Connex, one of Connecticut’s largest credit unions is warning tens of thousands of members that unknown attackers had stolen their personal and financial information after breaching its systems in early June. The info that was swiped included names, account numbers, debit card information, Social Security numbers, and/or other government ID used to open the individual’s account.
Roger Grimes, Data-Driven Defense Evangelist at KnowBe4:
“It does seem longish that the credit union waited over a month to notify impacted victims. Maybe it took them two weeks to figure out who exactly was impacted, but it sounds like they identified who was personally impacted and then still waited another two weeks to notify the victims. That’s two weeks that hackers and scammers could have been using the stolen information to better leverage spear phishing attacks against selected victims.”
Paul Bischoff, Consumer Privacy Advocate at Comparitech:
“Data breach victims should take advantage of the free credit monitoring offered by Connex to protect themselves from fraud and identity theft. Don’t get complacent because there’s “no evidence” of misuse. Connex doesn’t have the means to verify if your personal information is being abused. Assume the worst and keep a close eye on your accounts.”
Chris Hauk, Consumer Privacy Champion at Pixel Privacy:
“It seems like we see data breaches on a weekly, if not daily, basis. This data breach appears to have served up quite the buffet of personal and financial information for the bad guys, including the ever popular Social Security Number and debit card number Daily Double. This information can be used to open accounts in victims’ names, so affected members need to stay a
It sucks to be Connex as they are the latest company to be the victim of a threat actor. It will be interesting to see who claims responsibility for this and what secondary attacks happen with the data that was stolen.
Over 29,000 Unpatched Exchange Servers Could Be The Targets Of Threat Actors
Posted in Commentary with tags CISA, Microsoft on August 11, 2025 by itnerdOver 29,000 Exchange servers exposed online remain unpatched against a high-severity vulnerability that can let attackers move laterally in Microsoft cloud environments, potentially leading to complete domain compromise.
Commenting on this is Martin Jartelius, CTO at Outpost24:
“The scale of unpatched Exchange servers is concerning, but not surprising. Initial guidance on this flaw included isolating end-of-life and end-of-support systems, and many organizations were already running far older, unmaintainable infrastructure before April’s patch was released.
This vulnerability affects hybrid environments. Many cloud-first businesses have already moved to Microsoft 365, and without deeper analysis it’s unclear how many of these identified servers are truly at risk. Some may determine the conditions for exploitation don’t exist in their setup and choose not to prioritize mitigation.
However, even if the exploitation risk is low, leaving a known vulnerability unpatched is an open invitation to attackers. We advise organizations to continuously assess and remediate such issues to reduce their attack surface and strengthen resilience.”
The CISA has a directive about this issue that you can find here. There’s also an interactive map here. And if you run a Microsoft Exchange hybrid-joined environment, you should follow the guidance in the CISA directive ASAP.
Leave a comment »