DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Ca: Detour Gold warns former, current employees of data breach

Posted on June 30, 2015 by Dissent

Rachelle Younglai reports:

Detour Gold Corp. is reaching out to former and current employees to tell them that their personal information may have been compromised due to a cyber attack.

Detour, which operates one gold mine in Ontario, did not say when its server was hacked or how many employees have been affected by the security breach.

[…]

As far back as April, the website databreaches.net had warned Detour that its system had been compromised, exposing confidential data such as employees’ social insurance numbers and information on Detour’s deals.

Read more on The Globe and Mail.

The following is the full text of Detour Gold’s press release, which appears on their web site:

TORONTO, ONTARIO–(Marketwired – June 30, 2015) – Detour Gold Corporation (TSX:DGC) (“Detour Gold” or the “Company”) has been the subject of an illegal breach of its IT systems which has resulted in confidential information, including company and personnel information, being accessed and disclosed by hackers.

The Company has determined that the stolen information includes personal information of Detour Gold’s employees (current and former) as well as of individuals to whom Detour Gold made a formal offer of employment.

External and internal IT experts are continuing to assess the risks of further illegal access to Detour Gold’s systems and are taking steps to eliminate such risks. We are also continuing to investigate the source of the breach and are in contact with the police and federal authorities who are assisting the Company. We are also taking steps to reduce the risk of further confidential information being accessed by establishing additional safeguards within our systems. 

Our highest priority, and the primary reason for issuance of this news release, is to help those people whose personal information was compromised to protect themselves against the unauthorized use of their personal information. We are in the process of contacting former employees and individuals who received offers of employment from Detour Gold who may have provided personal information to us in that context. While we are endeavoring to contact all people affected by this, if you fall within one of these groups and have not yet been contacted by Detour Gold, please contact us immediately in order to receive identity theft monitoring services which the Company is making available through a third party service provider. You can reach us via:

Telephone access:

  • Toll-free (North America): 1-855-870-8647
  • Cochrane, Ontario: 647-847-2089, ext. 4367

Email: [email protected]


Related:

  • The 4TB time bomb: when EY's cloud went public (and what it taught us)
  • China Amends Cybersecurity Law and Incident Reporting Regime to Address AI and Infrastructure Risks
  • Alan Turing institute launches new mission to protect UK from cyber-attacks
  • Safaricom-Backed M-TIBA Victim of a Possible Data Breach Affecting Millions of Kenyans
  • How a hacking gang held Italy’s political elites to ransom
  • Predatory Sparrow Strikes: Coordinated Cyberattacks Seek to Cripple Iran's Critical Infrastructure
Category: Business SectorExposureHackNon-U.S.

Post navigation

← JPMorgan Reassigns Security Team Leader a Year After Data Breach
Windows 10 will share your Wi-Fi password with your friends’ friends →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.