information, address, government ID numbers (including Social Security Number in the U.S.), work login credentials/passwords, marital status, veteran status, nationality, immigration status, race, religious beliefs (where MKS is required by law to collect), education, employment history, date of birth, gender, sexual orientation, bank account information, payment card information, information about compensation and equity, information about job position and time/hours worked, information about disabilities, health and medical conditions, employer union, health insurance information, basic information regarding your partner, children and emergency contacts (such as name, age, and contact details), if applicable.

That’s a lot of personal information and hopefully, MKS is pursuing trying to determine if data were actually exfiltrated. They are offering those being notified identity monitoring for 2 years.

The notification does not indicate how many people have been notified or whether HHS has been notified. Nor does the letter provide any details on the ransomware incident such as what type of ransomware or whether there was any negotiation with any ransomware group.

Their full notification can be read on the Montana Attorney General’s website.  For a report on some of the breach’s impact on its customers, see this news article on Bloomberg.

MKS’s website currently displays a message, “Unfortunately, www.mks.com is experiencing an unscheduled outage. Please check back again at a later time.”

DataBreaches has submitted an email to their worldwide email address to ask about the type of ransomware and how many people are being notified. The email also asks for the source of their understanding that criminals refrain from misusing the personal information of employees.


Link to Bloomberg article, “Applied Materials’ Sales Shortfall Linked to Cyberattack at MKS,” added post-publication.

Update: Katie Coleman from communications firm Kekst CNC responded to the email inquiry, “The 8-K currently includes all the information we have to share publicly at this point.”


Related:

  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
Category: Breach IncidentsBusiness SectorHealth DataMalwareU.S.

Post navigation

← Update: Wawasee Community School Corporation victim of BlackCat attack
Norway finds a way to recover crypto North Korea pinched in Axie heist →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.