Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

8/22/2011
01:16 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Identity Finder Locates 300K Compromised Names/SSNs Of Workers Comp Applicants

Security researchers at Identity Finder discovered several gigabytes of .dbf, .xls, .cdx, and .pdf files containing confidential information

NEW YORK and SEAL BEACH, CA August 22, 2011 Identity Finder, LLC (www.identityfinder.com), a global leader in identity theft prevention and data loss protection (DLP), discovered that a website exposed documents containing hundreds of individuals health information and database files containing approximately 300,000 names and social security numbers of California residents who applied for workers' compensation benefits. Identity Finder notified the websites owners, Southern California Medical-Legal Consultants, Inc. (SCMLC), of the breach on May 11, 2011 and SCMLC restricted access to all files within minutes of notification.

Identity Finder is in a race against identity thieves, said Todd Feinman, CEO of Identity Finder. If we dont help companies discover exposed data, thieves will find them first and harvest social security numbers for illicit use or trade the knowledge of their existence so others can steal them.

The risk to victims is far lower than it could have been thanks to Identity Finders discovery and SCMLCs remediation. Recent trends show that when unethical hacking groups find personal information, they are now more commonly posting that information to the internet for everyone to see and potentially download for identity fraud.

Security researchers at Identity Finder discovered several gigabytes of .dbf, .xls, .cdx, and .pdf files containing confidential information by using the Identity Finder DLP enterprise software and manually searching internet search engines for common keywords. The files were neither encrypted nor password-protected and some were cached by at least one major search engine. Identity Finder subsequently worked with Google to clear search engine caches and provided SCMLC with a comprehensive report generated by Identity Finder DLP software. SCMLC launched its own internal investigation and issued a press release.

Identity Finder analyzed the data using their sensitive data discovery software that automatically finds health records, social security numbers, and other types of confidential information. It found that the data contained patients confidential health records and other personal details. The largest cache of personally identifiable information included approximately 300,000 Social Security Numbers belonging to workers compensation benefits applicants. A detailed analysis of the data was provided to SCMLC in the Identity Finder DLP Report and a summary of statistics is below:

3,875 uncompressed files contained personally identifiable information 311,778 unique Social Security Numbers 33,146 non-unique Dates of Birth 76,848 non-unique Phone Numbers 39,669 non-unique Postal Addresses Businesses that store any sensitive information should be using DLP software to find and protect data-at-rest, said Feinman. By combining business processes with technology such as Identity Finder, companies can prevent or minimize data breaches.

About Identity Finder The companys technology provides users the ability to prevent identity theft and data leakage by searching and securing sensitive data that could be used to commit identity fraud. They have quickly grown to become a leader in identity protection and Data Loss Prevention (DLP) by helping millions of consumers, small businesses, and enterprises across the world.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15596
PUBLISHED: 2020-08-12
The ALPS ALPINE touchpad driver before 8.2206.1717.634, as used on various Dell, HP, and Lenovo laptops, allows attackers to conduct Path Disclosure attacks via a "fake" DLL file.
CVE-2020-15868
PUBLISHED: 2020-08-12
Sonatype Nexus Repository Manager OSS/Pro before 3.26.0 has Incorrect Access Control.
CVE-2020-17362
PUBLISHED: 2020-08-12
search.php in the Nova Lite theme before 1.3.9 for WordPress allows Reflected XSS.
CVE-2020-17449
PUBLISHED: 2020-08-12
PHP-Fusion 9.03 allows XSS via the error_log file.
CVE-2020-17450
PUBLISHED: 2020-08-12
PHP-Fusion 9.03 allows XSS on the preview page.