— The list of entities reporting that employee W-2 data was acquired by phishing.–
Last year, this site compiled 145 W-2 phishing incidents before I somewhat waved a white flag in terms of trying to keep up, but as I started working on this year’s list, I found even more cases from 2016, bringing the 2016 list to 175 reports.
Let’s see how 2017 goes. Expect reports to come in over the next months (not weeks, but months, and perhaps throughout the year). Here’s the list I’ve got so far for 2017, and it will be updated as I become aware of new incidents. Steve Ragan of Salted Hash has indicated that he will keep track, too, so do check his space also for additional information. As of March 13, Steve estimates 120,000 affected for the 110 incidents we had as of that date.
Note: DataBreaches.net would like to thank the Identity Theft Resource Center and Doug Levin, who both have also been helping find and track these incidents.
- Dracut Schools [662 (FOIA response)]
- Tipton County Schools
- Odessa School District [“hundreds of employees”]
- Campbell County Health [1,400]
- Marin Software
- UGI Utilities [1,900]
- Sunrun [a “a substantial portion” of 4,000 employees]
- Lexington School District Two (SC)
- Mercedes Independent School District (TX) [950]
- eHealthInsurance (eHealth, Inc.)
- Kuhana Associates
- Point Coupee Hospital [200]
- Morton School District (IL)
- Scotty’s Brewhouse (IN) [4,000]
- Mitchell Gold + Bob Williams [1,100]
- Persante Health Care
- TransPerfect Global
- Davidson County Schools (NC)
- Belton Independent School District (TX) [1,700]
- Argyle School District (TX)
- Renovate America (CA)
- Manatee County School District [7,900]
- Anchor Packaging
- Distribution International
- Sky Climber, LLC
- College of Southern Idaho [2500]
- West Michigan Whitecaps [230]
- Adventist Health Tehachapi Valley [Updated to 253]
- Verc Enterprises, Inc.
- Monarch Beverage (IN)
- Corsicana Independent School District
- Alton Steel [300]
- Mohave Community College
- City of Twinsburg, Ohio [500]
- Showpay, LLC
- SouthEast Alaska Regional Health Consortium
- Land Title Guarantee Company
- AmTote Intl [350]
- Sweeney Drywall Finishes Corp.
- Mercer County Schools (WVa) [1800]
- Patrick Industries [4,700]
- Bloomington Public Schools (MN) [1800]
- NEO Tech
- Petro 49
- Klondex Gold & Silver Mining
- Frosch International Travel
- Citizens Memorial Hospital
- Driveline Retail
- Northwestern College (IA)
- Asbury Communities [3,000]
- TrustComm, Inc.
- Verato, Inc. (data were in “encrypted” format)
- TrueNet Communications [506]
- Pacific Biosciences (corrected)
- Bentley Truck Services
- Tate Access Floors [7]
- Accolade, Inc.
- ABNB Federal Credit Union (got 2015 data, but not requested 2016 data)
- MBA Consulting Services [2015 data]
- Goode Compliance International (? )
- Vecellio Group
- Astadia, Inc.
- Ashland University
- Maxor National Pharmacy Services
- Virginian Wesleyan College
- Amplify Education
- Black River Falls School District [478]
- Trenton R-9 School District [260]
- Barron Area School District [431]
- American Senior Communities* (IN) [“more than 17,000”]
- Crotched Mountain Foundation [~1000]
- Mount Healthy City Schools [600]
- Meridian Health Services [1200]
- Viskase Companies, Inc. [590]
- InterMountain Management, LLC
- Cayan
- LEAF Commercial Capital, Inc.
- Gardiner & Appel (Phishing?)
- North Carolina Symphony [262]
- Ellwood Thompson’s Local Market [360]
- Civitas Media
- San Antonio Symphony [250]
- Abernathy Independent School District
- The Amalgamated Sugar Company, LLC [2,858]
- Tab Products Co., LLC
- Vintage Realty Company (2015 and 2016)
- Redmond School District [~1000]
- North Ridgeville Beckett Air [~200]
- Independence School District
- Wisenbaker Building Services
- Autoneum North America Inc. [2,400]
- Northeast Ohio Regional Sewer District** [~900]
- MetWest Terra Hospitality
- Yukon Public Schools
- Allied Minds, LLC
- Aero Air
- Groton Public Schools [1300]
- MAM Software [81]
- Tyler Independent School District
- Glastonbury Public Schools [1600]
- Equian LLC (and subsidiaries, Nurse Audit LLC)
- Weidenhammer [~180]
- Alabama State Port Authority [780]
- Joseph-Beth
- ProScan Imaging, LLC
- PCA Skin
- Ark City School District – USD 470
- Berkley Mid-Atlantic Group
- Dawson
- BBB Industries, LLC***
- Geokinetics
- ADF International
- Dairy Management, Inc ? (sent inquiry as to W-2 phishing)
- QualiChem, Inc [84]
- Toscano Clements Taylor [36]
- Ben Bolt Independent School District [150]
- Arkansas City USD 470 [“dozens,” but not all]
- NSC Technologies, LLC
- City of San Marcos [803]
- Colorado Nonprofit Development Center
- Defense Point Security, LLC
- SolutionsIQ, Inc.
- Biomedical Systems Corp.
- American Tire Distributors
- J.N. Phillips Company (and subsidiaries Windshield Centers LLC and Strategic Claim Services, Inc.)
- Palm Bay International
- Powhatan County Public Schools [905]
- Coupa [625]
- Walton School District [30]
- Schurman Retail Group
- Kettle Cuisine [351]
- Federal Process Corporation (.docx file)
- Temptronic Corp (subsidiary of inTEST)
- inMoment, Inc.
- AmQuip Crane Rental, LLC
- netPolarity, Inc.
- Araca Group
- Mollie Stone’s Markets
- Ameriflight, LLC
- Great Falls Holdings
- Spaulding Youth Center
- Envelopes Unlimited
- Sarnova, Inc.
- TriTech Software Systems
- Berg, LLC
- Westminster College (MO)
- Dutchland Plastics (424)
- Dental Services Group
- Solera Holdings
- CFG Community Bank
- National Safety Council
- TIC Gums, Inc. and Specialty Blends, Inc. [got 2015 and 2016 data]
- LookingGlass Cyber Solutions Inc.
- Taconic Biosciences, Inc.
- Huckstep Holdings Corp. (d/b/a TechWise)
- Bostwick Laboratories
- Merchant Metals, Inc.
- The Grove, Inc. (TGI)
- CapTech
- Jenner & Block LLP
- ABS Associates
- Shulman Rogers
- Teletrac Navman
- GKIC
- Biothera Pharmaceuticals
- Atlas Container
- MGH, Inc.
- Neosho County Community College
- Atlantic Coast Mortgage, LLC (W-2’s and 1095-C’s)
- Clean Advantage and Advantage Waste
- AmTote International
- Monoflo International
- Pro-Vigil
- Frost & Sullivan
- INSYS Group
- Peak Alarm Company
- Columbia Association
- Medical Depot, Inc.
- E.T. Rockville, E.T. Staffing, & E.T. Holdings [360]
- Kettle Cuisine [351]
- Vectorworks
- American Pest (2015 and 2016 data)
- Mary T. Inc. (MTI)
- San Diego Christian College
- Colony American Finance, LLC
- TransCen
- Calmark Group (2015 data)
- Cross Street Partners
- IntelePeer Holdings
- C.A. Short
- Intact Technology
- B.C. Ziegler and Company [145]****
- Alignstaffing and RehabPlus Staffing Group, Inc.
- Toole Design Group
- The Connections Therapy Center
- Community Assistance Network
- National Older Worker Career Center (2015 and 2016 data)
- Aisthesis
- GetWellNetwork
- VT Industries Vertical Bridge*****
- DiCentral Corporation
- Pacific Quest
- Paratransit
- Pacific Science Center
- Quatro Composites (290)
NOTES:
* Unnamed payroll processor fell for phish.
** Two employees separately fell for the phish and sent out W-2 data.
*** Note: this is NOT “the Better Business Bureau”
**** Although the file with W-2 information was sent, it was password-protected.
***** Employee had recently received training in recognizing phishing attempts
Distribution International
https://dojmt.gov/wp-content/uploads/Distribution-International.pdf
Yep, that goes on the list. Thanks, Karen!
I had a call from someone posing to work for Walgreens said that he didnt work in the store was a floater wanted to change my prescription refills from 30 to 90 days got really bad with all the hacking I had that month in November, had to get rid of my email, contacts and grandchildrens pics and facebook. Gave the info to Walgreens as I felt there was a person standing by the register doing something with his “phone” watching everyone as they were in line. When I left the store, reporting the incident that happened on the phone I notified corporate. They never got back to me although I opened a case, called three times. Of course it may be an inside job, I believe it is, have all the info as I document heavily. So sad to see whats happening to my childrens world, I dont have an email any more by choice
AmTote International
http://www.doj.nh.gov/consumer/security-breaches/documents/amtote-20170206.pdf
Yes, saw that one and a few others on NH’s site today and added them. Thanks, though!
I think I have found a few others, as I have been tracking security issues related to K-12 school districts specifically. Running list at: https://www.edtechstrategies.com/blog/irs-phishing/
Thanks, Doug. I checked your list.
There are three that you list that I didn’t have on mine. One is from today: Bloomington, which I hadn’t picked up yet – thanks!
But the other two you list that I don’t have are not from 2017. They were both last year: the Olympia School District one and the Maine school one (Brunswick).
So my count for k-12 schools is now at 13 for this year so far.
Please do let me know if you find others that you think I’ve missed. I appreciate all help.
Citizens Memorial Hospital??
Yes. I added them earlier today. Did you read the linked article? Why the “??” in your comment?
It hadn’t yet been added to the phishing list when I first saw it.
I’d also like to give a shout out to the Montana AG’s office for their updated listings – great new source for breaches!
Ah, now I understand. Yeah, I check Montana’s list every day… and the other state lists that I know about. If you see something in a media report that I might miss, do let me know.
San Antonio Symphony
http://www.expressnews.com/business/local/article/Data-breach-hits-San-Antonio-Symphony-employees-10931740.php
Thanks. I thought I had the S.A. Symphony on the list already but just double-checked and it wasn’t.
Amalgamated Sugar
http://www.kivitv.com/news/amalgamated-sugar-suffers-cyber-security-breach-workers-personal-info-stolen-in-phishing-attack
Yeah, I had picked that one up, too.
Was just totalling what we’ve got so far for where we do have numbers (which is less than half of the incidents). Already more than 57,000 affected.
Tab Products Co.
http://www.doj.nh.gov/consumer/security-breaches/documents/tab-20170210.pdf
Please know that I am just trying to lend an ear (eye?) to finding all of these crazy breaches.
K
Much appreciated!
Thank you so much for adding links to breaches #51 – #58! I was having difficulty trying to find sources for those…
K
I had gotten them through FOIA. Just needed to find time to upload them. The MBA one is too big to upload thru WP, and was too lazy to do it another way yet. 🙂
I’ve been doing FOIA requests too – I’ll keep you posted. I just did a request for New York –
Great!