Mississippi electric utility warns 20,000 residents of data breach

Avatar

An electric utility serving multiple counties in Mississippi was attacked by cybercriminals last summer in an incident that exposed the information of more than 20,000 residents.

The Yazoo Valley Electric Power Association initially warned customers through social media on August 26 that, due to software problems, they were unable to process payments. The system was restored by August 30.

In breach notification letters filed with regulators last week, the utility confirmed it discovered “suspicious activity” on August 26 and initiated an investigation. 

“A thorough investigation determined that an unauthorized actor accessed certain files on our network. We then conducted a thorough review of the potentially impacted data to determine the types of information contained therein and to whom the information related,” the organization said. It provides power to six counties along the Mississippi River and Louisiana border. 

The organization completed its review on October 24, determining “limited” amount of personal information was accessed and then “worked to obtain address information for potentially affected individuals” until December 20.

The organization redacted what information was stolen by the hackers beyond the names of customers. Yazoo Valley Electric Power Association did not respond to requests for comment. The 20,997 victims are being offered one year of identity protection services. 

Nearly 100,000 people live across the six counties — Yazoo, Holmes, Warren, Issaquena, Sharkey and Humphreys — the utility serves. The organization provides power to more than 9,300 homes and nearly 1,000 businesses in the region. 

While Yazoo Valley Electric Power Association never said if the issues and data breach was caused by ransomware, a ransomware gang named Akira took credit for the attack in November.

The gang claimed to have taken documents with Social Security numbers and company financial records. 

Akira emerged in March 2023, according to the FBI, and in its first year of operations made $42 million from around 250 attacks.

The FBI noted that the gang made a point of targeting critical infrastructure entities like the largest switching and terminal railroad in the U.S and prominent cloud hosting services provider Tietoevry

NewsNews BriefsCybercrime
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Japanese sportswear company Mizuno confirms data breach after 2024 ransomware claims

Next Post

Canadian charged in two crypto platform thefts totaling $65 million

Related Posts

Future-Proofing Business Continuity: BCDR Trends and Challenges for 2025

As IT environments grow more complex, IT professionals are facing unprecedented pressure to secure business-critical data. With hybrid work the new standard and cloud adoption on the rise, data is increasingly distributed across different environments, providers and locations, expanding the attack surface for emerging cyberthreats. While the need for a strong data protection strategy has become
Avatar
Read More

Europol Arrests Five SmokeLoader Clients Linked by Seized Database Evidence

Law enforcement authorities have announced that they tracked down the customers of the SmokeLoader malware and detained at least five individuals. "In a coordinated series of actions, customers of the Smokeloader pay-per-install botnet, operated by the actor known as 'Superstar,' faced consequences such as arrests, house searches, arrest warrants or 'knock and talks,'" Europol said in a
Avatar
Read More