01/19/2020 – 01/25/2020


Check if your account has been compromised on the dark web


Weekly Breach: 01/19/2020 – 01/25/2020

This week, phishing scams cost millions, oversights compromise customer data, and Magecart targets Australian brushfire donors. 

New Albany Airport – New York-based airport authority

Breach: Ransomware attack. A ransomware attack on one of the airport’s MSPs spread to its servers, encrypting backup files, administrative information, and other resources. Fortunately, the malware did not extend to the Albany International Airport or airline computers. However, the company was forced to pay a five-figure ransom to recover their information. The attack’s effectiveness was predicated on the organization’s outdated hardware and lax cybersecurity standards. In response, the New Albany Airport Authority terminated its contract with the MSP and is taking steps to upgrade its defensive posture.

This incident underscores the cascading consequences of a data breach. For the New Albany Airport Authority, they will bear the financial cost of recovery while their MSP will lose an important contract since they failed to protect their customers’ IT. From both directions, it’s clear that data security failure is a deal breaker in today’s digital environment.


Manor Independent School District  – Public school district 

Breach: Phishing scam. Hackers successfully executed a phishing scam against employees, and they used the stolen credentials to siphon $2.3 million from the district. It took three separate transactions to acquire a significant sum, but their efforts were ultimately successful. The lost funds are just the start of an expensive process that will undoubtedly involve updating cybersecurity protocols, implementing employee awareness training, and upgrading IT infrastructure.

While the phishing scam didn’t compromise the district’s data, those implicated in the scheme submitted their account credentials to cybercriminals. They will need to update their account information to ensure its long-term security. At the same time, they should closely monitor their other accounts for unusual or suspicious activity.

PlanetDrugsDirect – Online pharmacy

Breach: Exposed client data. PlanetDrugsDirect sent emails and direct mail to its customers, notifying them of a data breach that compromised customers’ personal health information (PHI). In addition to customer blowback, PlanetDrugsDirect will face intense regulatory scrutiny because of the sensitive nature of the data compromised. Additionally, their response was ambiguous at best, minimizing the company’s ability to begin restoring customer confidence in the wake of the data breach.

According to the company, hackers accessed customers’ names, addresses, email addresses, phone numbers, medical information, and payment information. Those impacted by the breach should notify their financial institutions of the event. PlanetDrugsDirect is asking all customers to closely monitor their bank account and credit account activity. Increased vigilance surrounding online communications is key, as this information is often used to execute phishing scams and other cybercrimes.

City of Corner Brook  – Local municipality

Breach: Unauthorized database access. On four occasions, hackers accessed private information on the city’s website that included peoples’ personally identifiable information. Specifically, the data related to a previous voters’ directory. After identifying the breach, the city brought the entire system offline to prevent further access while officials investigate the nature and scope of the attack.

The data breach included a voters’ list comprised of residents’ names and dates of birth. While the city is designating the information “low risk,” those impacted by the breach should carefully monitor their accounts. Login information that is reused across accounts can be leveraged in phishing scams that can compromise even more critical personal data.

Fresh Film Productions – Advert film production company

Breach: Unsecured database. The production company failed to secure a company database, accidentally sharing their personally identifiable information (PII) online. After learning of the incident, the company immediately secured the database, but the server has been publicly available since 2018 and was accessed by cybercriminals. Most notably, the database contained the personal information of 40 men who participated in a Dove Men Plato ad campaign.

The exposed database included personally identifiable information, including names, addresses, email addresses, telephone numbers, dates of birth, and bank details. Those affected need to notify their financial institutions of the breach and consider enrolling in identity and credit monitoring services to protect their information against additional cybercrimes or fraud attempts.

P&N Bank  – Financial services provider

Breach: Information breach. A third-party partner with P&N Bank was accessed by hackers, compromising the bank’s customer data. The breach occurred during a December server upgrade. In response, P&N shut down the servers to prevent further access or infiltration. Unfortunately, they may not have acted quickly enough, and will now have to manage the trifecta of customer outrage, media scrutiny, and regulatory oversight that’s likely to accompany the event.

Although the bank doesn’t believe that customer data was misused, hackers could have accessed customers’ names, addresses, email addresses, phone numbers, customer numbers, ages, account numbers, and account balances. Those impacted by the breach should carefully monitor their accounts for unusual activity and enrolling in credit or identity monitoring services can ensure that their personal information remains secure.

In Other News:


Magecart Attack Targets Australian Bushfire Donations 

Australia’s bushfire natural disaster is one of the most profound in recent memories, inspiring donors from around the world to contribute resources to the cause. Unfortunately, a legitimate donations site was infected with a Magecart payment-card skimmer that stole donors’ personal information when making an online payment. 

The breach was discovered by security researchers, who declined to identify the specific website impacted by the breach. Payment-card skimming malware is an increasing concern for e-commerce platforms, as it collects users’ most sensitive personal data. In addition, it undermines customer confidence in the online payment process, which could decrease their willingness to spend money online.

In this case, payment-card skimming could cost valuable resources in a dire situation. For all companies relying on e-commerce to drive revenue, it’s a reminder that customer confidence is a crucial component of successful online sales initiatives. 

Two-thirds of UK Healthcare Organizations Breached in 2019 

Healthcare companies store peoples’ most sensitive personal information, and data breaches in the industry are both increasingly prevalent and incredibly expensive. A compromised healthcare record is nearly twice as costly as that of the next highest sector. 

The consequences of this new reality are especially acute in the UK, where two-thirds of healthcare organizations experienced a data breach in 2019. According to a study by Vanson Bourne, nearly half of these incidents were malware-related. At the same time, other factors, including unauthorized data sharing, phishing scams, and noncompliance with data protection policies, also represented serious threats to healthcare data.

Notably, as the industry becomes increasingly tech-driven and comprised of third-party partnerships, these risks will continue to expand. In the year ahead, healthcare organizations around the world will need to reprioritize data security as an added element of quality patient care.

Data Breach Lists by State – There are a lot of U.S. state agencies that publish lists of reported data breaches in their respective states.












New Hampshire

New Jersey

North Carolina

North Dakota


South Carolina






1,806 (2012 – Pesent)

47 (2018 – Pesent)

61 (2007 – Pesent)

5,207 (2014 – Pesent)

223 (2011 – Pesent)

2,653 (2010 – Pesent)

4,487 (2015 – Pesent)

14,298 (2007 – Pesent)

1,695 (2015 – Pesent)

2,786 (2007 – Pesent)

152 (2017 – Pesent)

6,230 (2005 – Pesent)


377 (2015 – Pesent)


536 (2017 – Pesent)

3,244 (2012 – Pesent)

3412 (2015 – Pesent)

166 (2012 – Pesent)

Share this with a friend:

Check if Your Account Has Been Compromised on the Dark Web