Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Personal Data Of 77,000 At Risk As Data Is Lost In Alaska

PricewaterhouseCoopers under the gun as state government seeks records lost in legal case

A snafu in an Alaska legal case appears to have resulted in the loss of records containing personal information of more than 77,000 Alaskans, according to news reports.

Alaska Attorney General Dan Sullivan announced Thursday that there has been a "massive security breach" reaching the highest levels of state government, according to reports by KTUU, a local NBC TV news affiliate.

While current and former state employees are calling to find out if their data is among the records lost, neither the state government nor the contractor that held the records -- PricewaterhouseCoopers -- knows where the data went, the reports say.

Among those at risk are Sullivan himself, as well as Alaska governor Sean Parnell and more than 77,000 other Alaskans who were participants in the Public Employees' Retirement System and the Teachers' Retirement System in 2003 and 2004, KTUU reports.

"In this case the information that we're concerned of is names, dates of birth, and social security numbers," Sullivan said.

In the process of an ongoing lawsuit against the state's former actuary, Mercer, a law firm turned over the personal information to the state's financial experts, PricewaterhouseCoopers, a private firm that was evaluating the list as part of the lawsuit, KTUU reports.

In early December, PricewaterhouseCoopers realized the names and numbers could not be found, the report says. But it wasn't until last week that it told the state there might be a problem.

"Well, let's just say when I heard about it and understood when they originally knew about it, that it wasn't -- we weren't pleased, and the initial phone call from me to senior officials at PricewaterhouseCoopers wasn't very pleasant," Sullivan told KTUU.

There's no evidence of any identity theft, the report says, but the state does not know who, if anyone, has the information.

"To be honest we're hoping that the firm that misplaced this finds it," Sullivan told KTUU.

In the meantime, the attorney general and PricewaterhouseCoopers have reached a settlement. The firm will pay for identity theft protection and credit monitoring for each of the 77,000 Alaskans who are potentially affected by the failure.

Charles Gerdts, general counsel for PricewaterhouseCoopers, released a statement, saying, "The firm regrets that the information was misplaced while under our control, and has made a significant commitment in reaching this resolution expeditiously."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
News
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
News
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Tell him only Kevin Mitnick and the President know the launch codes.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31607
PUBLISHED: 2021-04-23
In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the snapper.diff function...
CVE-2021-31597
PUBLISHED: 2021-04-23
The xmlhttprequest-ssl package before 1.6.1 for Node.js disables SSL certificate validation by default, because rejectUnauthorized (when the property exists but is undefined) is considered to be false within the https.request function of Node.js. In other words, no certificate is ever rejected.
CVE-2021-2296
PUBLISHED: 2021-04-22
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromi...
CVE-2021-2297
PUBLISHED: 2021-04-22
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromi...
CVE-2021-2298
PUBLISHED: 2021-04-22
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attac...