DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

VOXX International notifies employees and dependents enrolled in their health plan of ransomware attack

Posted on October 1, 2020 by Dissent

The following press release was issued September 28 by VOXX. If you or a family member were employed by them years ago, they may not have your current address to notify you of this incident: 

Today, VOXX International Corporation (“VOXX”), a leading manufacturer and distributor of automotive, consumer and biometrics technologies, announced that it has identified and addressed a data security incident.

On July 7, 2020, VOXX identified a security incident that resulted in data on certain devices becoming encrypted by ransomware.  VOXX immediately began to investigate, a cybersecurity firm was engaged, and measures were taken to address the incident and restore operations.   The investigation then determined that in the weeks before encryption of data occurred, there was unauthorized access to files saved to VOXX file servers between June 4, 2020 and July 7, 2020.

VOXX completed a careful review of the file servers on September 1, 2020 and determined that the information on the file servers included information about current and former employees, contractors, as well as the dependents and beneficiaries of current and former employees based in the United States (if they participated in VOXX’s health or other benefit plans) from 2000 through 2020. The information in the files includes names, addresses, email addresses, dates of birth, Social Security numbers, financial account numbers, and/or health insurance information.

VOXX advises its current and former employees and contractors, as well as their dependents and beneficiaries, to remain vigilant for signs of unauthorized activity by reviewing their financial account statements, health insurance statements and explanation of benefits statements.  If they see charges or activity they did not authorize, VOXX suggests that they contact their provider immediately.  VOXX is in the process of providing notice of this incident to current and former employees as well as United States-based participants in VOXX’s benefit plans and offering them a complimentary membership to Experian’s IdentityWorksSM.  Unfortunately, VOXX does not have current addresses for all such individuals.  VOXX encourages anyone who believes that their personal information may have been on VOXX’s servers to visit the website or call the telephone number below for additional information.

VOXX regrets that this occurred and apologizes for any inconvenience. VOXX has already implemented additional measures to enhance the security of its network, including deploying an endpoint threat detection and response tool.

Additional information is available at https://www.voxxintl.com/data–notice or by contacting VOXX’s dedicated call center at 888-974-0048 or +44 (0)203 472 6414 if you are calling from Europe, Monday through Friday, between 8:00am and 5:30pm Eastern Time.

SOURCE VOXX International Corporation

No related posts.

Category: Breach IncidentsBusiness SectorHealth DataMalwareU.S.

Post navigation

← To hunt hackers, FBI works more closely with spy agencies
How a Chinese malware gang defrauded Facebook users of $4 million →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Avantic Medical Lab hacked; patient data leaked by Everest Group
  • Integrated Oncology Network victim of phishing attack; multiple locations affected (2)
  • HHS’ Office for Civil Rights Settles HIPAA Privacy and Security Rule Investigation with Deer Oaks Behavioral Health for $225k and a Corrective Action Plan
  • HB1127 Explained: North Dakota’s New InfoSec Requirements for Financial Corporations
  • Credit reports among personal data of 190,000 breached, put for sale on Dark Web; IT vendor fined
  • Five youths arrested on suspicion of phishing
  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
  • Kentfield Hospital victim of cyberattack by World Leaks, patient data involved
  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Google Settles Privacy Class Action Over Period Tracking App
  • ICE Is Searching a Massive Insurance and Medical Bill Database to Find Deportation Targets
  • Franklin, Tennessee Resident Sentenced to 30 Months in Federal Prison on Multiple Cyber Stalking Charges
  • On July 7, Gemini AI will access your WhatsApp and more. Learn how to disable it on Android.
  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.