
This Week’s Highlighted Breaches
New breaches added: 78
Minnesota Community Care (third-party Netgain Technology LLC)
BreachIQ score: 10
A ransomware attack against Netgain, an IT service provider for Minnesota Community Care, compromised files containing sensitive personal information on Minnesota Community Care’s patients as they passed through Netgain’s systems. At this point, BreachIQ is tracking 19 organizations which had client information exposed through the Netgain ransomware incident. In ransomware attacks, the goal of the attack is typically to extort the infected organization into paying to regain access to their files. Many ransomware strains also take the encrypted files and send them to the group managing the malware. Exposed data types include Social Security numbers, payment card numbers, driver’s license numbers, contact information, and medical records such as diagnoses, treatment information, and health insurance information.
What should you do? Any time a breach exposes data that is this sensitive, victims should take the time to make sure that they have put essential protections in place across all aspects of their identity. This includes locking or freezing your credit report; using strong authentication on your bank accounts, email, and other important services; and making sure that you have set up alerts for suspicious activity on your accounts.
More information
Mercedes-Benz USA (vendor)
BreachIQ score: 8
An unsecured cloud storage instance at a vendor for Mercedes-Benz exposed sensitive personal information for customers who entered their information on Mercedes-Benz company or dealer websites between 2014 and 2017. In this case, the information contained in the database was not appropriately secured, but it is not clear whether the data was accessed or stolen by any malicious parties. The exposed data types include Social Security numbers, driver’s license numbers, dates of birth, and self-reported credit scores.
What should you do? Since the information stolen in this breach creates a high risk of fraudulently opened credit (loan accounts), safeguards like locking or freezing your credit are the best place to start. If you expect to need to have your credit account unlocked, enrolling in credit monitoring through the provider offered by the breached organization or through a free service can help keep you informed of potentially suspicious changes to your credit report.
More Information
San Juan Regional Medical Center
BreachIQ score: 7
A cyberattack against the San Juan Regional Medical Center allowed the perpetrator to access SJRMC’s network and steal records containing patients’ sensitive personal information. Exposed data types vary by victim, but include Social Security numbers, driver’s license numbers, financial account information, health insurance information, and medical records such as diagnosis and treatment information.
What should you do? Since the information stolen in this breach creates a high risk of fraudulently opened credit (loan accounts), safeguards like locking or freezing your credit are the best place to start. If you expect to need to have your credit account unlocked, enrolling in credit monitoring through the provider offered by the breached organization or through a free service can help keep you informed of potentially suspicious changes to your credit report.
More Information
The Dovel Group, LLC
BreachIQ score: 7
A ransomware attack against The Dovel Group allowed the perpetrator to compromise files containing sensitive personal information for Dovel employees and contractors, as well as their dependents in some cases. Exposed data types include Social Security numbers, driver’s license numbers, financial account information, credit and debit card numbers, and medical insurance information.
What should you do? When credit or debit card data is stolen, you should contact your issuer to determine whether you need a replacement card. Many card issuers also allow you to set up alerts for large or unusual purchases. These alerts can help you quickly identify suspicious activity and notify your bank or credit union of the fraud.