Nova Scotia says all victims of MOVEit breach have been notified

Siva Ramakrishnan

One of the first North American organizations to suffer a data breach because of a vulnerability in the MOVEit file-transfer software says it has notified more than 165,000 people that their personal information was stolen.

The government of Nova Scotia said on Thursday that it has finished sending letters to all victims of the incident in late May and is spending CA$2.85 million Canadian ($2.16 million) for credit monitoring services.

“Now, we can turn our focus to setting out the lessons we’ve learned and ensuring departments are doing what they need to do to keep Nova Scotians’ personal information safe,” said Colton LeBlanc, the province’s cybersecurity minister, in a news release.

The timeline of the Nova Scotia response underscores how time-consuming it can be for a government to analyze stolen data and officially notify victims. The province initially warned residents on June 4 about the breach, one of many this year that have affected millions of people collectively.

The provincial government said 118,000 people had “sensitive personal information, such as social insurance numbers or banking information,” stolen in the incident. Another 47,000 letters also went to people who had “less sensitive” information stolen. So far about 29,000 people have signed up for the free credit monitoring.

In the incident, hackers found a way to exploit a bug in MOVEit, a file-transfer tool from U.S.-based Progress Software that is used all over the world. The Clop ransomware gang, in particular, has taken credit for dozens of attacks. In the U.S., federal and state government agencies were also among the targets.

BriefsGovernmentCybercrimePrivacy
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Joe Warminsky is the news editor for Recorded Future News. He has more than 25 years experience as an editor and writer in the Washington, D.C., area. Most recently he helped lead CyberScoop for more than five years. Prior to that, he was a digital editor at WAMU 88.5, the NPR affiliate in Washington, and he spent more than a decade editing coverage of Congress for CQ Roll Call.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

IRS, Dutch and UK experts teach Ukrainian law enforcement how to catch sanctions evaders

Next Post

Cyber insurance claims spiked in first half of 2023 as ransomware attacks surged: report

Related Posts

Hackers Exploit Legitimate Websites to Deliver BadSpace Windows Backdoor

Legitimate-but-compromised websites are being used as a conduit to deliver a Windows backdoor dubbed BadSpace under the guise of fake browser updates. "The threat actor employs a multi-stage attack chain involving an infected website, a command-and-control (C2) server, in some cases a fake browser update, and a JScript downloader to deploy a backdoor into the victim's system," German
Avatar
Read More

Latrodectus Malware Loader Emerges as IcedID’s Successor in Phishing Campaigns

Cybersecurity researchers have observed a spike in email phishing campaigns starting early March 2024 that delivers Latrodectus, a nascent malware loader believed to be the successor to the IcedID malware. "These campaigns typically involve a recognizable infection chain involving oversized JavaScript files that utilize WMI's ability to invoke msiexec.exe and install a remotely-hosted MSI
Avatar
Read More