Background check and drug testing provider DISA Global Solutions reports data breach

Avatar

Houston-based employee screening company DISA Global Solutions says a 2024 data breach exposed the information of more than 3.3 million people.

The company, which handles drug and alcohol testing and background checks for thousands of businesses, said Monday in a filing with Maine regulators that the breach affected current, former and prospective employees of its customers.

DISA said it discovered the breach on April 22, 2024, and traced the illicit activity back to February 9, 2024. The company labeled it as “hacking” from an external source but did not provide more details.

The company said it was “unaware of any attempted or actual misuse of any information involved in this incident.” 

In a notice on its own website, the company said the breached data may have included a person’s name, Social Security number, driver’s license number, “other government ID numbers, financial account information, and other data elements. Not every data element was present for every individual.”

DISA says it serves 55,000 enterprises overall, including “30% of Fortune 500 companies.”

Outside of background checks and drug testing, the company says it “helps employers make informed staffing decisions” with services such as “occupational health, transportation compliance, and financial due diligence.”

DISA is offering affected people credit monitoring through Experian.

CybercrimeIndustryNewsNews BriefsPrivacy
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Joe Warminsky

is the news editor for Recorded Future News. He has more than 25 years experience as an editor and writer in the Washington, D.C., area. He previously he helped lead CyberScoop for more than five years. Prior to that, he was a digital editor at WAMU 88.5, the NPR affiliate in Washington, and he spent more than a decade editing coverage of Congress for CQ Roll Call.

 

Total
0
Shares
Previous Post

Hackers pose as e-sports gamers online to steal cryptocurrency from Counter-Strike fans

Next Post

Siberia’s largest dairy plant reportedly disrupted with LockBit variant

Related Posts

Palo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect Gateways

Palo Alto Networks has revealed that it's observing brute-force login attempts against PAN-OS GlobalProtect gateways, days after threat actors warned of a surge in suspicious login scanning activity targeting its appliances. "Our teams are observing evidence of activity consistent with password-related attacks, such as brute-force login attempts, which does not indicate exploitation of a
Avatar
Read More

New Critical SAP NetWeaver Flaw Exploited to Drop Web Shell, Brute Ratel Framework

Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to upload JSP web shells with the goal of facilitating unauthorized file uploads and code execution.  "The exploitation is likely tied to either a previously disclosed vulnerability like CVE-2017-9844 or an unreported remote file inclusion (RFI) issue," ReliaQuest said in a report published this week. The cybersecurity
Avatar
Read More

Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers

A Türkiye-affiliated threat actor exploited a zero-day security flaw in an Indian enterprise communication platform called Output Messenger as part of a cyber espionage attack campaign since April 2024. "These exploits have resulted in a collection of related user data from targets in Iraq," the Microsoft Threat Intelligence team said. "The targets of the attack are associated with the Kurdish
Avatar
Read More