Sergiu Gatlan reports: The Vermont Department of Taxes today disclosed that taxpayers’ private information was exposed because of a security issue affecting its online filing site discovered on July 2, 2020. The data breach affected all Vermonters who electronically filed Property Transfer Tax returns using the tax department’s site between February 2017 and July 2020….
Category: Government Sector
White House Tells EPIC to Delete COVID-19 Records, EPIC Declines
I usually post items from EPIC.org over on PogoWasRight.org, but this one gets posted as a government breach on this site, too. In an unusual development, the White House directed EPIC this week to delete a set of records that EPIC recently obtained from the Office of Science & Technology Policy—a request which EPIC declined….
Keizer discloses costs of recovering from recent ransomware attack
When Keizer, Oregon was attacked in June with ransomware, the attackers demanded $48,000, and the city paid. Now Keizer Times reports that the costs of recovering city data and preventing future digital strikes have already exceeded $60,000. Among the costs, which will be detailed more at a later date: — To handle negotiations with the…
TX: County judge: Public’s info compromised in REvil cyberattack
Megan Gray-Hatfield reports: A cyberattack on the Cooke County Sheriff’s Office compromised people’s personal information, County Judge Jason Brinkley said. A press release issued Monday, July 20, states a ransomware attack on the county’s information system for the CCSO on July 4 resulted in a data breach of personal identification information. Read more on Gainesville…
Arkansas state vendor sued over data breach
Stephen Steed reports: A lawsuit filed Thursday in Pulaski County Circuit Court says the security breach of a new state computer program this spring led to identity theft of those seeking to apply for unemployment compensation benefits. The lawsuit claims that Protech Solutions of Little Rock, which was hired by the state to develop the…
Iranian Spies Accidentally Leaked Videos of Themselves Hacking
Andy Greenberg reports: WHEN SECURITY RESEARCHERS piece together the blow-by-blow of a state-sponsored hacking operation, they’re usually following a thin trail of malicious code samples, network logs, and connections to faraway servers. That detective work gets significantly easier when hackers record what they’re doing and upload the video to an unprotected server on the open internet….