Archive for Lawsuit

Allstate Sued by NY Over Data Breach And Security Lapses 

Posted in Commentary with tags , on March 10, 2025 by itnerd

New York state sued Allstate accusing the insurer’s National General unit of failing to report a data breach that exposed drivers’ license numbers, and lacking reasonable safeguards to protect drivers’ private information. From Reuters:

The lawsuit by New York Attorney General Letitia James was filed in a state court in Manhattan.

James said National General’s poor data security led to back-to-back breaches in 2020 and 2021, when hackers targeting its online auto insurance quoting tools accessed license numbers of more than 165,000 New Yorkers and 199,000 people overall.

National General allegedly did not notify drivers or New York state agencies about the first breach, which occurred between August and November 2020, and needed three months to uncover the much larger second breach in January 2021.

James said National General violated the state’s Stop Hacks and Improve Electronic Data Security Act for failing to protect customer information, and violated state consumer protection laws by misleading customers about its data security practices.

The lawsuit seeks civil fines of $5,000 per violation, plus other remedies.

“National General’s weak cybersecurity emboldened hackers to steal New Yorkers’ personal data, not once but twice,” James said. “It is crucial that companies take cybersecurity seriously to protect consumers from fraud and identity theft.”

Erich Kron, security awareness advocate at cybersecurity company KnowBe4, commented:

“As organizations gather more and more information about individuals, the risk of data breaches continues to grow. For many people it feels as if every week contains some sort of news about a significant data breach, and in many cases these people are getting a bit of breach fatigue. Unfortunately, it seems that the amount of data around each person that is being lost in these breaches continues to grow, so it’s no longer just a name, address, and maybe a credit card number or phone number, but now a lot more personal information is included.

“Insurance organizations are well known for collecting and using credit information to influence rates, and to check credit they need to collect some rather sensitive data such as Social Security numbers. In addition, insurers are asking customers to install telemetry devices in their vehicles, or through their phone apps, to track their location, speed, time of driving, braking and acceleration data, and a laundry list of other bits of data that most people would probably prefer remains private.

“Given the amount of information collected, it is extremely discouraging to see organizations try to cover up breaches or fail to notify victims of breaches in a timely manner. By failing to notify the victims, bad actors can use the stolen data against the customers in a number of ways. One easy way a bad actor could use this against a customer is to contact them while pretending to be from the insurance company, then convincing them that they need to pay a bill, or that their bill has gone up due to their driving behaviors. If the scammer can reference a time and date when that person was actually driving the vehicle, it could have the effect of convincing the victim that this really is the insurance company contacting them, and that they need to pay this additional fee or have their insurance dropped.

“While we still seem to concern ourselves when Social Security numbers and other information like that is stolen, organizations seem not to value this other information in the same way, however it can be used against their customers easily. When a data breach occurs, organizations should contact the victims whose data has been stolen and provide them advice in a timely and actionable way. If

I have one word to say on this.

Good!

The thing is that some companies will only take cybersecurity seriously if the financial penalties and reputational damage are greater than covering up an incident. This is something that is proven to work in the EU. And it’s about time that that this approach is seen here in North America.

HHS Fines Company For Issues That Led Them To Get Pwned In A Ransomware Attack

Posted in Commentary with tags , on February 23, 2024 by itnerd

HHS’s Office for Civil Rights (OCR) has levied a $40,000 fine against Green Ridge Behavioral Health, a MD psychiatric health services provider for HIPPA violations related to a ransomware attack on the company.

Green Ridge experienced a ransomware attack in 2019 that encrypted the healthcare records of some 14,000 patients. Though the company did not pay the ransom and was able to recover their systems from backups, HIPPA’s investigation revealed them to have been well out of compliance with HIPPA regulations.

Green Ridge Behavioral Health failed to:

  • Have in place an accurate and through analysis to determine the potential risks and vulnerabilities to electronic protected health information;
  • Implement security measures to reduce risks and vulnerabilities to a reasonable and appropriate level; and
  • Have sufficient monitoring of its health information systems’ activity to protect against a cyber-attack.

 
Under the terms of the settlement with Greenridge, HHS required the company to:

  • Conduct a comprehensive and thorough analysis of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information;
  • Design a Risk Management Plan to address and mitigate security risks and vulnerabilities found in the Risk Analysis;
  • Review, develop, or revise its written policies and procedures to comply with the HIPAA Rules;
  • Provide workforce training on HIPAA policies and procedures;
  • Conduct an audit of all third-party arrangements to ensure appropriate business associate agreements are in place, where applicable; and
  • Report to OCR when workforce members fail to comply with HIPAA.

This is the second time that OCR has fined a HIPAA regulated company for violations identified during a ransomware investigation.

Steve Hahn, Executive VP, BullWall had this comment:

   “There is a reason HIPPA has strict compliance guidelines and cyber security is supremely important to the security of patient information. Ransomware attacks on medical service providers have become a serious threat to public health and safety. These attacks not only disrupt the delivery of essential medical services, but always compromise the security of sensitive patient information. The impact of these attacks can in fact be devastating, as they can leave medical providers struggling to recover their data and regain control of their systems. In this case, Green Ridge did not pay the ransom, but whether the ransom is paid or not, the costs in dollars and lost patient services severely cripple these already struggling institutions.

   “Hospitals and healthcare organizations are particularly attractive targets for cybercriminals, and their reliance on technology to manage everything from patient records to surgical equipment makes them uniquely vulnerable. It is very encouraging to see OCR enforcing compliance with a cyber security “Best Practices” approach for providers.”

Mark B. Cooper, President & Founder, PKI Solutions follows with this:

   “The fact that this is only the second time OCR has fined a HIPAA company for violations after a cyberattack should be a wake-up call for the Security Teams at every health services provider. Medical records are far more valuable for hackers than credit card numbers or Social Security numbers, so a mindset shift is needed into proactive monitoring and visibility in critical infrastructure protection (CIP) misconfigurations should be a priority and not an afterthought. Invest in proactive monitoring and visibility now or pay later.”

I’m all for punishing companies who don’t have their act together when it comes to security. The fact that this company got pwned, and then got punished for getting pwned should send the message that everyone needs to up their game. Or else.

23andMe Tries To Cover Themselves From Being Sued For Being Pwned By Altering Their Terms Of Service

Posted in Commentary with tags , on December 6, 2023 by itnerd

Hot on the heels of the disclosure of how bad the 23andMe hack was, and the rumblings of lawsuits related to that, it is now coming to light that 23andMe might be trying to blunt any attempts to sue them via a change to their terms of service. This came to my attention via this post on Mastodon. Here’s the relevant part:

So in short, if you don’t send them an email rejecting the change in their terms of service, which you can read here and specifically this part, you will give up the ability to be part of the class action lawsuits that are being filed or take action in court against them. What they’re counting on is that nobody is going to read this in detail and send them an email saying “no I don’t agree to these terms”. Thus limiting their exposure to the class action lawsuits that are likely to be filed. This is pretty sneaky by 23andMe and they need to be called out for this.

While I am not a lawyer, you should email 23andMe and reject this change. Then I would lawyer up for the class action lawsuit that we all know is coming.

dBrand Sues Casetify Over IP Theft Related To dBrand’s Teardown Skins

Posted in Commentary with tags , , on November 23, 2023 by itnerd

For years, dBrand has been selling a coloration with YouTuber JerryRigEverything called the Teardown skin. Basically they are skins that go onto your device that shows what the inside looks like. They are really detailed and cool for those who are into that sort of thing.

However, dBrand is now accusing Casetify of ripping off their work. And they are suing them as a result:

To further illustrate dBrand’s case, JerryRigEverything has posted a video going into a whole lot more detail:

I looked around for some sort of response from Casetify, but I didn’t see one. But what’s curious is that their website is down as I type this:

I wonder if they know that they got seemingly red handed and are currently scrubbing their site to remove any evidence that they ripped off dBrand’s work. Because based on the available evidence, that’s exactly what they have appeared to have done.

And as if to twist the knife some more, dBrand in the last 24 hours or so have released the Dbrand is launching the X-ray skins. These come in two versions, a light and a dark version. And if you buy one, you get the other for free. Crafty.

In the meantime, you have to wonder what is going on at Casetify. This is a classic case of a company self pwning themselves. It will be interesting to see if they are able to get out of this situation without the company being sued into extinction.

Get the popcorn ready.

US Radiology Slapped With $450K Fine For Creating The Conditions To Get Pwned By Ransomware

Posted in Commentary with tags on November 12, 2023 by itnerd

This is something that needs to happen way more often. I’ll explain why in a second. But here’s what happened. The AG of NY State has hit US Radiology with a $450K fine for the following:

In an agreement announced on Wednesday, New York Attorney General Letitia James said US Radiology failed to remediate a vulnerability announced by security company SonicWall in January 2021.

US Radiology used the company’s firewall to protect its network and provide managed services for many of its partner companies, including the Windsong Radiology Group, which has six facilities across Western New York.

The vulnerability highlighted by the attorney general — CVE-2021-20016 — was used by ransomware gangs in several attacks. US Radiology was unable to install the firmware patch for the zero-day because its SonicWall hardware was at an end-of-life stage and was no longer supported. The company planned to replace the hardware in July 2021, but the project was delayed “due to competing priorities and resource restraints.”

The vulnerability was never addressed, and the company was attacked by an unnamed ransomware gang on December 8, 2021.

“Once the threat actor gained access to the VPN, they leveraged 101 additional credentials to access various network data folders over the following week,” New York prosecutors said.

That’s bad. But it gets worse:

“While a subsequent forensic investigation was unable to definitively determine how the threat actor initially obtained credentials to access the SonicWall VPN, the vulnerability identified by the NCC Group in January 2021 could have allowed the threat actor to capture username, password and other session information stored on the SonicWall server through a process known as a SQL injection.”

An investigation determined that the hacker was able to gain access to files that included the names, dates of birth, patient IDs, dates of service, provider names, types of radiology exams, diagnoses and/or health insurance ID numbers of 198,260 patients.

The data exposed during the incident also included driver’s license numbers, passport numbers, and Social Security numbers for 82,478 New Yorkers.

Now for why this needs to happen way more often. If companies know that not patching all the things will lead to you being slapped with a fine from a government organization 100%, you’re going to patch all the things without fail. I guarantee it. Thus I applaud New York Attorney General Letitia James for doing this and other AG’s in other states, not to mention in other places around the world, should follow her lead.

Makers Of MOVEit File Transfer Software Served With Class Action Lawsuit

Posted in Commentary with tags on June 24, 2023 by itnerd

The Clop ransomware gang has been pwning organizations right, left and centre via vulnerabilities in the MOVEit file transfer software. And with the scale of these attacks growing by the day, you knew it was a matter of time to before a lawsuit was filed. And now we have a class action lawsuit:

On June 20, three Louisiana individuals headed up a class-action lawsuit filed in a Massachusetts district court against Progress Software, the Bedford, Massachusetts, makers of the MOVEit file Transfer and Cloud file transfer service that are used by thousands of entities and have been exploited over the past month to compromise an ever-growing list of companies and government agencies.

The plaintiffs represent more than 100 individuals who say Progress Software’s security practices were negligent, resulting in their personal data being exposed and stolen through the hack. The complaint characterizes this information as “a gold mine for data thieves” and the victims are seeking damages in excess of $5 million.

One of the lead plaintiffs, Shavonne Diggs, reportedly received “numerous phishing calls” following the breach from scammers who claimed she had signed up to attend different academic institutions, as well as an unauthorized charge on one of her payment cards.

“Armed with the Private Information accessed in the Data Breach, data thieves can commit a variety of crimes including … opening new financial accounts in Class Members’ names, taking out loans in Class Members’ names, using Class Members’ names to obtain medical services, using Class Members’ information to obtain government benefits, filing fraudulent tax returns using Class Members’ information, obtaining driver’s licenses in Class Members’ names but with another person’s photograph, and giving false information to police during an arrest,” lawyers for the plaintiffs wrote.

The company hasn’t really addressed this lawsuit. Instead they said that they are focused on helping those affected by these attacks. But I think it’s a safe bet that this will never go trial. Instead Progress will likely settle this out of court. Having said this, the repetitional damage to Progress will be huge.

Zoetop Ordered To Pay $1.9M Over Data Breach

Posted in Commentary with tags on October 13, 2022 by itnerd

Zoetop, the parent company behind retailers Romwe and Shein, have been ordered by the State of New York to pay $1.9 million over a data breach which affected millions of customers. Zoetop was found guilty of failing to secure customers’ data, not properly notifying customers and trying to keep the extent of the data leak under wraps. This penalty comes after an investigation by the New York Attorney General into a 2018 cyber attack in which credit card and personal information was stolen.

Before I give my thoughts on this, let’s hear from John Stevenson, Product Director at Cyren on this:

“Testament to the scale of the unsolved nature of social engineering attacks, every single of the millions of victims successfully targeted here now face phishing scams abusing their exposed PII in the pursuit of more valuable credentials. 

It is likely many customers’ credentials have already been sold to the highest bidder and may now be used to target their place of work. However, because employees are so busy, they cannot feasibly be expected to detect all fraudulent emails every time. Therefore, organisations must implement additional layers of technology and processes to continually hunt for targeted email attacks like spear phishing and business email compromise to automatically eliminate the threats once identified. 

A silver lining, however, is that hopefully expensive retributions for such failures to responsibly disclose and appropriately respond to a data breach is a step in the right direction towards creating a culture of compliance.”

My $0.02 worth. I am glad that the State of New York held Zoetop accountable for this and I hope that we see more of this going forward. Because if companies know that if they screw up they will get punished, they will take the steps required to make sure that they don’t get pwned.

If You’re Canadian, You Should Claim Your $20 (Or More) From The $30 Million Optical Disc Drive Class Action Payout

Posted in Commentary with tags , on July 20, 2022 by itnerd

If you’re Canadian, chances are you were not aware of a class action lawsuit regarding optical disc drive (ODD) products purchased in Canada between 2004-2010 in B.C., Ontario and Quebec. In short, a settlement of $29.7 million is available for people in B.C. and Quebec Courts because BenQ, Hitachi-LG, NEC, Panasonic, Phillips, Pioneer, Quanta, Sony, TEAC, and Toshiba Samsung are alleged to have “conspired to fix the prices for ODD, with the intention of raising prices for both ODD and ODD Products sold in Canada.”

So if you purchased a computer or a game console with an optical drive, you are eligible for a $20 payment if you don’t have supporting documents. Or if you do you can get more than that. Though you have to wonder who would still have the receipt from a computer or a Playstation or Xbox that they bought 12 or more years ago. In any case, you can put in a request by going to this website.

Cafe Press Fined $500K For Data Breach

Posted in Commentary with tags on June 27, 2022 by itnerd

This is the sort of story that I like writing about as it illustrates that companies who don’t seriously protect their customer’s data will be held to account. In this case Cafe Press who I’ve written about before has been fined $500,000 for a data breach that affected 23 million customers. You can read about it here, but I’ll hit the highlights for you:

  • Residual Pumpkin and PlanetArt who now own Cafe Press have to implement multi-factor authentication
  • They have to minimize the amount of collected and retained data
  • They have to encrypt all stored Social Security numbers.
  • PlanetArt is being ordered to alert buyers and sellers whose personal info was accessed or stolen during the security breaches and provide them with information on how they can protect themselves

All of this centers around a February 2019 breach of CafePress’ servers where unknown attackers gained access to, stole, and later put up for sale on the dark web personal information belonging to 23,205,290 CafePress users. Then CafePress tried to cover this up until it was reported by Bleeping Computer. And to top it all off, the company knew they had issues but didn’t do anything about it. And they also didn’t investigate any of the attacks. Which makes it pretty clear that dealing with Cafe Press is a bad idea. Though this fine may have them rethink how they handle customer data going forward.

FTC Slaps Twitter With A $150M Fine For Using 2FA Info For Advertising

Posted in Commentary with tags , on May 26, 2022 by itnerd

If you used two factor authentication or 2FA to protect your Twitter account, chances are Twitter used your phone number to target you for advertising. According to court documents, Twitter asked over 140 million users for this information to protect their accounts starting in 2013, but it failed to inform them that the data would also be used to allow advertisers to target them with ads.

This really seems underhanded at first glance.

What’s worse is that this is a direct violation of the FTC act. And even worse than that, it also violates an administrative order between Twitter and the FTC which banned Twitter from misrepresenting its security and privacy practices and profiting from deceptively collected data.

Now that’s truly underhanded.

Twitter has agreed to settle the FTC’s allegations. But the optics of this really suck for Twitter. And they really need to explain why this won’t happen again.