Credit union operations restored after tech supplier ransomware attack

Jason Macuray
The federal agency that oversees credit unions said operations at about 60 of the organizations have been restored following a ransomware attack last month.

The federal agency that oversees credit unions said operations at about 60 of the organizations have been restored following a ransomware attack last month.

The National Credit Union Administration (NCUA) told Recorded Future News that it has been in regular contact with all of the affected financial institutions, helping them get their systems and operations back online “as quickly as possible.”

“As of December 12, and based on our outreach to affected credit unions regarding their operating status, the affected credit unions are fully operational and serving member needs,” NCUA spokesperson Joseph Adamoli explained.

“The credit unions have sufficient liquidity to meet the cash and payment needs of their members; members have access to their funds and to ATMs.”

Ongoing Operations, a cloud services provider owned by credit union technology firm Trellance, revealed earlier this month that a ransomware attack was the cause of widespread outages reported by several credit unions.

An Ongoing Operations spokesperson declined to answer several questions about the incident, instead directing Recorded Future News to a statement the company published on December 7.

The company hired cybersecurity experts to investigate the incident and said it is “isolated to a segment of the Ongoing Operations network” and does not impact the products or services of Trellance.

The cyberattack was discovered on November 26 and Ongoing Operations immediately reported the incident to federal law enforcement agencies — something Adamoli confirmed.

“Our team is diligently working around the clock to minimize service interruptions wherever possible and to ensure the safety of information stored on our systems. We will notify impacted individuals once we confirm the scope of the incident,” Ongoing Operations said on Dec. 7.

“The investigation to determine what impact this incident may have had on information stored on our network systems is ongoing.”

The statement added that it will take a “substantial amount of time” to fully investigate the situation and review the files that were accessed by the hackers. The company said it was making “significant progress” in re-establishing services for its customers.

All impacted customers were notified of the incident and any who were not contacted were not affected by the attack, the company claimed.

“Ongoing Operations will assist impacted credit unions with member notification and will offer complimentary credit monitoring and identity restoration services to those who are impacted,” they statement adds.

One of the credit unions affected — Peru, New York-based Mountain Valley Federal Credit Union (MVFCU) — published a notice to its customers on Sunday confirming that services had been restored late on Saturday night.

“We realize this has been an extremely long process, however we truly appreciate your patience and understanding during this time,” MVFCU CEO Maggie Pope wrote to members.

No ransomware gang has taken credit for the attack on Ongoing Operations.

The NCUA warned in August that it was seeing an increase in cyberattacks against credit unions, credit union service organizations (CUSO), and other third-party vendors supplying financial services products.

On Tuesday, the Lorenz ransomware gang took credit for an attack on Bayer Heritage Federal Credit Union, which confirmed it was attacked on November 1.

The attack brought down the credit union’s systems and phone lines, forcing them to operate most services manually in person.

“Bayer Heritage Federal Credit Union experienced a cyber incident that resulted in our phones and systems being disrupted unexpectedly. With the assistance of our 3rd party vendors, we have contained the situation and are performing forensic investigations to determine what, if any, data has been compromised,” they said.

Phone service was restored by November 15 and the credit union said late fees on payments would be waived.

CybercrimeNews
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

FCC reminds mobile phone carriers they must do more to prevent SIM swaps

Next Post

Ukraine’s largest telecom operator shut down after cyberattack

Related Posts

Cybercriminals Exploit Popular Game Engine Godot to Distribute Cross-Platform Malware

A popular open-source game engine called Godot Engine is being misused as part of a new GodLoader malware campaign, infecting over 17,000 systems since at least June 2024. "Cybercriminals have been taking advantage of Godot Engine to execute crafted GDScript code which triggers malicious commands and delivers malware," Check Point said in a new analysis published Wednesday. "The technique
Avatar
Read More

Apple Opens PCC Source Code for Researchers to Identify Bugs in Cloud AI Security

Apple has publicly made available its Private Cloud Compute (PCC) Virtual Research Environment (VRE), allowing the research community to inspect and verify the privacy and security guarantees of its offering. PCC, which Apple unveiled earlier this June, has been marketed as the "most advanced security architecture ever deployed for cloud AI compute at scale." With the new technology, the idea is
Avatar
Read More

Bitcoin Fog Founder Sentenced to 12 Years for Cryptocurrency Money Laundering

The 36-year-old founder of the Bitcoin Fog cryptocurrency mixer has been sentenced to 12 years and six months in prison for facilitating money laundering activities between 2011 and 2021. Roman Sterlingov, a dual Russian-Swedish national, pleaded guilty to charges of money laundering and operating an unlicensed money-transmitting business earlier this March. The U.S. Department of Justice (DoJ)
Avatar
Read More