DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

More than $400,000 stolen from Burlington, Washington city bank account; other accounts compromised (update 1)

Posted on October 13, 2012 by Dissent

Lynsi Burton reports that Burlington, Washington lost $400,000 to hackers who transferred city funds over a two-day period to various accounts around the country. City workers were also notified that their direct deposit bank account information was compromised and that they should cancel or red flag their accounts. The city’s bank account with Bank of America has been frozen, but there’s no indication as to why the fraudulent transfers weren’t detected and blocked sooner than two days. (Note: see update about time-frame, which doesn’t appear to be two-day period).

The news coverage also does not mention that any customer accounts were affected, but in digging into this story a bit more, I found a notice on the city’s Finance Department web site that indicates customers using autopay are also affected:

EMERGENCY ALERT! ATTN: UTILITY CUSTOMERS

It has come to the City’s attention that the City’s Utility Billing Automatic Withdrawal information (for sewer and storm drain charges) has been compromised. If you are enrolled in Autopay, you should assume that your name, bank, bank account number and routing number have been compromised.

ALL AUTOPAY CUSTOMERS SHOULD IMMEDIATELY CONTACT THEIR BANK OR FINANCIAL INSTITUTION.

The City immediately closed the affected bank account and will not be withdrawing the funds owed for your July/August 2012 City of Burlington Utility Bill on October 15, 2012 as previously stated on your bill.

Please make arrangements to do one of the following to pay your bill by October 31, 2012:

1. Use your online bill pay option through your banking institution
2. Pay by check (mail to 833 S Spruce Street, Burlington, WA 98233)
3. Call 360-755-0531 and pay with a VISA , MasterCard or Discover credit or debit card

WE APOLOGIZE FOR THE INCONVENIENCE!

Bryan Harrison, City Administrator

Update 1 (Oct. 14): In coverage today, AP reports that the transfers occurred between Tuesday night and Wednesday morning, so that’s not as bad as the two-day impression previous coverage suggested.


Related:

  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Hotel and Casino near Las Vegas Strip suffers data breach, documents say
  • Bombay High Court Orders Department of Telecommunications to Block Medusa Accounts After Generali Insurance Data Breach
  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
Category: Breach IncidentsGovernment SectorHackU.S.

Post navigation

← AMC Personal Employees’ Information Mishandled, AMC reports breach
NZ: Personal info on children, beneficiaries and contractors of Ministry of Social Development found on kiosk computers →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.