Data stolen from outsourcing group ExecuPharm published after ransomware attack
Data stolen in a ransomware attack in March from ExecuPharm, an outsourcing company servicing the pharmaceutical industry, has been published online.
The published stolen employee data is said to include Social Security numbers, taxpayer I.D.s, driver’s license numbers, passport numbers, bank account numbers, credit card numbers, national insurance numbers, national ID numbers, IBAN/SWIFT numbers and beneficiary information.
The ransomware attack and subsequent data theft occurred March 13 via a phishing attack. ExecuPharm notified law enforcement authorities April 17 and has retained a cybersecurity firm to investigate the incident.
According to TechCrunch, the stolen data was posted to a dark web site associated with the CLOP ransomware group. In addition to personal information, the published data includes thousands of emails, financial and accounting records as well as user documents and database backups.
Anurag Kahol, chief technology officer at cloud security firm Bitglass Inc., told SiliconANGLE that the attacker’s methods are a growing tactic among ransomware groups, making it more critical for companies to have adequate security tools and controls in place to protect their data.
“The exposure of this sensitive data puts the impacted individuals at risk for identity theft and financial fraud for years to come,” Kahol said. “Consequently, the pharma giant may face costly penalties for violating compliance regulations such as CCPA.’
Chris DeRamus, CTO at cybersecurity firm DivvyCloud Corp., noted that healthcare and pharmaceutical organizations are one of the top targets for cyberattacks, since they house massive troves of personally identifiable information on their patients and customers.
“There are no known decryption tools for CLOP ransomware, making this incident affecting ExecuPharm particularly concerning and further demonstrates the need for organizations to implement a more proactive approach to security and compliance practices,” DeRamus said.
His advice: “To protect customer data, enterprises need to follow the principle of least-privileged access in provisioning identity access management permissions, by providing checks to restrict identities to do no more than they are supposed to, across their systems. Organizations should also implement multifactor authentication for all users, securely manage service accounts and their corresponding keys, and enforce best practices for the use of audit logs and cloud logging roles.”
Image: Pxhere
A message from John Furrier, co-founder of SiliconANGLE:
Your vote of support is important to us and it helps us keep the content FREE.
One click below supports our mission to provide free, deep, and relevant content.
Join our community on YouTube
Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.
THANK YOU