Credit union operations restored after tech supplier ransomware attack

Jason Macuray
The federal agency that oversees credit unions said operations at about 60 of the organizations have been restored following a ransomware attack last month.

The federal agency that oversees credit unions said operations at about 60 of the organizations have been restored following a ransomware attack last month.

The National Credit Union Administration (NCUA) told Recorded Future News that it has been in regular contact with all of the affected financial institutions, helping them get their systems and operations back online “as quickly as possible.”

“As of December 12, and based on our outreach to affected credit unions regarding their operating status, the affected credit unions are fully operational and serving member needs,” NCUA spokesperson Joseph Adamoli explained.

“The credit unions have sufficient liquidity to meet the cash and payment needs of their members; members have access to their funds and to ATMs.”

Ongoing Operations, a cloud services provider owned by credit union technology firm Trellance, revealed earlier this month that a ransomware attack was the cause of widespread outages reported by several credit unions.

An Ongoing Operations spokesperson declined to answer several questions about the incident, instead directing Recorded Future News to a statement the company published on December 7.

The company hired cybersecurity experts to investigate the incident and said it is “isolated to a segment of the Ongoing Operations network” and does not impact the products or services of Trellance.

The cyberattack was discovered on November 26 and Ongoing Operations immediately reported the incident to federal law enforcement agencies — something Adamoli confirmed.

“Our team is diligently working around the clock to minimize service interruptions wherever possible and to ensure the safety of information stored on our systems. We will notify impacted individuals once we confirm the scope of the incident,” Ongoing Operations said on Dec. 7.

“The investigation to determine what impact this incident may have had on information stored on our network systems is ongoing.”

The statement added that it will take a “substantial amount of time” to fully investigate the situation and review the files that were accessed by the hackers. The company said it was making “significant progress” in re-establishing services for its customers.

All impacted customers were notified of the incident and any who were not contacted were not affected by the attack, the company claimed.

“Ongoing Operations will assist impacted credit unions with member notification and will offer complimentary credit monitoring and identity restoration services to those who are impacted,” they statement adds.

One of the credit unions affected — Peru, New York-based Mountain Valley Federal Credit Union (MVFCU) — published a notice to its customers on Sunday confirming that services had been restored late on Saturday night.

“We realize this has been an extremely long process, however we truly appreciate your patience and understanding during this time,” MVFCU CEO Maggie Pope wrote to members.

No ransomware gang has taken credit for the attack on Ongoing Operations.

The NCUA warned in August that it was seeing an increase in cyberattacks against credit unions, credit union service organizations (CUSO), and other third-party vendors supplying financial services products.

On Tuesday, the Lorenz ransomware gang took credit for an attack on Bayer Heritage Federal Credit Union, which confirmed it was attacked on November 1.

The attack brought down the credit union’s systems and phone lines, forcing them to operate most services manually in person.

“Bayer Heritage Federal Credit Union experienced a cyber incident that resulted in our phones and systems being disrupted unexpectedly. With the assistance of our 3rd party vendors, we have contained the situation and are performing forensic investigations to determine what, if any, data has been compromised,” they said.

Phone service was restored by November 15 and the credit union said late fees on payments would be waived.

CybercrimeNews
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

FCC reminds mobile phone carriers they must do more to prevent SIM swaps

Next Post

Ukraine’s largest telecom operator shut down after cyberattack

Related Posts

Fake Trading Apps Target Victims Globally via Apple App Store and Google Play

A large-scale fraud campaign leveraged fake trading apps published on the Apple App Store and Google Play Store, as well as phishing sites, to defraud victims, per findings from Group-IB. The campaign is part of a consumer investment fraud scheme that's also widely known as pig butchering, in which prospective victims are lured into making investments in cryptocurrency or other financial
Avatar
Read More

Experts Uncover 70,000 Hijacked Domains in Widespread ‘Sitting Ducks’ Attack Scheme

Multiple threat actors have been found taking advantage of an attack technique called Sitting Ducks to hijack legitimate domains for using them in phishing attacks and investment fraud schemes for years. The findings come from Infoblox, which said it identified nearly 800,000 vulnerable registered domains over the past three months, of which approximately 9% (70,000) have been subsequently
Avatar
Read More